Author of the publication

Theoretical model of purchase and repurchase in internet shopping: evidence from japanese online customers.

, , and . ICEC, volume 258 of ACM International Conference Proceeding Series, page 243-252. ACM, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What keeps online customers repurchasing through the internet?, , and . SIGecom Exch., 6 (2): 47-57 (2007)A Psychological Analysis on the Meaning of "Reliance", , , , and . Tohoku Psychologica Folia, 46 (1-4): 111--117 (April 1987)A Novel Mental State Model of Social Perception of Brand Crisis from an Entertainment Perspective., , , and . SBP, volume 9021 of Lecture Notes in Computer Science, page 153-162. Springer, (2015)Critical Success Factors of Internet Shopping: The Case of Japan., , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 98-109. Springer, (2007)A Cloud-Based Multi-functional e-Meeting System by Flash-Based Multimedia Technology for Higher Education on the WebELS System., , , , and . PCM, volume 8294 of Lecture Notes in Computer Science, page 1-12. Springer, (2013)An Exploratory Study on the Influence of Guidelines on Crowdfunding Projects in the Ethereum Blockchain Platform., and . SocInfo (2), volume 10540 of Lecture Notes in Computer Science, page 347-354. Springer, (2017)Perception-Based Resilience: Accounting for the Impact of Human Perception on Resilience Thinking., , , and . BDCloud, page 547-554. IEEE Computer Society, (2014)The impact of personality on acceptance of privacy-sensitive technologies: A comparative study of RFID and finger vein authentication systems., , and . ISTAS, page 111-122. IEEE, (2010)Comparative advantage model founded on enterprise architecture in Japanese firms., and . Int. J. Bus. Inf. Syst., 7 (3): 341-364 (2011)Cyber security problem based on Multi-Objective Distributed Constraint Optimization technique., , , , , and . DSN Workshops, page 1-7. IEEE Computer Society, (2013)