Author of the publication

An application of agent-based simulation to knowledge sharing.

, , , and . Decis. Support Syst., 46 (2): 532-541 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Market Reaction to Data Security Breaches: A Screening Perspective., , , and . Commun. Assoc. Inf. Syst., (2024)The Role of Corporate Reputation and Crisis Response Strategies in Data Breach Management., , and . J. Manag. Inf. Syst., 35 (2): 683-714 (2018)An application of agent-based simulation to knowledge sharing., , , and . Decis. Support Syst., 46 (2): 532-541 (2009)Continued usage intention of multifunctional friend networking services: A test of a dual-process model using Facebook., , and . Decis. Support Syst., (2014)Stock market reaction to data breaches: The moderating role of corporate social responsibility., , and . CyberSA, page 1-2. IEEE, (2017)An experimental investigation into the effects of information revelation in multi-attribute reverse auctions., , and . Behav. Inf. Technol., 31 (6): 631-644 (2012)Information security policy noncompliance: An integrative social influence model., , and . Inf. Syst. J., 30 (2): 220-269 (2020)Understanding the Cost associated with Data Security Breaches., , and . PACIS, page 386. (2014)Does IT outsourcing deliver economic value to firms?, , and . J. Strateg. Inf. Syst., 19 (2): 109-123 (2010)The Aftermath of Information Technology Outsourcing: An Empirical Study of Firm Performance Following Outsourcing Decisions., , , and . J. Inf. Syst., 22 (1): 125-159 (2008)