default search action
Tero Vartiainen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Sanna Kainulainen, Tuure Tuunanen, Tero Vartiainen:
Requirements Risk Management for Continuous Development: Organisational Needs. Australas. J. Inf. Syst. 28 (2024) - [j18]Emmanuel Anti, Tero Vartiainen:
Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review. Commun. Assoc. Inf. Syst. 55: 4 (2024) - [c36]Anatoly Shcherba, Emil Faure, Tero Vartiainen, Viktor Khaliavka:
Primitive Elements in the Finite Field of Square Matrices of Order 2 for Cryptographic Applications. ITEST (2) 2024: 250-265 - [e3]Emil Faure, Yurii Tryus, Tero Vartiainen, Olena Danchenko, Maksym Bondarenko, Constantine Bazilo, Grygoriy Zaspa:
Information Technology for Education, Science, and Technics - Proceedings of ITEST 2024, Volume 1, Cherkasy, Ukraine, 23-24 May 2024. Lecture Notes on Data Engineering and Communications Technologies 221, Springer 2024, ISBN 978-3-031-71800-7 [contents] - [e2]Emil Faure, Yurii Tryus, Tero Vartiainen, Olena Danchenko, Maksym Bondarenko, Constantine Bazilo, Grygoriy Zaspa:
Information Technology for Education, Science, and Technics - Proceedings of ITEST 2024, Volume 2, Cherkasy, Ukraine, 23-24 May 2024. Lecture Notes on Data Engineering and Communications Technologies 222, Springer 2024, ISBN 978-3-031-71803-8 [contents] - [e1]Jussi Kasurinen, Tero Päivärinta, Tero Vartiainen:
Proceedings of the Annual Doctoral Symposium of Computer Science 2024, Vaasa, Finland, June, 2024. CEUR Workshop Proceedings 3776, CEUR-WS.org 2024 [contents] - [i3]Tero Vartiainen, Duong Dang, Mike Mekkanen, Emmanuel Anti:
Development of Cybersecurity Simulator-Based Platform for the Protection of Critical Infrastructures. CoRR abs/2405.01046 (2024) - [i2]Duong Dang, Tero Vartiainen, Mike Mekkanen:
Cyber Security in Energy Informatics: A Non-technical Perspective. CoRR abs/2405.01867 (2024) - 2023
- [c35]Juho-Pekka Mäkipää, Tero Vartiainen:
How to Incorporate Accessibility to Design Principles for IS Artefacts? EJC 2023: 167-178 - [c34]Juha-Matti Herrala, Tero Vartiainen, Tiina Koskelainen:
How Personal Finance Management Systems Emancipate and Oppress Young People. HICSS 2023: 5542-5550 - [i1]Marcelo Godoy Simões, Mohammed S. Elmusrati, Tero Vartiainen, Mike Mekkanen, Mazaher Karimi, Sayawu Diaba, Emmanuel Anti, Wilson Lopes:
Enhancing data security against cyberattacks in artificial intelligence based smartgrid systems with crypto agility. CoRR abs/2305.11652 (2023) - 2022
- [j17]Juho-Pekka Mäkipää, Johanna Norrgård, Tero Vartiainen:
Factors Affecting the Accessibility of IT Artifacts: A Systematic Review. Commun. Assoc. Inf. Syst. 51: 26 (2022) - [j16]Tuure Tuunanen, Tero Vartiainen, Sanna Kainulainen, Mehdi Ebrahim:
Development of an Agile Requirements Risk Prioritization Method: A Design Science Research Study. Commun. Assoc. Inf. Syst. 52: 24 (2022) - [c33]Duong Dang, Samuli Pekkola, Son Pham, Tero Vartiainen:
Platformization Practices of Health Information Systems: A Case of National eHealth Platforms. HICSS 2022: 1-10 - [c32]Bahaa Eltahawy, Maria Valliou, Jirapa Kamsamrong, Andrejs Romanovs, Tero Vartiainen, Mike Mekkanen:
Towards A Massive Open Online Course for Cybersecurity in Smart Grids - A Roadmap Strategy. ISGT-Europe 2022: 1-6 - [c31]Esteban Guerrero, Tero Vartiainen, Panu Kalmi:
What if gamified software is fully proactive? Towards autonomy-related design principles. PERSUASIVE (Adjunct) 2022 - 2021
- [c30]Björn M. Siemers, Shadi Attarha, Jirapa Kamsamrong, Michael Brand, Maria Valliou, Ruta Pirta-Dreimane, Janis Grabis, Nadezhda Kunicina, Mike Mekkanen, Tero Vartiainen, Sebastian Lehnhoff:
