Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Role of Attention and Neutralization in Posting Malicious Comments Online., and . AMCIS, Association for Information Systems, (2018)Factor's Influencing Individual's Knowledge Seeking Behaviour in Electronic Knowledge Repository., and . ECIS, page 390-403. (2005)An evolutionary stage model of cyberspace: a case study of Samsung Economic Research Institute., , and . J. Inf. Sci., 33 (2): 215-229 (2007)Why Employees Do Non-Work-Related Computing in the Workplace., , and . J. Comput. Inf. Syst., 50 (3): 150-163 (2010)Knowledge management and process innovation: the knowledge transformation path in Samsung SDI., , , and . J. Knowl. Manag., 6 (5): 479-485 (2002)The Influence of Social Power on Knowledge Utilization., , and . J. Comput. Inf. Syst., 61 (6): 493-506 (2021)Understanding overbidding behavior in C2C auctions: an escalation theory perspective., , , and . Eur. J. Inf. Syst., 21 (6): 643-663 (2012)The Impact of Enterprise Social Media on Task Performance in Dispersed Teams., and . HICSS, page 1909-1918. IEEE Computer Society, (2015)An Exploratory Study of Before-Interaction Trust Transference in Multichannel Retailers., and . ICIS, Association for Information Systems, (2005)Comparing the effects of website quality on customer initial purchase and continued purchase at e-commerce websites., , and . Behav. Inf. Technol., 27 (1): 3-16 (2008)