From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Misinformation Sharing on Twitter During Zika: An Investigation of the Effect of Threat and Distance., , , и . IEEE Internet Comput., 25 (1): 31-39 (2021)Ethical Challenges in the Future of Work., , , , и . IEEE Data Eng. Bull., 42 (4): 55-64 (2019)Relative Performance of Incentive Mechanisms: Computational Modeling and Simulation of Delegated Investment Decisions., , и . Manag. Sci., 49 (2): 160-178 (2003)Responding to identity theft: A victimization perspective., , , и . Decis. Support Syst., (2019)Visual e-mail authentication and identification services: An investigation of the effects on e-mail use., , , и . Decis. Support Syst., 48 (1): 92-102 (2009)An exploration of risk information search via a search engine: Queries and clicks in healthcare and information security., , и . Decis. Support Syst., 52 (2): 395-405 (2012)Dynamic profiling of consumers for customized offerings over the Internet: a model and analysis., , , и . Decis. Support Syst., 32 (2): 117-134 (2001)Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis., , , и . Decis. Support Syst., 41 (1): 242-261 (2005)The Egyptian protest movement in the twittersphere: An investigation of dual sentiment pathways of communication., , и . Int. J. Inf. Manag., (2021)Design principles for critical incident response systems., , , и . Inf. Syst. E Bus. Manag., 5 (3): 201-227 (2007)