Author of the publication

Security and performance in service-oriented applications: Trading off competing objectives.

, , and . Decis. Support Syst., 50 (1): 336-346 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Free to Paid: Purchase and Dropout Behavior of Mobile Application Users., , , and . PACIS, page 133. (2013)Opinion Formation in the Digital Divide., , , and . J. Artificial Societies and Social Simulation, (2014)Customer pre-adoption choice behavior for M-PESA mobile financial services: Extending the theory of consumption values., , , and . Ind. Manag. Data Syst., 117 (5): 910-926 (2017)Why people participate in online political crowdfunding: A civic voluntarism perspective., and . Telematics Informatics, (2019)The Effect of Leadership and Teamwork on ISD Project Success., , and . J. Comput. Inf. Syst., 61 (1): 87-97 (2021)Exploring factors affecting the adoption of mobile office in business: an integration of TPB with perceived value., , and . Int. J. Mob. Commun., 14 (1): 1-25 (2016)End-to-end reliability of service oriented applications., , and . Inf. Syst. Frontiers, 14 (5): 971-986 (2012)Network Closure Versus Structural Hole: The Role of Knowledge Spillover Networks in National Innovation Performance., and . IEEE Trans. Engineering Management, 69 (4): 1011-1021 (2022)Examining success factors in the adoption of digital object identifier systems., , , and . Electron. Commer. Res. Appl., 10 (6): 626-636 (2011)Cyber neutralisation and flaming., , , , and . Behav. Inf. Technol., 35 (3): 210-224 (2016)