Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Assessing IT Security Investment Portfolios., , , and . AMCIS, page 398. Association for Information Systems, (2006)Determinants of open source software project success: A longitudinal study., , and . Decis. Support Syst., 46 (2): 576-585 (2009)Information technology and interorganizational learning: An investigation of knowledge exploration and exploitation processes., , , and . Inf. Manag., 52 (8): 998-1011 (2015)Application of Survival Model to Understand Open Source Software Release., , and . Pac. Asia J. Assoc. Inf. Syst., 7 (2): 1 (2015)Understanding Differences between Adopters and Nonadopters of Information Technology Project portfolio Management., , and . Int. J. Inf. Technol. Decis. Mak., 12 (6): 1151-1174 (2013)A Study of the Value and Impact of B2B E-Commerce: The Case of Web-Based Procurement., and . Int. J. Electron. Commer., 6 (4): 19-40 (2002)Improving service in the presence of surge traffic: a K-policy voluntary flushing queueing system., , , and . Ann. Oper. Res., 295 (1): 411-423 (2020)Association between Patient Portal use and Office Visits., , and . J. Medical Syst., 45 (7): 74 (2021)Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis., , , and . J. Manag. Inf. Syst., 28 (4): 305-338 (2012)The sustainability of B2B e-marketplaces: Ownership structure, market competition, and prior buyer-seller connections., , , and . Decis. Support Syst., 47 (2): 105-114 (2009)