Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An investigation of the word-processing software market war in South Korea: A game-theoretic approach., , and . Inf. Manag., 47 (2): 96-101 (2010)Online auction: the effects of transaction probability and listing price on a seller's decision-making behavior., , and . Electron. Mark., 20 (1): 67-79 (2010)Examining the intended and unintended consequences of organisational privacy safeguards., , , and . Eur. J. Inf. Syst., 26 (1): 37-65 (2017)An Optimization Routing Algorithm for Green Communication in Underground Mines., , , , , and . Sensors, 18 (6): 1950 (2018)Privacy in the Age of Big Data: The Challenges and Opportunities for Privacy Research., , , , , , and . ICIS, Association for Information Systems, (2014)LS-SVM Based Two Step Commercial Short-Term Load Prediction., and . CSAE, page 7:1-7:6. ACM, (2019)Facebook apps and tagging: The trade-off between personal privacy and engaging with friends., , , and . J. Assoc. Inf. Sci. Technol., 66 (9): 1883-1896 (2015)From Contextualizing to Context Theorizing: Assessing Context Effects in Privacy Research., and . Manag. Sci., 68 (10): 7383-7401 (2022)The effects of privacy concerns and personal innovativeness on potential and experienced customers' adoption of location-based services., and . Electron. Mark., 19 (2-3): 137-149 (2009)Chinese Tourists in Malaysia: An Analysis of Spatio-Temporal Behavior Based on Tourism Digital Footprints., , and . IEEE Access, (2022)