Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Monte Carlo via Bandit Allocation (extended version), , , and . ICML, page 1944--1952. (May 2014)Top management support of enterprise systems implementations., , and . J. Inf. Technol., 24 (1): 55-80 (2009)Intuition, risk, and the formation of online trust., and . Comput. Hum. Behav., (2015)Should I Stay or Should I Go? Worker Commitment to Virtual Organizations., and . HICSS, IEEE Computer Society, (2006)Understanding Cybercrime.. HICSS, page 1-10. IEEE Computer Society, (2010)A Longitudinal Analysis of GSS Use in the Case Method Classroom., , and . HICSS, page 35. IEEE Computer Society, (2002)An Exploratory Longitudinal Analysis of GSS Use in the Case Method Classroom., , and . J. Comput. Inf. Syst., 43 (1): 70-80 (2002)External versus internal source of calcium during the gelation of alginate beads for DNA encapsulation, , , and . Biotechnol. Bioeng., 57 (4): 438 -- 446 (February 1998)The Role of Information Technology in Technology-Mediated Learning: A Review of the Past for the Future., , and . J. Inf. Syst. Educ., 18 (2): 183-192 (2007)The IT Artifact and Telecommuting., , , , and . Virtuality and Virtualization, volume 236 of IFIP, page 391-395. Springer, (2007)