菠菜竞彩|app

<acronym id="ygekq"><small id="ygekq"></small></acronym>
<acronym id="ygekq"><center id="ygekq"></center></acronym>
<acronym id="ygekq"><center id="ygekq"></center></acronym><sup id="ygekq"></sup>

Editorial Introduction

Zwass, Vladimir

Control in Internal and Outsourced Software Projects

Tiwana, Amrit and Keil, Mark

Design and Use of Preference Markets for Evaluation of Early Stage Technologies

Chen, Li, Goes, Paulo B, Marsden, James R, and Zhang, Zhongju

Consumer Empowerment Through Internet-Based Co-creation

Füller, Johann, Mühlbacher, Hans, Matzler, Kurt, and Jawecki, Gregor

Optimal Policy for Software Patents: Model and Comparative Implications

Thatcher, Matt E and Pingry, David E

The Role of Push--Pull Technology in Privacy Calculus: The Case of Location-Based Services

Xu, Heng, Teo, Hock-Hai, Tan, Bernard C Y, and Agarwal, Ritu

Trust-Assuring Arguments in B2C E-commerce: Impact of Content, Source, and Price on Trust

Kim, Dongmin and Benbasat, Izak

Speed Matters: The Role of Free Software Offer in Software Diffusion

Jiang, Zhengrui and Sarkar, Sumit

Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers

Cremonini, Marco and Nizovtsev, Dmitri

Estimating Time Required to Reach Bid Levels in Online Auctions

Bandyopadhyay, Subhajyoti and Bandyopadhyay, Seema


Send comments regarding this page to David Eargle.

<acronym id="ygekq"><small id="ygekq"></small></acronym>
<acronym id="ygekq"><center id="ygekq"></center></acronym>
<acronym id="ygekq"><center id="ygekq"></center></acronym><sup id="ygekq"></sup>

m5体彩

恒耀平台

上海体育彩票网

客彩网官网

福彩3d彩吧更懂彩民

用户登录乐购100彩票

千亿彩88|app下载

九州体育手机客户端

千赢体育官网