Author of the publication

Cross-bidding in simultaneous online auctions: Antecedents and consequences.

, , and . Inf. Manag., 47 (7-8): 325-332 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-bidding in simultaneous online auctions: Antecedents and consequences., , and . Inf. Manag., 47 (7-8): 325-332 (2010)Introduction to the Minitrack on Machine Learning and AI: Cybersecurity and Threat Hunting., , , and . HICSS, page 7571. ScholarSpace, (2024)Knowledge Reuse in Organizations: The Role of Governance Mechanisms., and . AMCIS, page 197. Association for Information Systems, (2009)Contributing Knowledge to Organizational Repositories: The Role of Governance Mechanisms., and . AMCIS, page 199. Association for Information Systems, (2009)Unsupervised Threat Hunting using Continuous Bag-of-Terms-and-Time (CBoTT)., , , , and . CoRR, (2024)Usage of Online Knowledge Repositories: A Comparison of Two Governance Mechanisms., and . ECIS, page 164. (2010)Improving the Quality of Knowledge Assets: Governance Mechanisms and Their Implications., and . AMCIS, page 124. Association for Information Systems, (2009)Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC)., , and . Decis. Support Syst., (May 2023)Unsupervised Threat Hunting using Continuous Bag of Terms and Time (CBoTT)., , , , and . ICIS, Association for Information Systems, (2023)The Differential Performance Effects of Healthcare Information Technology Adoption., , , , and . IS Management, 24 (1): 5-14 (2007)