Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jay BalAssociate Professor, University of WarwickVerified email at warwick.ac.uk
- Irene C L NgProfessor of Marketing and Service SystemsVerified email at warwick.ac.uk
- Jaap E. WieringaUniversity of GroningenVerified email at rug.nl
- P.K. KannanProfessor of Marketing, University of MarylandVerified email at umd.edu
- Bernd SkieraProfessor of Electronic Commerce, Goethe-University, Frankfurt, GermanyVerified email at wiwi.uni-frankfurt.de
- Thomas ReuttererWU Vienna University of Economics and BusinessVerified email at wu.ac.at
- Jungong HanChair Professor in Computer Vision, University of Sheffield, UK, FIAPR, FAAIAVerified email at sheffield.ac.uk
- Yunqi MiaoUniversity of WarwickVerified email at warwick.ac.uk
- Susan YL Wakenshaw WarwickAssistant professor WMG University of Warwick UKVerified email at warwick.ac.uk
- Zijia LinTsinghua UniversityVerified email at tsinghua.org.cn
- Ding GuiguangTsinghua UniversityVerified email at tsinghua.edu.cn
- Dr Dongmei CaoNottingham Trent UniversityVerified email at ntu.ac.uk
- Shan LinResearch Fellow, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Lalitha DhamotharanUniversity of ExeterVerified email at exeter.ac.uk
- Matthew BoakesAlan Turing InstituteVerified email at turing.ac.uk
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
- Haiyue YuanResearch Associate, Institute of Cyber Security for Society, University of KentVerified email at kent.ac.uk
- roger maullUniversity of ExeterVerified email at exeter.ac.uk
- Glenn ParryUniversity of SurreyVerified email at surrey.ac.uk
- Maureen MeadowsProfessor of Strategic Management, Coventry UniversityVerified email at coventry.ac.uk