Abstract is missing.
- Scandinavian approaches in systems developmentPer Flensburg. 1-10 [doi]
- How do Bitcoin users manage their private keys?Gunnar Lindqvist, Joakim Kävrestad, Dennis Modig, Ali Mohammad Padyab. 11-21 [doi]
- Consulting the Oracle at Delphi - Combining Risk I and Risk in cyber securityRichard McEvoy, Stewart Kowalski. 22-31 [doi]
- A case study of a municipality phishing attack measures - towards a socio-technical incident management frameworkGrethe Østby, Stewart James Kowalski. 32-45 [doi]
- Multi-paradigmatic approaches in cybersecurity economicsMazaher Kianpour, Stewart James Kowalski, Harald Øverby. 46-65 [doi]
- Freelancers 4.0: the impacts of freelancers on the adoption of Industry 4.0 under a socio-technical perspectiveEmanuele Gabriel Margherita, Jérôme Sulbout. 66-73 [doi]
- Socio-technical perspectives in the Fourth Industrial Revolution - Analysing the three main visions: Industry 4.0, the socially sustainable factory of Operator 4.0 and Industry 5.0Emanuele Gabriel Margherita, Alessio Maria Braccini. 74-82 [doi]
- Informal leaders and their influence within information system organisations in developing countries: A case study in MexicoEdgar Hernandez-Rojas, Ahmed Imran, Luke Nguyen-Hoan. 83-99 [doi]
- Success factors and challenges in digital forensics for law enforcement in SwedenMilagros D. Cervantes Mori, Joakim Kävrestad, Marcus Nohlberg. 100-116 [doi]
- Citizen science and socio-technical perspective: reflection on a possible integrationAndrea Spasiano. 117-124 [doi]
- Crowd dynamics in internal crowdsourcing: insights from higher educationGianluigi Viscusi, Christopher L. Tucci. 125-131 [doi]
- Skullduggery in peer-to-peer networks and the need for a new cyber-social theoryDonna Champion. 132-142 [doi]
- Beyond incentives and sanctions - Extending the portfolio of IS coordination by systematic design of informal interventionsRobert Winter 0001. 143-157 [doi]
- Heuristic-based evaluation for socio-technical systemsFelix Thewes, Thomas Herrmann, Marina Konrad. 158-177 [doi]
- The fly in the soup: A critical realism perspective on the role of the engaged researcherHelena Vallo Hult, Anna Sigridur Islind, Livia Norström, Sara Willermark. 178-188 [doi]
- De gustibus non est disputandum, but usability is not a matter of tasteMikko Rajanen. 189-197 [doi]
- A holistic approach of how to handle patient information to support seamless and secure careEva Söderström, Nomie Eriksson, Rose-Mharie Åhlfeldt. 198-203 [doi]
- Development of an IT-supported anti-fraud-framework for SMEs: An architectural concept for risk management using the 'Man-Technology-Organization' approachMichaela K. Trierweiler. 204-215 [doi]
- Is cyber-security the new lifeboat? An exploration of the employee's perspective of cyber-security within the cruise ship industryVictoria Knight, Moufida Sadok. 216-231 [doi]
- Governing online terrorist propaganda: A societal security issueVictoria A. Jangada Correia, Moufida Sadok. 232-242 [doi]
- Exploring digitalisation in agriculture through socio-technical perspectivesChiara Cagnetti, Alessio Maria Braccini. 243-250 [doi]
- Unmasking the drivers and Implementation of changeFatema Zaghloul, Peter Bednár. 251-257 [doi]
- Gender equality: the need for explicit address and actions in ICT and Socio-Technical Systems agendasLaura Tarantino, Antinisca Di Marco. 258-267 [doi]