• Publications
  • Influence
Value conflicts for information security management
A business's information is one of its most important assets, making the protection of information a strategic issue. In this paper, we investigate the tension between information security policiesExpand
  • 86
  • 7
  • Open Access
Exploring user participation approaches in public e-service development
It has been argued that user participation is important when public authorities develop e-services. At the same time there is limited research on the usefulness of existing user participation approExpand
  • 56
  • 5
The story of the sixth myth of open data and open government
Purpose – The aim of this paper is to describe a local government effort to realise an open government agenda. This is done using a storytelling approach. Design/methodology/approach – The empiricalExpand
  • 46
  • 4
"The Computer Says No!" -- A Case Study on Automated Decision-Making in Public Authorities
In e-government automated decision-making increases, forming part of a trend towards "smart" and self-regulating systems. This necessitates the introduction of new relationships and practices,Expand
  • 16
  • 4
  • Open Access
The values of IT in elderly care
– The purpose of this paper is to analyze the values of IT in elderly care., – The paper is an empirical investigation based on four in‐depth case studies concerning IT in elderly care. The studyExpand
  • 41
  • 3
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale
Purpose – Employees' compliance with information security policies is considered an essential component of information security management. The research aims to illustrate the usefulness of socialExpand
  • 20
  • 3
  • Open Access
Using Actor Network Theory to Understand Information Security Management
This paper presents an Actor Network Theory (ANT) analysis of a computer hack at a large university. Computer hacks are usually addressed through technical means thus ensuring that perpetrators areExpand
  • 19
  • 3
  • Open Access
Practice-based discourse analysis of information security policies
We propose tentative quality criteria for design of information security policies.The criteria emphasise information security policies as useful tools for employees.The criteria are anchored inExpand
  • 16
  • 3
Factors influencing seniors' acceptance of technology for ageing in place in the post-implementation stage: A literature review
PURPOSE To identify factors that influence the acceptance of technology for ageing in place by seniors in the post-implementation stage. This review is among very few that focus on acceptance inExpand
  • 7
  • 2
Spår av datoriseringens värden - Effekter av IT i äldreomsorg
Visioner om IT lovar manga och positiva forandringar i samhallet. Detta galler inte minst inom svensk aldreomsorg dar IT ses som ett verktyg for att utveckla och forbattra aldreomsorgen. Genom attExpand
  • 17
  • 2