From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Misinformation Sharing on Twitter During Zika: An Investigation of the Effect of Threat and Distance., , , и . IEEE Internet Comput., 25 (1): 31-39 (2021)The Egyptian protest movement in the twittersphere: An investigation of dual sentiment pathways of communication., , и . Int. J. Inf. Manag., (2021)Design principles for critical incident response systems., , , и . Inf. Syst. E Bus. Manag., 5 (3): 201-227 (2007)An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security., , и . Decis. Support Syst., 52 (2): 395-405 (2012)Relative Performance of Incentive Mechanisms: Computational Modeling and Simulation of Delegated Investment Decisions., , и . Manag. Sci., 49 (2): 160-178 (2003)On the Two Factors Affecting Information Systems Success in the Extreme Event Context., , , и . WEB, том 52 из Lecture Notes in Business Information Processing, стр. 181-185. Springer, (2009)Critical Success Factors to Improve Compliance with Campus Emergency Notifications., , , , и . AMCIS, Association for Information Systems, (2011)Managing IT Sourcing Relationships Using Service Level Agreements: A Relational Exchange Theory Approach., , , , и . AMCIS, стр. 207. Association for Information Systems, (2003)The Effect of Third Party Seals on Consumers' Repurchase Process in Online Shopping: A Multi-Group Analysis., , и . AMCIS, стр. 84. Association for Information Systems, (2007)A Framework for Understanding Minority Students' Cyber Security Career Interests., , , , и . AMCIS, стр. 413. Association for Information Systems, (2006)