菠菜竞彩|app

<sup id="yc6uq"><noscript id="yc6uq"></noscript></sup>
<rt id="yc6uq"></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<tr id="yc6uq"><optgroup id="yc6uq"></optgroup></tr>
<rt id="yc6uq"><small id="yc6uq"></small></rt><rt id="yc6uq"><small id="yc6uq"></small></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<acronym id="yc6uq"><center id="yc6uq"></center></acronym><acronym id="yc6uq"><center id="yc6uq"></center></acronym>
<rt id="yc6uq"><small id="yc6uq"></small></rt>
<sup id="yc6uq"></sup>

Editorial Introduction

Zwass, Vladimir

Special Issue: Creating Social Value with Information

Giboney, Justin Scott, Briggs, Robert O, and Nunamaker Jr, Jay F

Beyond Brainstorming: Exploring Convergence in Teams

Seeber, Isabella, De Vreede, Gert-Jan, Maier, Ronald, and Weber, Barbara

A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features

Pentland, Steven J, Twyman, Nathan W, Burgoon, Judee K, Nunamaker, Jay F, and Diller, Christopher BR

Promoting the System Integration of Renewable Energies: Toward a Decision Support System for Incentivizing Spatially Diversified Deployment

Piel, Jan-Hendrik, Hamann, Julian FH, Koukal, André, and Breitner, Michael H

Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence

Samtani, Sagar, Chinn, Ryan, Chen, Hsinchun, and Nunamaker, Jay F

A Data-Mining Approach to Identification of Risk Factors in Safety Management Systems

Shi, Donghui, Guan, Jian, Zurada, Jozef, and Manikas, Andrew

Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information

Anderson, Chad, Baskerville, Richard L, and Kaul, Mala

Risks and Controls in Internet-Enabled Reverse Auctions: Perspectives from Buyers and Suppliers

Sambhara, Chaitanya, Rai, Arun, Keil, Mark, and Kasi, Vijay

Assessing the Credibility of Decisional Guidance Delivered by Information Systems

Hardin, Andrew, Looney, Clayton A, and Moody, Gregory D

A Temporal Study of the Effects of Online Opinions: Information Sources Matter

Huang, Jianxiong, Boh, Wai Fong, and Goh, Kim Huat

User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory

Menard, Philip, Bott, Gregory J, and Crossler, Robert E


Send comments regarding this page to David Eargle.

<sup id="yc6uq"><noscript id="yc6uq"></noscript></sup>
<rt id="yc6uq"></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<tr id="yc6uq"><optgroup id="yc6uq"></optgroup></tr>
<rt id="yc6uq"><small id="yc6uq"></small></rt><rt id="yc6uq"><small id="yc6uq"></small></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<acronym id="yc6uq"><center id="yc6uq"></center></acronym><acronym id="yc6uq"><center id="yc6uq"></center></acronym>
<rt id="yc6uq"><small id="yc6uq"></small></rt>
<sup id="yc6uq"></sup>

大赢家足球即时比分球探网

90足球比分网

零点棋牌官方网站

皇冠足球足球比分

金鼎的彩的网址

yzc888亚洲城手机版

1946伟德国际

bf必发彩票官方

黄金娱乐场