default search action
Karin Hedström
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Elin Wihlborg, Ida Lindgren, Karin Hedström, Katarina Gidlund:
Institutional Re-design for a Digital Era - Learning from Cases of Automation. ePart 2023: 99-113 - [c21]Tanja Elina Havstorm, Fredrik Karlsson, Karin Hedström:
Uncovering Situations of Cargo Cult Behavior in Agile Software Development Method Use. HICSS 2023: 6486-6495 - [c20]Ojelanki K. Ngwenyama, Saeed Akhlaghpour, Karin Hedström, Daniel Schlagwein, Frantz Rowe:
Societal digitalization, value dilemmas, and the 'digital first' paradigm The broader questions of contract tracing apps in the post pandemic period. ICIS 2023 - [c19]Gomathi Thangavel, Mevludin Memedi, Jonas Moll, Karin Hedström:
Management of social isolation and loneliness in Parkinson's disease: Design principles. ICIS 2023 - 2022
- [j14]Annika Andersson, Karin Hedström, Fredrik Karlsson:
"Standardizing information security - a structurational analysis". Inf. Manag. 59(3): 103623 (2022) - [j13]Thomas Denk, Karin Hedström, Fredrik Karlsson:
Citizens' attitudes towards automated decision-making. Inf. Polity 27(3): 391-408 (2022) - 2021
- [j12]Fredrik Karlsson, Karin Hedström, Magnus Frostenson, Frans Prenkert, Ella Kolkowska, Sven Helin:
Attempts to share information between public sector organisations over time: A case-based exploration of value conflicts. Inf. Polity 26(3): 289-310 (2021) - [c18]Annika Andersson, Mathias Hatakka, Hannu Larsson, Karin Hedström:
Citizen Diversity in e-Government Research: Moving the Field Forward. HICSS 2021: 1-10 - [c17]Annika Andersson, Karin Hedström, Steffi Siegert, Carl-Johan Sommar:
Teachers Falling off the Cliff Affordances and Constraints of Social Media in School. HICSS 2021: 1-10 - 2020
- [j11]Annika Andersson, Fredrik Karlsson, Karin Hedström:
Consensus versus warfare - unveiling discourses in de jure information security standard development. Comput. Secur. 99: 102035 (2020)
2010 – 2019
- 2019
- [j10]Antonios Tsertsidis, Ella Kolkowska, Karin Hedström:
Factors influencing seniors' acceptance of technology for ageing in place in the post-implementation stage: A literature review. Int. J. Medical Informatics 129: 324-333 (2019) - [c16]Gomathi Thangavel, Mevludin Memedi, Karin Hedström:
A systematic review of Social Internet of Things: concepts and application areas. AMCIS 2019 - [c15]Karin Hedström, Johanna Sefyrin, Mariana S. Gustafsson, Elin Wihlborg, Bernhard Iréne:
A Digital Society for All? - Meanings, Practices and Policies for Digital Diversity. HICSS 2019: 1-10 - [e1]Gurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete:
ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings. IFIP Advances in Information and Communication Technology 562, Springer 2019, ISBN 978-3-030-22311-3 [contents] - 2018
- [j9]Kane Smith, Gurpreet Dhillon, Karin Hedström:
Reconciling value-based objectives for security and identity management. Inf. Comput. Secur. 26(2): 194-212 (2018) - 2017
- [j8]Fredrik Karlsson, Karin Hedström, Göran Goldkuhl:
Practice-based discourse analysis of information security policies. Comput. Secur. 67: 267-279 (2017) - [j7]Ella Kolkowska, Fredrik Karlsson, Karin Hedström:
Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method. J. Strateg. Inf. Syst. 26(1): 39-57 (2017) - [c14]Elin Wihlborg, Karin Hedström, Hannu Larsson:
