Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
- HsiuJu Rebecca YenNational Tsing Hua UniversityVerified email at mx.nthu.edu.tw
- Timon DuThe Chinese University of Hong KongVerified email at cuhk.edu.hk
- Ja-Shen ChenYuan Ze UniversityVerified email at saturn.yzu.edu.tw
- Waiman CheungThe Chinese University of Hong KongVerified email at cuhk.edu.hk
- Fu-Kwun WangNational Taiwan University of Science and TechnologyVerified email at mail.ntust.edu.tw
- Chen-yuan TungGraduate Institute of Development Studies National Chengchi UniversityVerified email at nccu.edu.tw
- Ravi S. SharmaProfessor of Technological Innovation @ Zayed UniversityVerified email at ceide.org
- Paul Jen-Hwa HuProfessor of Operations and Information Systems, University of UtahVerified email at business.utah.edu
- Chong GuanAssociate Professor, Singapore University of Social SciencesVerified email at suss.edu.sg
- Gary KleinCybersecurity Management CouncilVerified email at uccs.edu
- Martin ParkerProfessor of Organization Studies, Bristol UniversityVerified email at bristol.ac.uk
- Dr. Aijaz A. ShaikhThe Institute of Information and Computational Technologies, Almaty, KazakhstanVerified email at ipic.kz
- Tracy Tsai 蔡翠旭Takming University 德明財經科技大學Verified email at takming.edu.tw
- Milena HeadProfessor of Information Systems, DeGroote School of Business, McMaster UniversityVerified email at mcmaster.ca
- Michel AvitalCopenhagen Business SchoolVerified email at cbs.dk
- Niels Bjørn-AndersenProfessor IT managementVerified email at cbs.dk
- Natalia LevinaNew York UniversityVerified email at stern.nyu.edu
- Emil ThiesAssociate Dean, College of Business, Zayed UniversityVerified email at zu.ac.ae
- Stanley LohProfessor de Análise de Sistemas e Ciência da Computação, ULBRAVerified email at ulbra.edu.br
- cain evansAston UniversityVerified email at aston.ac.uk