Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Customer Demand Reactions Impact Technology Innovation and Security., , , and . ACM Trans. Manag. Inf. Syst., 13 (3): 32:1-32:17 (2022)Research Note - Information Technology, Contract Completeness, and Buyer-Supplier Relationships., , and . Inf. Syst. Res., 17 (2): 180-193 (2006)How Much to Share with Third Parties? User Privacy Concerns and Website Dilemmas., , , , and . MIS Q., (2018)Learning Software Project Management From Analyzing Q&A's in the Stack Exchange., , , , and . IEEE Access, (2023)Wiki deployment in corporate settings., , , and . IEEE Technol. Soc. Mag., 28 (2): 57-64 (2009)Risk Mitigation Decisions for IT Security., , , and . ACM Trans. Manag. Inf. Syst., 5 (1): 5:1-5:21 (2014)Economics of Data Protection Policies., , , , and . ICIS, Association for Information Systems, (2020)Impact of Bot Involvement in an Incentivized Blockchain-Based Online Social Media Platform., , , and . J. Manag. Inf. Syst., 40 (3): 778-806 (2023)Business-to-Consumer Platform Strategy: How Vendor Certification Changes Platform and Seller Incentives., , , and . ACM Trans. Manag. Inf. Syst., 8 (2-3): 6:1-6:42 (2017)Market Impact on IT Security Spending., , and . WEIS, (2010)