Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The ICT predicament of new ICT-enabled service., , , and . CoRR, (2015)Understanding the Mediating Effects of Relationship Quality on Technology Acceptance: An Empirical Study of E-Appointment System., , , and . J. Medical Systems, 37 (6): 9981 (2013)The Relationship Between Information Technology Professionals' Skill Requirements and Career Stage in the E-Commerce Era: An Empirical Study., , , and . J. Glob. Inf. Manag., 12 (1): 68-82 (2004)A Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means., , , , and . ACM Trans. Manag. Inf. Syst., 6 (1): 3:1-3:30 (2015)Understanding the relationships between online entrepreneurs' personal innovativeness, risk taking, and satisfaction: Comparison of pure-play and click-and-mortar., and . J. Organ. Comput. Electron. Commer., 27 (2): 135-151 (2017)Financial Technologies and Applications., , and . IT Prof., 20 (2): 27-33 (2018)An East-West Comparison of IS Professionals' Performance and Knowledge/Skills: An Empirical Study of USA vs Taiwan., , , and . Commun. Assoc. Inf. Syst., (2005)Effects of virtualization on information security., , , , , and . Comput. Stand. Interfaces, (2015)Theory of planning behavior (TPB) and customer satisfaction in the continued use of e-service: An integrated model., , and . Comput. Hum. Behav., 23 (6): 2804-2822 (2007)Coding behavior of authentication code on the internet., , , and . Comput. Hum. Behav., 29 (5): 2090-2099 (2013)