Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Restoring clinical information system operations post data disaster: the role of IT investment, integration and interoperability., , and . Ind. Manag. Data Syst., 121 (12): 2672-2696 (2021)A Cybersecurity Executive DBA?, and . J. Inf. Technol. Educ. Discuss. Cases, (2017)A data driven framework for early prediction of customer response to promotions., and . AMCIS, Association for Information Systems, (2015)Detection and Classification of Attacks on IoT Networks., , , and . AMCIS, Association for Information Systems, (2018)Quantifying the impacts of online fake news on the equity value of social media platforms - Evidence from Twitter., and . Int. J. Inf. Manag., (2022)Machine learning for psychiatric patient triaging: an investigation of cascading classifiers., , , , , and . J. Am. Medical Informatics Assoc., 25 (11): 1481-1487 (2018)Extreme value theory and neural network for catastrophic fall prediction: a study of year 2008-2009., , and . IJIDS, 6 (2): 193-210 (2014)The implications of patient data security considerations for EHR interoperability and downtime recovery., , and . AMCIS, Association for Information Systems, (2019)Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol., , , , , , , , , and 1 other author(s). ACIS-ICIS, page 575-580. IEEE Computer Society, (2008)On a deadlock and performance analysis of ALBR and DAR algorithm on X-Torus topology by optimal utilization of Cross Links and minimal lookups., , and . J. Supercomput., 59 (3): 1252-1288 (2012)