Author of the publication

The experimental analysis of information security management issues for online financial services.

, , , and . ICIS, page 667-675. Association for Information Systems, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Oceanus: A Distributed Web-Based Framework for Execution of Genetic Algorithms., , , and . GECCO Late Breaking Papers, page 55-61. AAAI, (2002)Simulating Sellers' Behavior in a Reverse Auction B2B Exchange., , , , and . International Conference on Computational Science, volume 2660 of Lecture Notes in Computer Science, page 365-374. Springer, (2003)The experimental analysis of information security management issues for online financial services., , , and . ICIS, page 667-675. Association for Information Systems, (2000)Is more information better? The effect of traders' irrational behavior on an artificial stock market., , and . ICIS, page 660-666. Association for Information Systems, (2000)Agent-based Simulation Approach to Information Warfare in the SEAS Environment., , , and . HICSS, IEEE Computer Society, (2000)Privacy and Information Markets: An Experimental Study., , and . PACIS, page 85. AISeL, (2004)Computational experimentations in market and supply-chain co-design: a mixed agent approach., , , and . Inf. Syst. E-Business Management, 4 (1): 25-48 (2006)Managing Inventory Over a Short Season: Models with Two Procurement Opportunities., , , and . Manufacturing & Service Operations Management, 11 (1): 174-184 (2009)Agent-based simulation for computational experimentation: Developing an artificial labor market., , , and . European Journal of Operational Research, 166 (3): 694-716 (2005)SAMAS: Scalable Architecture for Multi-resolution Agent-Based Simulation., , , and . International Conference on Computational Science, volume 3038 of Lecture Notes in Computer Science, page 779-788. Springer, (2004)