Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Coping with BYOD Security Threat: From Management Perspective., and . AMCIS, Association for Information Systems, (2015)Meformer vs. Informer: Influencer type and Follower Behavioral Intentions., , and . AMCIS, Association for Information Systems, (2019)Drishti: a sense-plan-act extension to open mHealth framework using FHIR., , , and . SEH@ICSE, page 49-52. IEEE / ACM, (2019)Examining situational continuous mobile game play behavior from the perspectives of diversion and flow experience., , , and . Inf. Technol. People, 31 (4): 948-965 (2018)Online Dispute Resolution services for electronic markets: a user centric research agenda., and . Int. J. Electron. Bus., 5 (6): 590-603 (2007)Comparison of three algorithms for real-time pedestrian state estimation - supporting a monitoring dashboard for large-scale events., , , and . ITSC, page 2601-2606. IEEE, (2016)User adoption and purchasing intention after free trial: an empirical study of mobile newspapers., , , and . Inf. Syst. E Bus. Manag., 11 (2): 189-210 (2013)Supply chain management information systems capabilities. An exploratory study of electronics manufacturers., , and . Inf. Syst. E Bus. Manag., 2 (2-3): 207-222 (2004)M-healthcare for patient self-management: a case for diabetics., , and . Int. J. Electron. Heal., 1 (2): 221-241 (2004)Traffic parameter estimation on motorway networks by combination of filtering techniques., , and . SMC, page 3558-3562. IEEE, (2009)