Author of the publication

The Optimal Number of Versions: Why Does Goldilocks Pricing Work for Information Goods?

, , and . J. Manag. Inf. Syst., 24 (3): 167-191 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Trading, Pattern Recognition, and Expert Systems.. DATA BASE, 18 (4): 61 (1987)Gain and Loss in System Switching: A Behavioral Economics View to Understand the Joint Effects of System Usage Performance on User Satisfaction., and . PACIS, page 276. (2013)Risk of using pirated software and its impact on software protection strategies., , and . Decis. Support Syst., 45 (3): 504-516 (2008)Understanding continued information technology usage behavior: A comparison of three models in the context of mobile internet., , and . Decis. Support Syst., 42 (3): 1819-1834 (2006)The effects of post-adoption beliefs on the expectation-confirmation model for information technology continuance., , and . Int. J. Hum. Comput. Stud., 64 (9): 799-810 (2006)Timing of Adaptive Web Personalization and Its Effects on Online Consumer Behavior., , and . Inf. Syst. Res., 22 (3): 660-679 (2011)Research Note - Applying the Randomized Response Technique to Elicit Truthful Responses to Sensitive Questions in IS Research: The Case of Software Piracy Behavior., , and . Inf. Syst. Res., 21 (4): 941-959 (2010)A Smart Card Based Internet Micropayment Infrastructure: Technical Development and User Adoption., and . J. Organ. Comput. Electron. Commer., 17 (2): 145-173 (2007)An Affective Model for Unauthorized Sharing of Software., and . PACIS, page 35. AISeL, (2010)Intellectual Property Protection for Electronic Commerce Applications., , and . J. Electron. Commer. Res., 5 (1): 1-13 (2004)