


default search action
Steffi Haag
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Steffi Haag, Andreas Eckhardt:
Dealing Effectively with Shadow IT by Managing Both Cybersecurity and User Needs. MIS Q. Executive 23(4): 5 (2024) - [c14]Johannes Schneider, Steffi Haag, Leona Chandra Kruse:
Negotiating with LLMs: Prompt Hacks, Skill Gaps, and Reasoning Deficits. CHIRA (2) 2024: 238-259 - [c13]Joris van Bohemen, Steffi Haag:
Conversational AI's Role in the Patient-Healthcare Provider Relationship: A Mixed-Methods Study. PACIS 2024 - 2023
- [j7]Steffi Haag, Christina Chase, Gesa Miczaika, Kathrin M. Möslein, Dennis Steininger, Rüdiger Zarnekow, Joris van Bohemen:
How Can the BISE Community Promote Tech Startups? Bus. Inf. Syst. Eng. 65(4): 475-482 (2023) - [j6]Mikko T. Siponen, Mikko Rönkkö, Fufan Liu, Steffi Haag, Gabriella Laatikainen:
Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals. Commun. Assoc. Inf. Syst. 53: 47 (2023) - [i1]Johannes Schneider, Steffi Haag, Leona Chandra Kruse
:
Negotiating with LLMS: Prompt Hacks, Skill Gaps, and Reasoning Deficits. CoRR abs/2312.03720 (2023) - 2022
- [c12]Jonas Busch, Timon Sengewald, Steffi Haag:
Identifying Customer Values of B2C-Fintech Services in the Area of Personal Financial Management. Wirtschaftsinformatik 2022 - [c11]Johanna Weigl, Steffi Haag:
Developing Design Principles for Green IS Facilitating Sustainable User Behavior: A Design Science Research Approach. Wirtschaftsinformatik 2022 - 2021
- [j5]Steffi Haag, Mikko T. Siponen, Fufan Liu:
Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future. Data Base 52(2): 25-67 (2021)
2010 – 2019
- 2019
- [j4]Steffi Haag, Andreas Eckhardt, Andrew Schwarz:
The Acceptance of Justifications among Shadow IT Users and Nonusers - An Empirical Analysis. Inf. Manag. 56(5): 731-741 (2019) - [c10]Michael Klesel, Steffi Haag, Frederike Marie Oschinsky, Kevin Ortbach:
Freedom of Technology Choice: An Experimental Evaluation. ICIS 2019 - 2018
- [j3]Robin Klostermeier, Steffi Haag, Alexander Benlian
:
Digitale Zwillinge - Eine explorative Fallstudie zur Untersuchung von Geschäftsmodellen. HMD Prax. Wirtsch. 55(2): 297-311 (2018) - 2017
- [j2]Steffi Haag, Andreas Eckhardt:
Shadow IT. Bus. Inf. Syst. Eng. 59(6): 469-473 (2017) - [j1]Guido Schryen, Alexander Benlian, Frantz Rowe, Shirley Gregor
, Kai R. Larsen, Stacie Petter
, Guy Paré, Gerit Wagner
, Steffi Haag, Emrah Yasasin:
Literature Reviews in IS Research: What Can Be Learnt from the Past and Other Fields? Commun. Assoc. Inf. Syst. 41: 30 (2017) - 2016
- [c9]Clara Ament, Steffi Haag:
Security-Related stress - a Neglected Construct in Information Systems stress literature. ECIS 2016: Research-in-Progress Paper 74 - [c8]Clara Ament, Steffi Haag:
How Information Security Requirements Stress Employees. ICIS 2016 - 2015
- [c7]Steffi Haag, Andreas Eckhardt, Christiane Bozoyan:
Are Shadow System Users the Better IS Users? - Insights of a Lab Experiment. ICIS 2015 - [c6]Steffi Haag, Andreas Eckhardt:
Justifying Shadow IT Usage. PACIS 2015: 241 - [c5]Steffi Haag:
Appearance of Dark Clouds? - An Empirical Analysis of Users' Shadow Sourcing of Cloud Services. Wirtschaftsinformatik 2015: 1438-1452 - 2014
- [c4]Steffi Haag, Andreas Eckhardt, Julia Krönung:
From the Ground to the Cloud - A Structured Literature Analysis of the Cloud Service Landscape around the Public and Private Sector. HICSS 2014: 2127-2136 - [c3]Steffi Haag, Andreas Eckhardt:
Normalizing the Shadows - The Role of Symbolic Models for Individuals' Shadow IT Usage. ICIS 2014 - [c2]Steffi Haag, Andreas Eckhardt:
Sensitizing Employees' Corporate IS Security Risk Perception. ICIS 2014 - 2013
- [c1]Steffi Haag, Friedrich Born, Stanislav Kreuzer, Steffen Bernius:
Organizational Resistance to E-Invoicing - Results from an Empirical Investigation among SMEs. EGOV 2013: 286-297
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-11 21:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint