Author of the publication

Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets.

, , and . J. Manag. Inf. Syst., 37 (1): 191-216 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber-physical Systems (CPS) Security: State of the Art and Research Opportunities for Information Systems Academics., , and . Commun. Assoc. Inf. Syst., (2020)Application of Survival Model to Understand Open Source Software Release., , and . Pac. Asia J. Assoc. Inf. Syst., 7 (2): 1 (2015)Determinants of open source software project success: A longitudinal study., , and . Decis. Support Syst., 46 (2): 576-585 (2009)Buyers' Choice of Online Search Strategy and Its Managerial Implications., , and . J. Manag. Inf. Syst., 23 (1): 211-238 (2006)Estimating the Contextual Risk of Data Breach: An Empirical Approach., and . J. Manag. Inf. Syst., 32 (2): 314-341 (2015)Revisit the Debate on Intermediation, Disintermediation and Reintermediation due to E-Commerce., and . Electron. Mark., 13 (2): 153-162 (2003)Impact of Web-based e-Commerce on Channel Strategy in Retailing., , and . Int. J. Electron. Commer., 8 (3): 103-130 (2004)Challenges to Cybersecurity: Current State of Affairs.. Commun. Assoc. Inf. Syst., (2018)IT Recruiting Practices as Retention Predictors: Can Recruiters Make a Difference to Potential IT Employees?, and . AMCIS, page 458. Association for Information Systems, (2004)Open source software licenses: Strong-copyleft, non-copyleft, or somewhere in between?, , and . Decis. Support Syst., 52 (1): 199-206 (2011)