e-Government for all - Norm-critical Perspectives and Public Values in Digitalization. HICSS 2017: 1-10 - 2016
- [c13]Elin Wihlborg, Hannu Larsson, Karin Hedström:
"The Computer Says No!" - A Case Study on Automated Decision-Making in Public Authorities. HICSS 2016: 2903-2912 - 2015
- [c12]Fredrik Karlsson, Ella Kolkowska, Karin Hedström, Magnus Frostenson:
Inter-Organisational Information Sharing - Between a Rock and a Hard Place. HAISA 2015: 71-81 - [c11]Fredrik Karlsson, Göran Goldkuhl, Karin Hedström:
Practice-Based Discourse Analysis of InfoSec Policies. SEC 2015: 297-310 - 2014
- [c10]Fredrik Karlsson, Karin Hedström:
End User Development and Information Security Culture. HCI (24) 2014: 246-257 - 2013
- [j6]Karin Hedström, Fredrik Karlsson, Ella Kolkowska:
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. Inf. Manag. Comput. Secur. 21(4): 266-287 (2013) - [j5]Fredrik Karlsson, Karin Hedström:
Evaluating End User Development as a Requirements Engineering Technique for Communicating Across Social Worlds During Systems Development. Scand. J. Inf. Syst. 25(2): 3 (2013) - 2012
- [j4]Sana Z. Khan, Zahraa Khais Shahid, Karin Hedström, Annika Andersson:
Hopes and Fears in Implementation of Electronic Health Records in Bangladesh. Electron. J. Inf. Syst. Dev. Ctries. 54(1): 1-18 (2012) - [j3]Fredrik Karlsson, Jesper Holgersson, Eva Söderström, Karin Hedström:
Exploring user participation approaches in public e-service development. Gov. Inf. Q. 29(2): 158-168 (2012) - 2011
- [j2]Karin Hedström, Ella Kolkowska, Fredrik Karlsson, Jonathan P. Allen:
Value conflicts for information security management. J. Strateg. Inf. Syst. 20(4): 373-384 (2011) - [c9]Andreas Ask, Karin Hedström:
Taking Initial Steps towards Enterprise Architecture in Local Government. EGOVIS 2011: 26-40 - 2010
- [c8]Jesper Holgersson, Eva Söderström, Fredrik Karlsson, Karin Hedström:
Towards a Roadmap for User Involvement in E-Government Service Development. EGOV 2010: 251-262 - [c7]Karin Hedström, Gurpreet Dhillon, Fredrik Karlsson:
Using Actor Network Theory to Understand Information Security Management. SEC 2010: 43-54
2000 – 2009
- 2009
- [c6]Annika Andersson, Karin Hedström, Åke Grönlund:
Learning from eLearning: Emerging Constructive Learning Practices. ICIS 2009: 51 - 2008
- [c5]Fredrik Karlsson, Karin Hedström:
Negotiating a Systems Development Method. ISD 2008: 491-499 - 2007
- [j1]Karin Hedström:
The values of IT in elderly care. Inf. Technol. People 20(1): 72-84 (2007) - 2006
- [c4]Göran Collste, Penny Duquenoy, Carlisle Eldwidge George, Karin Hedström, Kai Kimppa, Emilio Mordini:
ICT in Medicine and Health Care: Assessing Social, Ethical and Legal Issues. HCC 2006: 297-308 - [c3]Åke Grönlund, Annika Andersson, Karin Hedström:
Right on Time: Understanding eGovernment in Developing Countries. Social Inclusion 2006: 73-87 - 2004
- [b1]Karin Hedström:
Spår av datoriseringens värden: Effekter av IT i äldreomsorg. Linköping University, Sweden, 2004 - 2003
- [c2]Karin Hedström:
The Socio-Political Construction of CareSys - How Interests and Values Influence Computerization. Diffusion and Adoption of Networked Information Technologies 2003: 1-18 - 2001
- [c1]Karin Hedström, Emma Eliason:
The Use of Research-Based Information System Development Methods. Realigning Research and Practice in Information Systems Development 2001: 69-76
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint