Author of the publication

Hiding Sensitive Itemsets in Shared Transactional Databases: Minimizing the Number of Items Removed.

, , and . ICIS, Association for Information Systems, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Support Forums and Software Vendor's Pricing Strategy., , and . Inf. Syst. Res., 32 (2): 653-669 (2021)The Impact of Business Analytics Strategy on Social, Mobile, and Cloud Computing Adoption., , , and . ICIS, Association for Information Systems, (2014)Do Recommender Systems Always Benefit Firms by Reducing Consumer Search Effort?, , and . ICIS, page 95. Association for Information Systems, (2009)Recommendations Using Information from Multiple Association Rules: A Probabilistic Approach., , and . Inf. Syst. Res., 26 (3): 532-551 (2015)Allocating Shared Resources Optimally for Call Center Operations and Knowledge Management Activities., , and . ICIS, Association for Information Systems, (2012)Hiding Sensitive Itemsets in Shared Transactional Databases: Minimizing the Number of Items Removed., , and . ICIS, Association for Information Systems, (2019)Maximizing Online Revisiting and Purchasing: A Clickstream-Based Approach to Enhancing Customer Lifetime Value., , , and . J. Manag. Inf. Syst., 40 (2): 470-502 (2023)Drawing a Line in the Sand: Commitment Problem in Ending Software Support., , and . MIS Q., 41 (4): 1227-1247 (2017)Security Circumvention: To Educate or To Enforce?, , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2018)