Modern Trends and Skill Gaps of Cyber Security in Smart Grid : Invited Paper. EUROCON 2021: 565-570 - [c29]Andrejs Romanovs, Jana Bikovska, Janis Peksa, Tero Vartiainen, Panos Kotsampopoulos, Bahaa Eltahawy, Sebastian Lehnhoff, Michael Brand, Julija Strebko:
State of the Art in Cybersecurity and Smart Grid Education. EUROCON 2021: 571-576 - [c28]Duong Dang, Tero Vartiainen, Mike Mekkanen:
Towards Establishing Principles for Designing Cybersecurity Simulations of Cyber-Physical Artefacts in Real-Time Simulation. ISD 2021 - 2020
- [c27]Duong Dang, Tero Vartiainen:
Changing Patterns in the Process of Digital Transformation Initiative in Established Firms: The Case of an Energy Sector Company. PACIS 2020: 98 - [c26]Rasheed Omobolaji Alabi, Tero Vartiainen, Mohammed Elmusrati:
Machine Learning for Prognosis of Oral Cancer: What Are the Ethical Challenges? Tethics 2020: 1-22
2010 – 2019
- 2019
- [c25]Dinh Duong Dang, Tero Vartiainen, Samuli Pekkola:
Patterns of Enterprise Architecture Adoption in the Public Sector: a Resource-based Perspective. ECIS 2019 - [c24]Duong Dang, Tero Vartiainen:
Digital strategy patterns in information systems research. PACIS 2019: 83 - 2018
- [j15]Hadi Ghanbari, Tero Vartiainen, Mikko T. Siponen:
Omission of Quality Software Development Practices: A Systematic Literature Review. ACM Comput. Surv. 51(2): 38:1-38:27 (2018) - [j14]Toni Taipalus, Mikko T. Siponen, Tero Vartiainen:
Errors and Complications in SQL Query Formulation. ACM Trans. Comput. Educ. 18(3): 15:1-15:29 (2018) - [c23]Jarkko Kokko, Tero Vartiainen, Tuure Tuunanen:
Value Co-Creation and Co-Destruction in Online Video Games: An Exploratory Study and Implications for Future Research. HICSS 2018: 1-10 - 2016
- [c22]Tero Vartiainen, Olli I. Heimo, Kai K. Kimppa:
A Participatory Design Program for Making Ethical Choices in Client Vendor Relations in ISD. HCC 2016: 116-129 - [c21]Tero Vartiainen, Tuure Tuunanen:
Value Co-Creation and Co-Destruction in an IS Artifact: Contradictions of Geocaching. HICSS 2016: 1266-1275 - 2015
- [j13]Kirsi Liikamaa, Tero Vartiainen, Maritta Pirhonen, Heli Aramo-Immonen:
Replacing Project Managers in Information Technology Projects: Contradictions that Explain the Phenomenon. Int. J. Hum. Cap. Inf. Technol. Prof. 6(3): 1-19 (2015) - [c20]Johanna Hänninen, Tuure Tuunanen, Tero Vartiainen:
Value Co-Creation for Cyber-Physical Systems in Mining and Construction Industry. AMCIS 2015 - [c19]Tuure Tuunanen, Tero Vartiainen, Mehdi Ebrahim, Murong Liang:
Continuous Requirements Risk Profiling in Information Systems Development. HICSS 2015: 4019-4028 - [c18]Tero Vartiainen:
How the Replacement of the Project Manager Unfolds in IS Projects. SCIS 2015: 177-189 - 2013
- [c17]Tero Vartiainen:
Project-Based Learning in Industry-University Collaboration - Three Normative Models. AMCIS 2013 - [c16]Tero Vartiainen, Tuure Tuunanen:
Co-creation of Value for IT-Enabled Services: A Case of Geocaching. HICSS 2013: 1093-1102 - 2012
- [c15]Tero Vartiainen:
Project-Based IT Companies and Three Corporate Moral Dilemmas. AMCIS 2012 - [c14]Tero Vartiainen, Maritta Pirhonen, Heli Aramo-Immonen, Kirsi Liikamaa:
Replacement of Project Manager during IT Projects - A Research Agenda. AMCIS 2012 - [c13]Tero Vartiainen, Mikko T. Siponen:
What Makes Information System Developers Produce Defective Information Systems For Their Clients? PACIS 2012: 107 - 2011
- [j12]Tero Vartiainen, Mikko T. Siponen, Liisa Myyry:
The Effects of Teaching the Universality Thesis on Students' Integrative Complexity of Thought. J. Inf. Syst. Educ. 22(3): 261 (2011) - [c12]Tero Vartiainen, Mikko T. Siponen, Gregory D. Moody:
