Author of the publication

Market Reactions to Information Security Breach Announcements: An Empirical Analysis.

, , and . Int. J. Electron. Commer., 12 (1): 69-91 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Brainstorming, Negotiating and Learning in Group Decision Support Systems: An Evolutionary Approach., and . HICSS, IEEE Computer Society, (1999)Simulating Sellers' Behavior in a Reverse Auction B2B Exchange., , , , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 365-374. Springer, (2003)Leadership and group search in group decision support systems., and . Decis. Support Syst., 30 (1): 73-82 (2000)Reverse Auctions with Multiple Reinforcement Learning Agents., , and . Decis. Sci., 39 (1): 33-63 (2008)Evolution in Groups: A Genetic Algorithm Approach to Group Decision Support Systems., and . Inf. Technol. Manag., 3 (3): 213-227 (2002)Learning genetic algorithm parameters using hidden Markov models., and . Eur. J. Oper. Res., 175 (2): 806-820 (2006)Simulating sellers in online exchanges., , and . Decis. Support Syst., 41 (2): 500-513 (2006)Modeling search in group decision support systems., and . IEEE Trans. Syst. Man Cybern. Part C, 34 (3): 237-244 (2004)The State of Risk Assessment Practices in Information Security: An Exploratory Investigation., and . J. Organ. Comput. Electron. Commer., 18 (4): 255-277 (2008)Software Vulnerabilities: Open Source versus Proprietary Software Security., , and . AMCIS, page 428. Association for Information Systems, (2005)