publication venue for
- Greening the Cloud: A Load Balancing Mechanism to Optimize Cloud Computing Networks. 39:513-541. 2022
- Examining Hacker Participation Length in Cybercriminal Internet-Relay-Chat Communities. 33:482-510. 2016
- Estimating the Contextual Risk of Data Breach: An Empirical Approach. 32:314-341. 2015
- No Free Lunch: Price Premium for Privacy Seal-Bearing Vendors. 27:189-212. 2010
- Determinants of the Choice of Open Source Software License. 25:207-239. 2008
- A strategic analysis of competition between open source and proprietary software. 24:233-257. 2007
- Buyers' choice of online search strategy and its managerial implications. 23:211-238. 2006
- Information Processing Design Choices, Strategy, and Risk Management Performance. 23:293-319. 2006
- Toward Virtual Community Knowledge Evolution. 18:11-35. 2002
- AEROBA: A Blackboard Approach to Model Formulation. 9:123-143. 1992
- Semantic Modeling of Internal Controls in Database Design. 5:39-56. 1988
- Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets. 37:191-216.
- Uncovering the Truth about Fake News: A Research Model Grounded in Multi-Disciplinary Literature. 38:1067-1094.
- Negotiation support systems in budget negotiations: An experimental analysis 2005