Ella Kolkowska

According to our database1, Ella Kolkowska authored at least 42 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Understanding Drivers for Acceptance and Use of Digital Care Services for Seniors: Learning from a Value-Focused Thinking Study in Poland and Sweden.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research.
Proceedings of the Human Aspects of Information Security and Assurance, 2023

Intergenerational Tensions in ICT Adoption for Independent and healthy ageing: Preliminary Insights from a Value-Focused Thinking Study in Poland and Sweden.
Proceedings of the 31st European Conference on Information Systems, 2023

Investigating the Role of Gender in Active and Healthy Ageing Supported by ICT: Preliminary Insights from Polish and Swedish Older Adults.
Proceedings of the 29th Americas Conference on Information Systems, 2023

2022
Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis.
Comput. Secur., 2022

Defining Seniors' Value-based Objectives for ICT-supported Governmental Elderly Care Services: Preliminary Lessons from Poland and Sweden.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
Attempts to share information between public sector organisations over time: A case-based exploration of value conflicts.
Inf. Polity, 2021

Supporting Seniors in Independent and Healthy Ageing through ICT: Insights from a Value-Focused Thinking Study in Latvia, Poland and Sweden.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
The hunt for computerized support in information security policy management.
Inf. Comput. Secur., 2020

Information privacy in e-service: Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior.
Gov. Inf. Q., 2020

2019
Factors influencing seniors' acceptance of technology for ageing in place in the post-implementation stage: A literature review.
Int. J. Medical Informatics, 2019

Information privacy practices in e-government in an African least developing country, Rwanda.
Electron. J. Inf. Syst. Dev. Ctries., 2019

Supporting Active and Healthy Ageing by ICT Solutions: Preliminary Lessons Learned from Polish, Swedish and Latvian Older Adults.
Proceedings of the Information Systems: Research, Development, Applications, Education, 2019

The Role of Gender in Supporting Active and Healthy Ageing by ICT Solutions: Learning from Latvian, Polish and Swedish Older Adults.
Proceedings of the Information Systems, 2019

Towards Aligning IT and Daily Routines of Older Adults.
Proceedings of the Business Information Systems Workshops, 2019

Addressing Complexity of Contexts of IT Solutions for Older Adults.
Proceedings of the Joint Proceedings of the BIR 2019 Workshops and Doctoral Consortium co-located with 18th International Conference on Perspectives in Business Informatics Research (BIR 2019), 2019

Important Issues for Preventing Cyberstalking in India.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
An Interface for IoT: Feeding Back Health-Related Data to Parkinson's Disease Patients.
J. Sens. Actuator Networks, 2018

Guest editorial.
Inf. Comput. Secur., 2018

Implementation of ICT for Active and Healthy Ageing: Comparing Value-Based Objectives Between Polish and Swedish Seniors.
Proceedings of the Information Systems: Research, Development, Applications, Education, 2018

Perspectives on Design of Sensor Based Exergames Targeted Towards Older Adults.
Proceedings of the Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment, 2018

A User-Centered Ethical Assessment of Welfare Technology for Elderly.
Proceedings of the Human Aspects of IT for the Aged Population. Applications in Health, Assistance, and Entertainment, 2018

2017
Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method.
J. Strateg. Inf. Syst., 2017

Inter-organisational information sharing in the public sector: A longitudinal case study on the reshaping of success factors.
Gov. Inf. Q., 2017

Using Care Professionals as Proxies in the Design Process of Welfare Technology - Perspectives from Municipality Care.
Proceedings of the Human Aspects of IT for the Aged Population. Aging, Design and User Experience, 2017

To Capture the Diverse Needs of Welfare Technology Stakeholders - Evaluation of a Value Matrix.
Proceedings of the Human Aspects of IT for the Aged Population. Applications, Services and Contexts, 2017

Trusting and Adopting E-Government Services in Developing Countries? Privacy Concerns and Practices in Rwanda.
Proceedings of the Electronic Government - 16th IFIP WG 8.5 International Conference, 2017

2016
Inter-organisational information security: a systematic literature review.
Inf. Comput. Secur., 2016

Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies.
Proceedings of the ICT Systems Security and Privacy Protection, 2016

To Meet the Needs of Aging Users and the Prerequisites of Innovators in the Design Process - Lessons Learned from Three Pilot Projects.
Proceedings of the Human Aspects of IT for the Aged Population. Design for Aging, 2016

Socio-Technical Challenges in Implementation of Monitoring Technologies in Elderly Care.
Proceedings of the Human Aspects of IT for the Aged Population. Healthy and Active Aging, 2016

2015
Privacy Principles in Design of Smart Homes Systems in Elderly Care.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2015

Inter-Organisational Information Sharing - Between a Rock and a Hard Place.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

New Insights Into Understanding Manager's Intentions to Overlook ISP Violation in Organizations through Escalation of Commitment Factors.
Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance, 2015

2013
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale.
Inf. Manag. Comput. Secur., 2013

Organizational power and information security rule compliance.
Comput. Secur., 2013

2012
Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation.
Proceedings of the Information Security and Privacy Research, 2012

2011
Value conflicts for information security management.
J. Strateg. Inf. Syst., 2011

Security subcultures in an organization - exploring value conflicts.
Proceedings of the 19th European Conference on Information Systems, 2011

Can a Cloud Be Really Secure? A Socratic Dialogue.
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011

2006
Values for Information System Security in an Academic Environment: A Pilot Study.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Value Sensitive Approach to IS Security - A Socio-Organizational Perspective.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005


  Loading...