default search action
Ella Kolkowska
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Marcus Gerdin, Ella Kolkowska, Åke Grönlund:
What goes around comes around: an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items. Inf. Comput. Secur. 32(4): 459-476 (2024) - 2023
- [c28]Ewa Soja, Piotr Soja, Ella Kolkowska:
Investigating the Role of Gender in Active and Healthy Ageing Supported by ICT: Preliminary Insights from Polish and Swedish Older Adults. AMCIS 2023 - [c27]Ella Kolkowska, Ewa Soja, Piotr Soja:
Intergenerational Tensions in ICT Adoption for Independent and healthy ageing: Preliminary Insights from a Value-Focused Thinking Study in Poland and Sweden. ECIS 2023 - [c26]Marcus Gerdin, Åke Grönlund, Ella Kolkowska:
What Goes Around Comes Around; Effects of Unclear Questionnaire Items in Information Security Research. HAISA 2023: 470-481 - [c25]Ewa Soja, Piotr Soja, Ella Kolkowska:
Understanding Drivers for Acceptance and Use of Digital Care Services for Seniors: Learning from a Value-Focused Thinking Study in Poland and Sweden. HICSS 2023: 991-1000 - 2022
- [j14]Fredrik Karlsson, Ella Kolkowska, Johan Petersson:
Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis. Comput. Secur. 114: 102578 (2022) - [c24]Ella Kolkowska, Ewa Soja, Piotr Soja:
Defining Seniors' Value-based Objectives for ICT-supported Governmental Elderly Care Services: Preliminary Lessons from Poland and Sweden. AMCIS 2022 - 2021
- [j13]Fredrik Karlsson, Karin Hedström, Magnus Frostenson, Frans Prenkert, Ella Kolkowska, Sven Helin:
Attempts to share information between public sector organisations over time: A case-based exploration of value conflicts. Inf. Polity 26(3): 289-310 (2021) - [c23]Ewa Soja, Piotr Soja, Ella Kolkowska, Marite Kirikova, Agneta Muceniece:
Supporting Seniors in Independent and Healthy Ageing through ICT: Insights from a Value-Focused Thinking Study in Latvia, Poland and Sweden. HICSS 2021: 1-10 - 2020
- [j12]Chantal Mutimukwe, Ella Kolkowska, Åke Grönlund:
Information privacy in e-service: Effect of organizational privacy assurances on individual privacy concerns, perceptions, trust and self-disclosure behavior. Gov. Inf. Q. 37(1) (2020) - [j11]Elham Rostami, Fredrik Karlsson, Ella Kolkowska:
The hunt for computerized support in information security policy management. Inf. Comput. Secur. 28(2): 215-259 (2020)
2010 – 2019
- 2019
- [j10]Chantal Mutimukwe, Ella Kolkowska, Åke Grönlund:
Information privacy practices in e-government in an African least developing country, Rwanda. Electron. J. Inf. Syst. Dev. Ctries. 85(2): 12074 (2019) - [j9]Antonios Tsertsidis, Ella Kolkowska, Karin Hedström:
Factors influencing seniors' acceptance of technology for ageing in place in the post-implementation stage: A literature review. Int. J. Medical Informatics 129: 324-333 (2019) - [c22]Kane J. Smith, Gurpreet Dhillon, Ella Kolkowska:
Important Issues for Preventing Cyberstalking in India. AMCIS 2019 - [c21]Marite Kirikova, Ella Kolkowska, Piotr Soja, Agneta Muceniece:
Addressing Complexity of Contexts of IT Solutions for Older Adults. BIR Workshops 2019: 51-61 - [c20]Marite Kirikova, Ella Kolkowska, Piotr Soja, Ewa Soja, Agneta Muceniece:
Towards Aligning IT and Daily Routines of Older Adults. BIS (Workshops) 2019: 150-156 - [c19]Ewa Soja, Piotr Soja, Ella Kolkowska, Marite Kirikova:
The Role of Gender in Supporting Active and Healthy Ageing by ICT Solutions: Learning from Latvian, Polish and Swedish Older Adults. EMCIS 2019: 344-357 - [c18]Ewa Soja, Piotr Soja, Ella Kolkowska, Marite Kirikova:
Supporting Active and Healthy Ageing by ICT Solutions: Preliminary Lessons Learned from Polish, Swedish and Latvian Older Adults. SIGSAND/PLAIS 2019: 48-61 - 2018
- [j8]Fredrik Karlsson, Ella Kolkowska, Marianne Törner:
Guest editorial. Inf. Comput. Secur. 26(2): 146-149 (2018) - [j7]Mevludin Memedi, Gaki Tshering, Martin Fogelberg, Ilir Jusufi, Ella Kolkowska, Gunnar O. Klein:
An Interface for IoT: Feeding Back Health-Related Data to Parkinson's Disease Patients. J. Sens. Actuator Networks 7(1): 14 (2018) - [c17]Ella Kolkowska, Isabella Scandurra, Anneli Avatare Nöu, Marie Sjölinder, Mevludin Memedi:
