![]() | ![]() |
2007 | ||
---|---|---|
4 | EE | Mark Vroblefski, Andrew Chen, Benjamin Shao, Matthew Swinarski: Managing user relationships in hierarchies for information system security. Decision Support Systems 43(2): 408-419 (2007) |
3 | EE | Mark Keith, Benjamin Shao, Paul John Steinbart: The usability of passphrases for authentication: An empirical field study. International Journal of Man-Machine Studies 65(1): 17-28 (2007) |
2005 | ||
2 | EE | Andrew Chen, Yuhchang Hwang, Benjamin Shao: Measurement and sources of overall and input inefficiencies: Evidences and implications in hospital services. European Journal of Operational Research 161(2): 447-468 (2005) |
2003 | ||
1 | Joseph Cazier, Benjamin Shao, Robert St. Louis: Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility. SAC 2003: 617-622 |
1 | Joseph Cazier | [1] |
2 | Andrew Chen | [2] [4] |
3 | Yuhchang Hwang | [2] |
4 | Mark Keith | [3] |
5 | Robert St. Louis | [1] |
6 | Paul John Steinbart | [3] |
7 | Matthew Swinarski | [4] |
8 | Mark Vroblefski | [4] |