Author of the publication

Center for Army Lessons Learned: Knowledge Application Process in the Military.

, and . IJKM, 2 (2): 69-82 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile content contribution and retrieval: An exploratory study using the uses and gratifications paradigm, , and . Information Processing and Management, 48 (1): 13-22 (January 2012)A study of manipulative and authentic negative reviews., and . ICUIMC, page 76:1-76:6. ACM, (2014)Rumor verifications on Facebook: Click speech of likes, comments and shares., and . ICDIM, page 257-262. IEEE, (2017)Gamification of Community Policing: SpamCombat., and . AMT, volume 8210 of Lecture Notes in Computer Science, page 74-83. Springer, (2013)Analysis of Facebook Comments in Response to Counter Rumors., , and . PACIS, page 130. (2017)Is it real? A study on detecting deepfake videos., , , , and . ASIST, volume 57 of Proc. Assoc. Inf. Sci. Technol., Wiley, (2020)Knowledge management and innovation., , and . Data Inf. Manag., 6 (3): 100018 (2022)Analyzing Users' Trust for Online Health Rumors., and . ICADL, volume 9469 of Lecture Notes in Computer Science, page 33-38. Springer, (2015)Interlocking Directorates and Profitability: A Social Network Analysis of Fortune 500 Companies., and . ASONAM, page 1105-1110. IEEE Computer Society, (2012)Online "helpful" Lies: An Empirical Study of Helpfulness in Fake and Authentic Online Reviews., and . iConference (1), volume 13192 of Lecture Notes in Computer Science, page 91-99. Springer, (2022)