Special Section Introduction - Ubiquitous IT and Digital Vulnerabilities
暂无分享,去创建一个
Alok Gupta | Ram D. Gopal | Sam Ransbotham | Robert G. Fichman | Alok Gupta | R. G. Fichman | R. Gopal | S. Ransbotham
[1] Hock-Hai Teo,et al. Conceptualizing and Testing a Social Cognitive Model of the Digital Divide , 2011, Inf. Syst. Res..
[2] E. Wolff,et al. Recent Trends in Household Wealth in the United States: Rising Debt and the Middle-Class Squeeze - An Update to 2007 , 2010 .
[3] Sandra Slaughter,et al. Research Commentary - The Design, Use, and Consequences of Virtual Processes , 2010, Inf. Syst. Res..
[4] Emmanuel Saez,et al. Top Incomes in the Long Run of History , 2009 .
[5] Kevin M. Murphy,et al. A Theory of Rational Addiction , 1988, Journal of Political Economy.
[6] George Valkanas,et al. The Impact of Fake Reviews on Online Visibility: A Vulnerability Assessment of the Hotel Industry , 2016, Inf. Syst. Res..
[7] Panagiotis G. Ipeirotis,et al. Reputation Transferability in Online Labor Markets , 2016, Manag. Sci..
[8] Herman Aguinis,et al. THE BEST AND THE REST: REVISITING THE NORM OF NORMALITY OF INDIVIDUAL PERFORMANCE , 2012 .
[9] Vijay S. Mookerjee,et al. When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security , 2016, Inf. Syst. Res..
[10] Dominique Brossard,et al. The "Nasty Effect: " Online Incivility and Risk Perceptions of Emerging Technologies , 2014, J. Comput. Mediat. Commun..
[11] Emmanuel Saez,et al. The Top 1 Percent in International and Historical Perspective , 2013 .
[12] Iyad Rahwan,et al. The social dilemma of autonomous vehicles , 2015, Science.
[13] David H. Autor,et al. Trends in U.S. Wage Inequality: Revising the Revisionists , 2008, The Review of Economics and Statistics.
[14] Bonnie Brinton Anderson,et al. More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable , 2016, Inf. Syst. Res..
[15] Erik Brynjolfsson,et al. The New World Order , 2014, Restoring the Global Judiciary.
[16] Sam Ransbotham,et al. Information Disclosure and the Diffusion of Information Security Attacks , 2015, Inf. Syst. Res..
[17] Frank E. McGarry,et al. A summary of software measurement experiences in the Software Engineering Laboratory , 1988, [1988] Proceedings of the Twenty-First Annual Hawaii International Conference on System Sciences. Volume II: Software track.
[18] Richard O. Mason,et al. Studying cyborgs: re-examining internet studies as human subjects research , 2012, J. Inf. Technol..
[19] Wonseok Oh,et al. Excessive Dependence on Mobile Social Apps: A Rational Addiction Perspective , 2016, Inf. Syst. Res..