Author of the publication

Online privacy control via anonymity and pseudonym: Cross-cultural implications.

, , , and . Behav. Inf. Technol., 27 (3): 229-242 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Asia Pacific Journal Snapshot: Journal of Information Management.. Pac. Asia J. Assoc. Inf. Syst., 1 (1): 11 (2009)Becoming a virtual organisation: a strategic approach., , , and . Int. J. Netw. Virtual Organisations, 1 (2): 184-198 (2002)A rule-based robot scheduling system for flexible manufacturing cells., and . J. Intell. Manuf., 3 (5): 285-296 (1992)Software development team flexibility antecedents., , , and . J. Syst. Softw., 83 (10): 1726-1734 (2010)The Critical Issues about Deploying RFID in Healthcare Industry by Service Perspective., and . HICSS, page 111. IEEE Computer Society, (2008)Assessment of Risk Interdependencies on Information System Development Projects., and . KMO, volume 877 of Communications in Computer and Information Science, page 355-367. Springer, (2018)Is that deal worth my money? The effect of relative and referent thinking on starting price under different promotion programs using hotel coupons in online auctions., and . Comput. Hum. Behav., 28 (2): 292-299 (2012)An inventory decision support system using the object-oriented approach., and . Comput. Oper. Res., 23 (2): 153-170 (1996)Online privacy control via anonymity and pseudonym: Cross-cultural implications., , , and . Behav. Inf. Technol., 27 (3): 229-242 (2008)Reducing software requirement perception gaps through coordination mechanisms., , , and . J. Syst. Softw., 82 (4): 650-655 (2009)