Gray-Area Phenomenon In Information Systems Development: A Call For Research. PACIS 2011: 198 - 2010
- [j11]Tero Vartiainen:
Moral conflicts in project-based learning in ISD. Inf. Technol. People 23(3): 265-280 (2010) - [j10]Tero Vartiainen, Mikko T. Siponen:
On IS Students' Intentions to Use Theories of Ethics in Resolving Moral Conflicts. J. Inf. Syst. Educ. 21(1): 33-42 (2010) - [c11]Tero Vartiainen, Heli Aramo-Immonen, Kirsi Liikamaa:
Replacing Project Manager: Reasons of Replacement Interpreted through the Activity Theory. PACIS 2010: 182
2000 – 2009
- 2009
- [j9]Päivi Tynjälä, Maritta Pirhonen, Tero Vartiainen, Laura Helle:
Educating IT Project Managers through Project-Based Learning: A Working-Life Perspective. Commun. Assoc. Inf. Syst. 24: 16 (2009) - [j8]Liisa Myyry, Mikko T. Siponen, Seppo Pahnila, Tero Vartiainen, Anthony Vance:
What levels of moral reasoning and values explain adherence to information security rules? An empirical study. Eur. J. Inf. Syst. 18(2): 126-139 (2009) - [j7]Tero Vartiainen:
Moral Problems Perceived by Industry in Collaboration with a Student Group: Balancing between Beneficial Objectives and Upholding Relations. J. Inf. Syst. Educ. 20(1): 51-66 (2009) - [c10]Tero Vartiainen:
A Social Contract for University-Industry Collaboration: A Case of Project-Based Learning Environment. ISD 2009: 99-110 - [c9]Tero Vartiainen, Heli Aramo-Immonen, Jari Juhani Jussila, Maritta Pirhonen, Kirsi Liikamaa:
Replacement of the Project Manager Reflected Through Activity Theory and Work-System Theory. ISD 2009: 111-121 - 2008
- [c8]Tero Vartiainen:
Four Levels of Moral Conflict in ISD. ISD 2008: 811-819 - 2007
- [j6]Tero Vartiainen:
Moral Conflicts in Teaching Project Work: A Job Burdened by Role Strains. Commun. Assoc. Inf. Syst. 20: 43 (2007) - [j5]Mikko T. Siponen, Tero Vartiainen:
Unauthorized copying of software: an empirical study of reasons for and against. SIGCAS Comput. Soc. 37(1): 30-43 (2007) - [c7]Maritta Pirhonen, Tero Vartiainen:
Replacing the Project Manager in Information System Projects: What Knowledge Should be Transferred? AMCIS 2007: 47 - [c6]Tero Vartiainen, Maritta Pirhonen:
Morally Successful IT Projects. ISD (2) 2007: 601-610 - 2006
- [c5]Jarmo Sarkkinen, Tero Vartiainen:
Developing social responsibility of members of ISD project teams. ECIS 2006: 1073-1084 - [c4]Tero Vartiainen:
Moral conflicts perceived by students of a project course. Koli Calling 2006: 77-84 - 2005
- [j4]Mikko T. Siponen, Tero Vartiainen:
Attitudes to and factors affecting unauthorized copying of computer software in Finland. Behav. Inf. Technol. 24(4): 249-257 (2005) - 2004
- [j3]Mikko T. Siponen, Tero Vartiainen:
Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice. Inf. Syst. J. 14(4): 387-407 (2004) - [c3]Tero Vartiainen, Mikko T. Siponen:
Defects, Usefulness and Usability of Ethics Theories in IS Ethics Education. ICEIS (5) 2004: 179-186 - 2003
- [j2]Tero Vartiainen:
A Study of Computer Science Students' Ethical Attitudes and Its Implications to. SIGCAS Comput. Soc. 33(3): 3 (2003) - [c2]Tero Vartiainen, Mikko T. Siponen:
Universality thesis in IS ethics education - an empirical study. ECIS 2003: 2036-2043 - 2002
- [j1]Mikko T. Siponen, Tero Vartiainen:
Teaching End-User Ethics: Issues and a Solution Based on Universalizability. Commun. Assoc. Inf. Syst. 8: 29 (2002) - 2001
- [c1]Mikko T. Siponen, Tero Vartiainen:
End-User Ethics Teaching: Issues and a Solution based on Universalization. HICSS 2001
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint