菠菜竞彩|app

<sup id="yc6uq"><noscript id="yc6uq"></noscript></sup>
<rt id="yc6uq"></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<tr id="yc6uq"><optgroup id="yc6uq"></optgroup></tr>
<rt id="yc6uq"><small id="yc6uq"></small></rt><rt id="yc6uq"><small id="yc6uq"></small></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<acronym id="yc6uq"><center id="yc6uq"></center></acronym><acronym id="yc6uq"><center id="yc6uq"></center></acronym>
<rt id="yc6uq"><small id="yc6uq"></small></rt>
<sup id="yc6uq"></sup>

Editorial Introduction

Zwass, Vladimir

Special Issue: Impact of Information Systems on Market Structure and Function: Developing and Testing Theories

Clemons, Eric K, Kauffman, Robert J, and Dewan, Rajiv M

How Information Changes Consumer Behavior and How Consumer Behavior Determines Corporate Strategy

Clemons, Eric K

How Does Information Technology Shape Supply-Chain Structure?: Evidence on the Number of Suppliers

Dedrick, Jason, Xu, Sean Xin, and Zhu, Kevin Xiaoguo

How Has Electronic Travel Distribution Been Transformed?: A Test of the Theory of Newly Vulnerable Markets

Granados, Nelson F, Kauffman, Robert J, and King, Bradley

Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply Chain

Johnson, M Eric

The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence

Png, Ivan P L, Chen-Yu, Wang, and Qiu-Hong, Wang

Does Competition Promote Trust and Trustworthiness in Online Trading?: An Experimental Study

Bolton, Gary, Loebecke, Claudia, and Ockenfels, Axel

Design and Ownership of Two-Sided Networks: Implications for Internet Platforms

Bakos, Yannis and Katsamakas, Evangelos

Uncertainty and Industry Structure Effects on Managerial Intuition About Information Technology Real Options

Lankton, Nancy and Luft, Joan

Understanding the Value of Countermeasure Portfolios in Information Systems Security

Kumar, Ram L, Park, Sungjune, and Subramaniam, Chandrasekar

Decision-Theoretic and Game-Theoretic Approaches to IT Security Investment

Cavusoglu, Huseyin, Raghunathan, Srinivasan, and Yue, Wei T


Send comments regarding this page to David Eargle.

<sup id="yc6uq"><noscript id="yc6uq"></noscript></sup>
<rt id="yc6uq"></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<tr id="yc6uq"><optgroup id="yc6uq"></optgroup></tr>
<rt id="yc6uq"><small id="yc6uq"></small></rt><rt id="yc6uq"><small id="yc6uq"></small></rt>
<acronym id="yc6uq"><small id="yc6uq"></small></acronym>
<acronym id="yc6uq"><center id="yc6uq"></center></acronym><acronym id="yc6uq"><center id="yc6uq"></center></acronym>
<rt id="yc6uq"><small id="yc6uq"></small></rt>
<sup id="yc6uq"></sup>

爱乐透彩票

吉利彩的新登陆网址

信誉彩票平台网站

王者竞猜

澳门新濠天地博彩官网

福客来彩票注册首页

同乐城88官网

盈丰真人手机版

球探比分即时足球比分