Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference11 articles.
1. Gray, P., & Hovav, A. (1999). “Using scenarios to understand the frontiers of IS. Information Systems Frontiers, 1(1), 15–24.
2. Hovav, A., & Gray, P. (2014). The ripple effect of an information security breach event: a stakeholder analysis. Communications of the Association for Information Systems, 34(50), 893–912.
3. Hovav, A., Hemmert, M., & Kim, Y.-J. (2011). Determinants of internet standards adoption: the case of South Korea. Research Policy, 40(2), 253–262.
4. Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants of computer-mediated transactions: a cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13–45.
5. Kling, R., Lamb, R. (1996). Analyzing Alternate Visions of Electronic Publishing and Digital Libraries. Scholarly Publishing: The Electronic Frontier. R. Peek and G. Newby. Cambridge: The MIT Press, 1:17–54.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献