Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information security risk analysis model using fuzzy decision theory., , , , and . Int. J. Inf. Manag., 36 (1): 25-34 (2016)A Typology of Relational Attitude in IT Outsourcing: An Analysis on the Contractor's Perspective., , , and . WorldCIST (3), volume 1367 of Advances in Intelligent Systems and Computing, page 295-304. Springer, (2021)A strategic conflict analysis in IT outsourcing using the graph model for conflict resolution., , , and . J. Enterp. Inf. Manag., 33 (6): 1581-1598 (2020)Information technology outsourcing relationship integration: a critical success factors study based on ranking problems (P.γ) and correlation analysis., , and . Expert Syst. J. Knowl. Eng., (2018)The Roles of Big Data in the Decision-Support Process: An Empirical Investigation., , and . ICDSST, volume 216 of Lecture Notes in Business Information Processing, page 10-21. Springer, (2015)Group Decision Approach to Adopt Green IT Practices Based on S.W.O.T Analysis., , , , and . SMC, page 747-751. IEEE, (2013)Selection of a Business Process Management system: An analysis based on a Multicriteria problem., , , and . SMC, page 295-299. IEEE, (2014)Analysis of IT Outsourcing Services Failures Based on an Existing Risk Model., , , , and . SMC, page 286-290. IEEE, (2015)An Analysis of and Perspective on the Information Security Maturity Model: a case study of a Public and a Private Sector Company., , , and . AMCIS, Association for Information Systems, (2012)The Main Critical Success Factors of Contractual and Relational Governances in Outsourcing Relationships., , and . WorldCIST (1), volume 444 of Advances in Intelligent Systems and Computing, page 3-12. Springer, (2016)