Author of the publication

Enhancing Predictive Analytics for Anti-Phishing by Exploiting Website Genre Information.

, , , , , and . J. of Management Information Systems, 31 (4): 109-157 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Use of Integrated Organization and Information Systems Models in Building and Delivering Business Applications., , and . IEEE Trans. Knowl. Data Eng., 1 (3): 406-409 (1989)Collaborative Cross-Border Security Infrastructure and Systems: Identifying Policy, Managerial and Technological Challenges., , , and . IJEP, 4 (2): 21-38 (2013)Bringing automated support to large groups: The Burr-Brown experience., , , and . Information & Management, 18 (3): 111-121 (1990)Special Issue: Multiple Dimensions of Value in Information Systems., and . J. of Management Information Systems, 29 (4): 97-102 (2013)Collaboration Engineering with ThinkLets to Pursue Sustained Success with Group Support Systems., , and . J. of Management Information Systems, 19 (4): 31-64 (2003)Enabling the Effective Involvement of Multiple Users: Methods and Tools for Collaborative Software Engineering., , , , and . J. of Management Information Systems, 14 (3): 179-222 (1998)Special Issue: Decision Support Systems for Teams, Groups, and Organizations.. J. of Management Information Systems, 8 (3): 3-6 (1992)Whither the Pen-Based Interface?, , , and . J. of Management Information Systems, 9 (3): 71-90 (1993)A Technology Transition Model Derived from Field Investigation of GSS Use Aboard the U.S.S. CORONADO., , , , , and . J. of Management Information Systems, 15 (3): 151-196 (1999)PLEXSYS-84: An Integrated Development Environment for Informational Systems., , , and . J. of Management Information Systems, 1 (3): 64-104 (1985)