Author of the publication

Managing Enterprise Risks of Technological Systems: An Exploratory Empirical Analysis of Vulnerability Characteristics as Drivers of Exploit Publication.

, and . Decis. Sci., 47 (6): 1073-1102 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open source software licenses: Strong-copyleft, non-copyleft, or somewhere in between?, , and . Decis. Support Syst., 52 (1): 199-206 (2011)IT Recruiting Practices as Retention Predictors: Can Recruiters Make a Difference to Potential IT Employees?, and . AMCIS, page 458. Association for Information Systems, (2004)A Qualitative Analysis Of The Role of Users, Vendors, and Governments in the Standards Development Process.. Commun. Assoc. Inf. Syst., (2006)Artificial Intelligence and Machine Learning in Cybersecurity: Applications, Challenges, and Opportunities for MIS Academics., , and . Commun. Assoc. Inf. Syst., (2022)Understanding Open Source Software: A Research Classification Framework., , and . Commun. Assoc. Inf. Syst., (2006)Impact of Web-based e-Commerce on Channel Strategy in Retailing., , and . Int. J. Electron. Commer., 8 (3): 103-130 (2004)Revisit the Debate on Intermediation, Disintermediation and Reintermediation due to E-Commerce., and . Electron. Mark., 13 (2): 153-162 (2003)Challenges to Cybersecurity: Current State of Affairs.. Commun. Assoc. Inf. Syst., (2018)Determinants of open source software project success: A longitudinal study., , and . Decis. Support Syst., 46 (2): 576-585 (2009)Application of Survival Model to Understand Open Source Software Release., , and . Pac. Asia J. Assoc. Inf. Syst., 7 (2): 1 (2015)