聚星娱乐|平台注册

          
          

                                Editorial Introduction

                                Zwass, Vladimir

                                Special Issue: Creating Social Value with Information

                                Giboney, Justin Scott, Briggs, Robert O, and Nunamaker Jr, Jay F

                                Beyond Brainstorming: Exploring Convergence in Teams

                                Seeber, Isabella, De Vreede, Gert-Jan, Maier, Ronald, and Weber, Barbara

                                A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features

                                Pentland, Steven J, Twyman, Nathan W, Burgoon, Judee K, Nunamaker, Jay F, and Diller, Christopher BR

                                Promoting the System Integration of Renewable Energies: Toward a Decision Support System for Incentivizing Spatially Diversified Deployment

                                Piel, Jan-Hendrik, Hamann, Julian FH, Koukal, André, and Breitner, Michael H

                                Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence

                                Samtani, Sagar, Chinn, Ryan, Chen, Hsinchun, and Nunamaker, Jay F

                                A Data-Mining Approach to Identification of Risk Factors in Safety Management Systems

                                Shi, Donghui, Guan, Jian, Zurada, Jozef, and Manikas, Andrew

                                Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information

                                Anderson, Chad, Baskerville, Richard L, and Kaul, Mala

                                Risks and Controls in Internet-Enabled Reverse Auctions: Perspectives from Buyers and Suppliers

                                Sambhara, Chaitanya, Rai, Arun, Keil, Mark, and Kasi, Vijay

                                Assessing the Credibility of Decisional Guidance Delivered by Information Systems

                                Hardin, Andrew, Looney, Clayton A, and Moody, Gregory D

                                A Temporal Study of the Effects of Online Opinions: Information Sources Matter

                                Huang, Jianxiong, Boh, Wai Fong, and Goh, Kim Huat

                                User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory

                                Menard, Philip, Bott, Gregory J, and Crossler, Robert E


                                Send comments regarding this page to David Eargle.

                                        
                                        

                                                              Variety show

                                                              search for

                                                              Blog

                                                              car

                                                              Variety show

                                                              Blog

                                                              news

                                                              video

                                                              education