A User-Centered Ethical Assessment of Welfare Technology for Elderly. HCI (27) 2018: 59-73 - [c16]Marie Sjölinder, Anneli Avatare Nöu, Ella Kolkowska, Lars-Åke Johansson, Anna Ridderstolpe, Isabella Scandurra:
Perspectives on Design of Sensor Based Exergames Targeted Towards Older Adults. HCI (27) 2018: 395-414 - [c15]Ella Kolkowska, Ewa Soja, Piotr Soja:
Implementation of ICT for Active and Healthy Ageing: Comparing Value-Based Objectives Between Polish and Swedish Seniors. SIGSAND/PLAIS 2018: 161-173 - 2017
- [j6]Fredrik Karlsson, Magnus Frostenson, Frans Prenkert, Ella Kolkowska, Sven Helin:
Inter-organisational information sharing in the public sector: A longitudinal case study on the reshaping of success factors. Gov. Inf. Q. 34(4): 567-577 (2017) - [j5]Ella Kolkowska, Fredrik Karlsson, Karin Hedström:
Towards analysing the rationale of information security non-compliance: Devising a Value-Based Compliance analysis method. J. Strateg. Inf. Syst. 26(1): 39-57 (2017) - [c14]Chantal Mutimukwe, Ella Kolkowska, Åke Grönlund:
Trusting and Adopting E-Government Services in Developing Countries? Privacy Concerns and Practices in Rwanda. EGOV 2017: 324-335 - [c13]Marie Sjölinder, Isabella Scandurra, Anneli Avatare Nöu, Ella Kolkowska:
Using Care Professionals as Proxies in the Design Process of Welfare Technology - Perspectives from Municipality Care. HCI (27) 2017: 184-198 - [c12]Ella Kolkowska, Anneli Avatare Nöu, Marie Sjölinder, Isabella Scandurra:
To Capture the Diverse Needs of Welfare Technology Stakeholders - Evaluation of a Value Matrix. HCI (28) 2017: 404-419 - 2016
- [j4]Fredrik Karlsson, Ella Kolkowska, Frans Prenkert:
Inter-organisational information security: a systematic literature review. Inf. Comput. Secur. 24(5): 418-451 (2016) - [c11]Ella Kolkowska, Anneli Avatare Nöu, Marie Sjölinder, Isabella Scandurra:
Socio-Technical Challenges in Implementation of Monitoring Technologies in Elderly Care. HCI (25) 2016: 45-56 - [c10]Marie Sjölinder, Isabella Scandurra, Anneli Avatare Nöu, Ella Kolkowska:
To Meet the Needs of Aging Users and the Prerequisites of Innovators in the Design Process - Lessons Learned from Three Pilot Projects. HCI (24) 2016: 92-104 - [c9]Ella Kolkowska, Annica Kristoffersson:
Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies. SEC 2016: 384-397 - 2015
- [c8]Fredrik Karlsson, Ella Kolkowska, Karin Hedström, Magnus Frostenson:
Inter-Organisational Information Sharing - Between a Rock and a Hard Place. HAISA 2015: 71-81 - [c7]Miranda Kajtazi, Ella Kolkowska, Burcu Bulgurcu:
New Insights Into Understanding Manager's Intentions to Overlook ISP Violation in Organizations through Escalation of Commitment Factors. HAISA 2015: 131-140 - [c6]Ella Kolkowska:
Privacy Principles in Design of Smart Homes Systems in Elderly Care. HCI (22) 2015: 526-537 - 2013
- [j3]Ella Kolkowska, Gurpreet Dhillon:
Organizational power and information security rule compliance. Comput. Secur. 33: 3-11 (2013) - [j2]Karin Hedström, Fredrik Karlsson, Ella Kolkowska:
Social action theory for understanding information security non-compliance in hospitals: The importance of user rationale. Inf. Manag. Comput. Secur. 21(4): 266-287 (2013) - 2012
- [c5]Ella Kolkowska, Bart De Decker:
Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation. SEC 2012: 339-351 - 2011
- [j1]Karin Hedström, Ella Kolkowska, Fredrik Karlsson, Jonathan P. Allen:
Value conflicts for information security management. J. Strateg. Inf. Syst. 20(4): 373-384 (2011) - [c4]Ella Kolkowska:
Security subcultures in an organization - exploring value conflicts. ECIS 2011: 237 - [c3]Ella Kolkowska, Gurpreet Dhillon:
Organizational Power and Information Security Rule Compliance. SEC 2011: 185-196 - [p1]Gurpreet Dhillon, Ella Kolkowska:
Can a Cloud Be Really Secure? A Socratic Dialogue. Computers, Privacy and Data Protection 2011: 345-360
2000 – 2009
- 2006
- [c2]Ella Kolkowska:
Values for Information System Security in an Academic Environment: A Pilot Study. AMCIS 2006: 411 - 2005
- [c1]Ella Kolkowska:
Value Sensitive Approach to IS Security - A Socio-Organizational Perspective. AMCIS 2005: 442
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint