Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jay BalAssociate Professor, University of WarwickEmail verificata su warwick.ac.uk
- Irene C L NgProfessor of Marketing and Service SystemsEmail verificata su warwick.ac.uk
- Jaap E. WieringaUniversity of GroningenEmail verificata su rug.nl
- P.K. KannanProfessor of Marketing, University of MarylandEmail verificata su umd.edu
- Bernd SkieraProfessor of Electronic Commerce, Goethe-University, Frankfurt, GermanyEmail verificata su wiwi.uni-frankfurt.de
- Thomas ReuttererWU Vienna University of Economics and BusinessEmail verificata su wu.ac.at
- Jungong HanChair Professor in Computer Vision, University of Sheffield, UK, FIAPR, FAAIAEmail verificata su sheffield.ac.uk
- Yunqi MiaoUniversity of WarwickEmail verificata su warwick.ac.uk
- Susan YL Wakenshaw WarwickAssistant professor WMG University of Warwick UKEmail verificata su warwick.ac.uk
- Zijia LinTsinghua UniversityEmail verificata su tsinghua.org.cn
- Ding GuiguangTsinghua UniversityEmail verificata su tsinghua.edu.cn
- Dr Dongmei CaoNottingham Trent UniversityEmail verificata su ntu.ac.uk
- Shan LinResearch Fellow, Nanyang Technological UniversityEmail verificata su ntu.edu.sg
- Lalitha DhamotharanUniversity of ExeterEmail verificata su exeter.ac.uk
- Matthew BoakesAlan Turing InstituteEmail verificata su turing.ac.uk
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentEmail verificata su kent.ac.uk
- Haiyue YuanResearch Associate, Institute of Cyber Security for Society, University of KentEmail verificata su kent.ac.uk
- roger maullUniversity of ExeterEmail verificata su exeter.ac.uk
- Glenn ParryUniversity of SurreyEmail verificata su surrey.ac.uk
- Maureen MeadowsProfessor of Strategic Management, Coventry UniversityEmail verificata su coventry.ac.uk