Author of the publication

Decisions making in information security outsourcing: Impact of complementary and substitutable firms.

, , , and . Comput. Ind. Eng., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A relief supplies purchasing model via option contracts., , , and . Comput. Ind. Eng., (2019)On Loan-to-Value Ratios of Inventory Financing with Doubly Stochastic Poisson Default Processes., , , and . APSCC, page 663-666. IEEE Computer Society, (2006)Optimal versioning strategy of enterprise software considering the customer cost-acceptance level., , , , and . Kybernetes, 52 (3): 997-1026 (2023)How Paternalistic Leaders Motivate Employees' Information Security Policy Compliance? Building Climate or Applying Sanctions., , and . PACIS, page 42. (2019)Optimal versioning strategies for software firms in the competitive environment., , and . Int. J. Prod. Res., 59 (22): 6881-6897 (2021)Managing Information Security Outsourcing in a Dynamic Cooperation Environment., , , and . J. Assoc. Inf. Syst., 22 (3): 2 (2021)Optimal policy for inventory systems with capacity commitment and fixed ordering costs., , , and . Oper. Res. Lett., 48 (1): 9-17 (2020)On the value of information sharing in the presence of information errors., , , and . Eur. J. Oper. Res., 294 (3): 1139-1152 (2021)Game of information security investment: Impact of attack types and network vulnerability., , , and . Expert Syst. Appl., 42 (15-16): 6132-6146 (2015)AdaEnsemble Learning Approach for Metro Passenger Flow Forecasting., , , and . CoRR, (2020)