Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- HsiuJu Rebecca YenNational Tsing Hua UniversityEmail verificata su mx.nthu.edu.tw
- Timon DuThe Chinese University of Hong KongEmail verificata su cuhk.edu.hk
- Ja-Shen ChenYuan Ze UniversityEmail verificata su saturn.yzu.edu.tw
- Waiman CheungThe Chinese University of Hong KongEmail verificata su cuhk.edu.hk
- Fu-Kwun WangNational Taiwan University of Science and TechnologyEmail verificata su mail.ntust.edu.tw
- Chen-yuan TungGraduate Institute of Development Studies National Chengchi UniversityEmail verificata su nccu.edu.tw
- Paul Jen-Hwa HuProfessor of Operations and Information Systems, University of UtahEmail verificata su business.utah.edu
- Tracy Tsai 蔡翠旭Takming University 德明財經科技大學Email verificata su takming.edu.tw
- Ravi S. SharmaProfessor of Technological Innovation @ Zayed UniversityEmail verificata su ceide.org
- Chong GuanAssociate Professor, Singapore University of Social SciencesEmail verificata su suss.edu.sg
- Martin ParkerProfessor of Organization Studies, Bristol UniversityEmail verificata su bristol.ac.uk
- Aijaz A. Shaikh, PhDUniversity of Jyväskylä, FinlandEmail verificata su jyu.fi
- Milena HeadProfessor of Information Systems, DeGroote School of Business, McMaster UniversityEmail verificata su mcmaster.ca
- Michel AvitalCopenhagen Business SchoolEmail verificata su cbs.dk
- Niels Bjørn-AndersenProfessor IT managementEmail verificata su cbs.dk
- Natalia LevinaNew York UniversityEmail verificata su stern.nyu.edu
- Emil ThiesAssociate Dean, College of Business, Zayed UniversityEmail verificata su zu.ac.ae
- Stanley LohProfessor de Análise de Sistemas e Ciência da Computação, ULBRAEmail verificata su ulbra.edu.br
- cain evansAston UniversityEmail verificata su aston.ac.uk
- Gary KleinCybersecurity Management Council