From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Outsourcing Information Security: Contracting Issues and Security Implications., , и . WEIS, (2010)Selecting a Customization Strategy Under Competition: Mass Customization, Targeted Mass Customization, and Product Proliferation., , и . IEEE Trans. Engineering Management, 54 (1): 12-28 (2007)Competitive Bundling in Information Markets: A Seller-Side Analysis., и . MIS Q., 40 (1): 111-131 (2016)Configuration of Intrusion Detection Systems: A Comparison of Decision and Game Theoretic Approaches., и . ICIS, стр. 692-705. Association for Information Systems, (2003)Economics of Cloud Security., , и . AMCIS, Association for Information Systems, (2015)Competitive Mobile Marketing and its Impact on the Mobile Eco System., и . ECIS, стр. Research Paper 10. (2016)Optimal Design of Information Technology Security Architecture., , и . ICIS, стр. 74. Association for Information Systems, (2002)Membership-Based Free Shipping Programs: A New Vehicle to Gain Competitive Advantage for Online Retailers?, , и . ICIS, Association for Information Systems, (2018)A Space Mission to Map the Entire Observable Universe using the CMB as a Backlight, , , , , , , , , и 15 other автор(ы). (2019)cite arxiv:1909.01592Comment: Science White Paper submitted in response to the ESA Voyage 2050 call, 20 pages + title page + references.Mobile Consumer Scanning Technology: A Replacement for Interorganizational Information Systems for Demand Information Learning in Supply Chains?, , , , и . Inf. Syst. Res., 32 (4): 1431-1449 (2021)