Author of the publication

Individual's Response to Security Messages: A Decision-Making Perspective.

, , and . Decision Support for Global Enterprises, volume 2 of Annals of Information Systems, Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Qing, Tang
add a person with the name Qing, Tang
 

Other publications of authors with the same name

Static Compliance Checking beyond Separation of Duty Constraints., , , and . 3PGCIC, page 171-178. IEEE Computer Society, (2014)HumRoboSim: An Autonomous Humanoid Robot Simulation System., , , and . CW, page 537-542. IEEE Computer Society, (2008)Social capital, motivations, and mobile coupon sharing., , , and . Industrial Management and Data Systems, 116 (1): 188-206 (2016)Why do users resist service organization's brand mobile apps? The force of barriers versus cross-channel synergy., , , and . Int J. Information Management, (2019)Fully Unsupervised Person Re-Identification via Multiple Pseudo Labels Joint Training., , and . IEEE Access, (2021)Individual's Response to Security Messages: A Decision-Making Perspective., , and . Decision Support for Global Enterprises, volume 2 of Annals of Information Systems, Springer, (2007)Roles of perceived value and individual differences in the acceptance of mobile coupon applications., , , and . Internet Research, 25 (3): 471-495 (2015)VFFDT: A New Software for Preparing AMBER Force Field Parameters for Metal-Containing Molecular Systems., , , , , , , and . Journal of Chemical Information and Modeling, 56 (4): 811-818 (2016)Existence of Periodic Solution for Cellular Neural Networks., , , and . ICNC (3), page 465-468. IEEE Computer Society, (2008)Dynamic Modeling and Control of Rigid-Flexible Constrained Robot with Three Links., , , , and . ICIRA (1), volume 5314 of Lecture Notes in Computer Science, page 391-400. Springer, (2008)