菠菜竞彩|app

<sup id="yc6uq"><noscript id="yc6uq"></noscript></sup>
<rt id="yc6uq"></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<tr id="yc6uq"><optgroup id="yc6uq"></optgroup></tr>
<rt id="yc6uq"><small id="yc6uq"></small></rt><rt id="yc6uq"><small id="yc6uq"></small></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<acronym id="yc6uq"><center id="yc6uq"></center></acronym><acronym id="yc6uq"><center id="yc6uq"></center></acronym>
<rt id="yc6uq"><small id="yc6uq"></small></rt>
<sup id="yc6uq"></sup>

Editorial Introduction

Zwass, Vladimir

Special Issue: Creating Social Value with Information

Giboney, Justin Scott, Briggs, Robert O, and Nunamaker Jr, Jay F

Beyond Brainstorming: Exploring Convergence in Teams

Seeber, Isabella, De Vreede, Gert-Jan, Maier, Ronald, and Weber, Barbara

A Video-Based Screening System for Automated Risk Assessment Using Nuanced Facial Features

Pentland, Steven J, Twyman, Nathan W, Burgoon, Judee K, Nunamaker, Jay F, and Diller, Christopher BR

Promoting the System Integration of Renewable Energies: Toward a Decision Support System for Incentivizing Spatially Diversified Deployment

Piel, Jan-Hendrik, Hamann, Julian FH, Koukal, André, and Breitner, Michael H

Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence

Samtani, Sagar, Chinn, Ryan, Chen, Hsinchun, and Nunamaker, Jay F

A Data-Mining Approach to Identification of Risk Factors in Safety Management Systems

Shi, Donghui, Guan, Jian, Zurada, Jozef, and Manikas, Andrew

Information Security Control Theory: Achieving a Sustainable Reconciliation Between Sharing and Protecting the Privacy of Information

Anderson, Chad, Baskerville, Richard L, and Kaul, Mala

Risks and Controls in Internet-Enabled Reverse Auctions: Perspectives from Buyers and Suppliers

Sambhara, Chaitanya, Rai, Arun, Keil, Mark, and Kasi, Vijay

Assessing the Credibility of Decisional Guidance Delivered by Information Systems

Hardin, Andrew, Looney, Clayton A, and Moody, Gregory D

A Temporal Study of the Effects of Online Opinions: Information Sources Matter

Huang, Jianxiong, Boh, Wai Fong, and Goh, Kim Huat

User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory

Menard, Philip, Bott, Gregory J, and Crossler, Robert E


Send comments regarding this page to David Eargle.

<sup id="yc6uq"><noscript id="yc6uq"></noscript></sup>
<rt id="yc6uq"></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<tr id="yc6uq"><optgroup id="yc6uq"></optgroup></tr>
<rt id="yc6uq"><small id="yc6uq"></small></rt><rt id="yc6uq"><small id="yc6uq"></small></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<acronym id="yc6uq"><center id="yc6uq"></center></acronym><acronym id="yc6uq"><center id="yc6uq"></center></acronym>
<rt id="yc6uq"><small id="yc6uq"></small></rt>
<sup id="yc6uq"></sup>

千亿国际 qy8千亿国际

天福彩票app

qy8千亿国际欢迎您

博乐名游彩票登陆

连环夺宝中福在线

老鹰彩票登录-首页

腾博会诚信为本

mg游戏平台官网

优发|国际-在线顶级