From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Privacy Preserving Framework for Big Data in E-Government., , и . PACIS, стр. 72. (2016)Do Hacker Forums Contribute to Security Attacks?, , и . WEB, том 108 из Lecture Notes in Business Information Processing, стр. 143-152. Springer, (2011)Integration of On-Premises and Cloud-Based Software: The Product Bundling Perspective., и . J. Assoc. Inf. Syst., 21 (6): 6 (2020)Agent-based Simulation Approach to Information Warfare in the SEAS Environment., , , и . HICSS, IEEE Computer Society, (2000)Firm Bankruptcy Prediction: Experimental Comparison of Isotonic Separation and Other Classification Approaches., и . IEEE Trans. Syst. Man Cybern. Part A, 35 (5): 727-737 (2005)Bundling cloud software to fight piracy: an economic analysis., , и . Internet Res., 30 (1): 191-241 (2020)Cognitive Elaboration on Potential Outcomes and Its Effects on Employees' Information Security Policy Compliance Intention-Exploring the Key Antecedents., , и . WEB, том 108 из Lecture Notes in Business Information Processing, стр. 180-194. Springer, (2011)When Hackers Talk: Managing Information Security Under Variable Attack Rates and Knowledge Dissemination., , , и . Inf. Syst. Res., 22 (3): 606-623 (2011)Bilateral Liability-Based Contracts in Information Security Outsourcing., , , и . Inf. Syst. Res., 30 (2): 411-429 (2019)IT Security Risk Management under Network Effects and Layered Protection Strategy., , , и . ISI, том 3073 из Lecture Notes in Computer Science, стр. 331-348. Springer, (2004)