Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

General Strategy for Querying Web Sources in a Data Federation Environment., , and . J. Database Manag., 20 (2): 1-18 (2009)The Future of Prediction: How Google Searches Foreshadow Housing Prices and Quantities., and . ICIS, page 147. Association for Information Systems, (2009)Social Network Effects on Performance and Layoffs: Evidence from the Adoption of a Social Networking Tool.. ICIS, Association for Information Systems, (2011)Are All Spillovers Created Equal? A Network Perspective on IT Labor Movements., , and . ICIS, Association for Information Systems, (2014)Social Network Analysis in Enterprise., , , , , , and . Proceedings of the IEEE, 100 (9): 2759-2776 (2012)Measuring Effects of Observational Learning and Social-Network Word-of-Mouth (WOM) on the Sales of Daily-Deal Vouchers., and . HICSS, page 2908-2917. IEEE Computer Society, (2013)Are All Spillovers Created Equal? A Network Perspective on Information Technology Labor Movements., , and . Management Science, 64 (7): 3168-3186 (2018)PILOT: Password and PIN information leakage from obfuscated typing videos., , , , , , , , , and 3 other author(s). Journal of Computer Security, 27 (4): 405-425 (2019)Testing Three-Way Complementarities: Performance Pay, Monitoring and Information Technology., , and . ICIS, page 163. Association for Information Systems, (2009)Querying Web-Sources within a Data Federation., , , and . ICIS, page 115. Association for Information Systems, (2006)