Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring Severity of Internet Abuse in the Workplace: Creation of a Thurstone Scale., and . AMCIS, page 593. Association for Information Systems, (2009)Application of Ethical Frameworks to IT Offshoring., and . AMCIS, page 424. Association for Information Systems, (2005)Supporting complex real-time decision making through machine learning., , and . Decis. Support Syst., 10 (2): 213-233 (1993)The moderating role of helper's high in anchoring process: An empirical investigation in the context of charity website design., , , and . Comput. Hum. Behav., (2018)Implementing Service-Oriented Architecture in Organizations., , and . J. Manag. Inf. Syst., 26 (4): 253-286 (2010)Service-oriented Application Composition with Evolutionary Heuristics and Multiple Criteria., , and . ACM Trans. Manag. Inf. Syst., 10 (3): 10:1-10:28 (2019)Estimating Server Capacities for Enterprise Computing Architectures., , and . Scalable Comput. Pract. Exp., (2000)The Mechanics of the Gig Economy: A System Dynamics Approach., , and . WEB, volume 418 of Lecture Notes in Business Information Processing, page 59-66. Springer, (2020)Enhancing Information Exchange/Sharing in Virtual Teams: A Study on the Efficacy of Techniques., , and . CONF-IRM, page 1. (2014)Security and performance in service-oriented applications: Trading off competing objectives., , and . Decis. Support Syst., 50 (1): 336-346 (2010)