default search action
Jin Gerlach
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j10]Timo Sturm, Luisa Pumplun, Jin P. Gerlach, Martin Kowalczyk, Peter Buxmann:
Machine learning advice in managerial decision-making: The overlooked role of decision makers' advice utilization. J. Strateg. Inf. Syst. 32(4): 101790 (2023) - 2022
- [j9]Jin P. Gerlach, Ronald T. Cenfetelli:
Overcoming the Single-IS Paradigm in Individual-Level IS Research. Inf. Syst. Res. 33(2): 476-488 (2022) - 2021
- [j8]Timo Sturm, Jin P. Gerlach, Luisa Pumplun, Neda Mesbah, Felix Peters, Christoph Tauchert, Ning Nan, Peter Buxmann:
Coordinating Human and Machine Learning for Effective Organizational Learning. MIS Q. 45(3) (2021) - 2020
- [j7]Jin P. Gerlach, Ronald T. Cenfetelli:
Constant Checking Is Not Addiction: A Grounded Theory of IT-Mediated State-Tracking. MIS Q. 44(4) (2020) - 2019
- [j6]Margareta Heidt, Jin P. Gerlach, Peter Buxmann:
Investigating the Security Divide between SME and Large Companies: How SME Characteristics Influence Organizational IT Security Investments. Inf. Syst. Frontiers 21(6): 1285-1305 (2019) - [j5]Jin P. Gerlach, Nicole Eling, Nora Wessels, Peter Buxmann:
Flamingos on a slackline: Companies' challenges of balancing the competing demands of handling customer information and privacy. Inf. Syst. J. 29(2): 548-575 (2019) - [j4]Jin Gerlach, Peter Buxmann, Tamara Dinev:
"They're All the Same!" Stereotypical Thinking and Systematic Errors in Users' Privacy-Related Judgments About Online Services. J. Assoc. Inf. Syst. 20(6): 4 (2019) - [j3]Adrian Engelbrecht, Jin P. Gerlach, Alexander Benlian, Peter Buxmann:
How employees gain meta-knowledge using enterprise social networks: A validation and extension of communication visibility theory. J. Strateg. Inf. Syst. 28(3): 292-309 (2019) - 2015
- [j2]Jin Gerlach, Thomas Widjaja, Peter Buxmann:
Handle with care: How online social network providers' privacy policies impact users' information sharing behavior. J. Strateg. Inf. Syst. 24(1): 33-43 (2015) - 2012
- [j1]Helena Wenninger, Thomas Widjaja, Peter Buxmann, Jin Gerlach:
Der "Preis des Kostenlosen". Wirtschaftsinformatik Manag. 4(6): 12-19 (2012)
Conference and Workshop Papers
- 2019
- [c13]Margareta Heidt, Jin Gerlach, Peter Buxmann:
A Holistic View on Organizational IT Security: The Influence of Contextual Aspects During IT Security Decisions. HICSS 2019: 1-10 - [c12]Christian Michael Olt, Jin Gerlach, Rabea Sonnenschein, Peter Buxmann:
On the Benefits of Senior Executives' Information Security Awareness. ICIS 2019 - [c11]Nora Wessels, Jin Gerlach, Amina Wagner:
To Sell or not to Sell - Antecedents of Individuals' Willingness-to-Sell Personal Information on Data-Selling Platforms. ICIS 2019 - 2018
- [c10]Jin P. Gerlach:
Work, Home, and Technology: Towards a Framework of IT-Based Boundary Management. ECIS 2018: 85 - [c9]Margareta Heidt, Jin P. Gerlach:
The Influence of SME Constraints on Organizational IT Security. ICIS 2018 - 2017
- [c8]Adrian Engelbrecht, Jin Gerlach, Alexander Benlian, Peter Buxmann:
Analysing Employees' Willingness to Disclose Information in Enterprise Social Networks: the Role of organisational Culture. ECIS 2017: 135 - [c7]Adrian Engelbrecht, Jin P. Gerlach, Thomas Widjaja, Peter Buxmann:
The Nature of Enterprise-Service-Fit in the Context of Digital Services. ICIS 2017 - 2016
- [c6]Adrian Engelbrecht, Jin Gerlach, Thomas Widjaja:
Understanding the Anatomy of Data-Driven Business Models - towards an Empirical Taxonomy. ECIS 2016: Research Paper 128 - 2015
- [c5]Martin Kowalczyk, Jin P. Gerlach:
Business Intelligence & Analytics and Decision Quality - Insights on Analytics Specialization and Information Processing Modes. ECIS 2015 - [c4]Sarah Träutlein, Jin Gerlach:
Perceived Information-Based Vulnerability of Enterprise Information Systems: Concept, Antecedents, and Outcomes. ICIS 2015 - 2014
- [c3]Jin Gerlach, Schmidt Soeren, Peter Buxmann:
(I Can't Get No) Satisfaction: Investigating the Role of Goal Value and Mood in Habitual Technology Use. ICIS 2014 - 2013
- [c2]Jin Gerlach, Peter Buxmann:
Analyzing Electronic Book Acceptance: A Compatibility Perspective. HICSS 2013: 2813-2822 - 2011
- [c1]Jin Gerlach, Peter Buxmann:
Investigating the acceptance of electronic books - the impact of haptic dissonance on innovation adoption. ECIS 2011: 141
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint