Author of the publication

Modeling the Trust with ECT in E-auction Loyalty.

, , and . APSCC, page 851-855. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Fang, Kwoting
add a person with the name Fang, Kwoting
 

Other publications of authors with the same name

A Cognitive Approach to IS Requirement Analysis: Mental Model Building from Case Study., , and . JSW, 6 (4): 643-650 (2011)Leveraging Ontology-Based Traditional Chinese Medicine Knowledge System: Using Formal Concept Analysis., , and . JCIS, Atlantis Press, (2006)The Post-Adoption Behavior of Online Knowledge Community: Decomposing Customer Value., , and . J. Comput. Inf. Syst., 51 (2): 60-70 (2010)Modeling the Trust with ECT in E-auction Loyalty., , and . APSCC, page 851-855. IEEE Computer Society, (2008)The Impact of Organizational Learning on Lack of Team's Expertise Risk in Information Systems Projects., and . ICEBE, page 738-743. IEEE Computer Society, (2007)Examining the Influence of Occupational Therapy and Its Effectiveness in Long-Term Care on Dementia Patients Through Ontology-Based Clustering., , , and . ICMB, volume 4901 of Lecture Notes in Computer Science, page 129-136. Springer, (2008)Measuring the Post-Adoption Customer Perception of Mobile Banking Services., and . Cyberpsy., Behavior, and Soc. Networking, 12 (1): 33-35 (2009)Ontology-Based Formal Concept Differences Analysis in Radiology Report Impact by the Adoption of PACS., and . ICFCA, volume 5548 of Lecture Notes in Computer Science, page 267-283. Springer, (2009)Understanding e-learning continuance intention: a negative critical incidents perspective., , and . Behaviour & IT, 30 (1): 77-89 (2011)The use of a decomposed theory of planned behavior to study Internet banking in Taiwan., and . Internet Research, 14 (3): 213-223 (2004)