I
J. Li, Wang, A. Gang, and Chen, H.,
“Identity matching using personal and social identity features”,
Information Systems Frontiers, vol. 13, no. 1, pp. 101-113, 2011.
J. Arthurs, Cho, S. Yul, Choi, Y., Hemmatian, I., and Joshi, A.,
“The Impact of Bankruptcy on Competitors: How Technology Overlap and Diversification Affect Value Redistribution.”,
AOM 2017 Annual Meeting. Atlanta, GA, 2017.
J. Arthurs, Cho, S. Yul, Choi, Y., Hemmatian, I., and Joshi, A.,
“The Impact of Bankruptcy on Competitors: How Technology Overlap and Diversification Affect Value Redistribution.”,
AOM 2017 Annual Meeting. Atlanta, GA, 2017.
J. Arthurs, Cho, S. Yul, Choi, Y., Hemmatian, I., and Joshi, A.,
“Impact of Bankruptcy on Rivals: How Tech Overlap and Diversification Affects Value Redistribution”, in
Academy of Management Proceedings, 2017.
J. Arthurs, Cho, S. Yul, Choi, Y., Hemmatian, I., and Joshi, A.,
“Impact of Bankruptcy on Rivals: How Tech Overlap and Diversification Affects Value Redistribution”, in
Academy of Management Proceedings, 2017.
Y. Ling, Baldridge, D., and Craig, J.,
“The impact of family structure on issue selling by successor generation members in family firms”,
Journal of Family Business Strategy, vol. 3, no. 4, pp. 220–227, 2012.
Y. Kim, Johnston, D., Linderman, K., Sawaya, W., and Chen, Y. - S.,
“The Impact of Mergers and Acquisitions on Supply Chain Performance: The Case of Product Quality at Daimler-Chrysler”,
Annual Meeting of the Decision Sciences Institute. Boston, MA, 2011.
R. D'Lima, Paraskevas, J. - P., Corsi, T., and Grimm, C.,
“The Impact of Top Management Team's Supply Chain and Operations Experience on Supplier Portfolio Management”,
DSI. Chicago, IL, 2018.
H. H. Chuang, Lu, G., Peng, D., and Heim, G.,
“Impact of value-added service features in e-Retailing processes: an econometric analysis of website functions”,
Decision Sciences, vol. 45, no. 6, pp. 1159-1186, 2014.
J. Chen, Reilly, R. R., and Lynn, G. S.,
“The Impacts of Speed-to-Market on New Product Success: The Moderating Effects of Uncertainty”,
IEEE Transactions on Engineering Management, vol. 52, no. 2, pp. 199-213, 2005.
A. H. Huffman, Howes, S., Payne, S. C., and Castro, C. A.,
“The importance of construct breadth when examining interrole conflict”,
Educational and Psychological Measurement, vol. 68, pp. 515-530, 2008.
J. Cordiero, Neubaum, D., and Veliyath, R.,
“Incentives for Monitors: Director Stock-based Compensation and Firm Performance”,
Journal of Applied Business Research, vol. 21, no. 2, pp. 81-90, 2005.
L. Steele, Campbell, J., Chen, H., Dhaliwal, D., and Lu, H. -min,
“The information content of mandatory risk factor disclosures in corporate filings”,
Review of Accounting Studies, vol. 19, no. 1, pp. 396-455, 2014.
L. Steele, Campbell, J., Chen, H., Dhaliwal, D., and Lu, H. -min,
“The information content of mandatory risk factor disclosures in corporate filings”,
Review of Accounting Studies, vol. 19, no. 1, pp. 396-455, 2014.
B. Zhu and Chen, H.,
“Information Visualization”,
Annual Review of Information Science and Technology, vol. 39, 2005.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J.,
“InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior”,
Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J.,
“InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior”,
Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., Crossler, R. E., and Correia, J.,
“InfoSec Process Action Model (IPAM): Systematically Addressing Individual Security Behavior”,
Data Base for Advances in Information Systems, vol. 49, no. SI, 2018.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E.,
“InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior”,
Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E.,
“InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior”,
Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.
M. Curry, Marshall, B., Correia, J., and Crossler, R. E.,
“InfoSec Process Action Model (IPAM): Targeting Insider's Weak Password Behavior”,
Journal of Information Systems, vol. 33, no. 3, pp. 201-225, 2019.
Y. He, Hwang, H. - J., Gutierrez, M., Chen, H. - L., Robinson, S., Chang, C. H., and Malhotra, R.,
“Inkjet Printing and In-situ Crystallization of Biopigments for Eco-Friendly and Energy-Efficient Fabric Coloration”,
International Journal of Precision and Engineering -Green Technology, pp. 1-13, 2021.
Y. He, Hwang, H. - J., Gutierrez, M., Chen, H. - L., Robinson, S., Chang, C. H., and Malhotra, R.,
“Inkjet Printing and In-situ Crystallization of Biopigments for Eco-Friendly and Energy-Efficient Fabric Coloration”,
International Journal of Precision and Engineering -Green Technology, pp. 1-13, 2021.
J. Liu, Chen, J., and Tao, Y.,
“Innovation Performance in New Product Development Teams in China's Emerging Market: The Role of Behavioral Integration Dimensions and Collective Efficacy”,
Journal of Product Innovation Management, vol. 32, no. 1, pp. 29–44, 2015.
J. Chen and Sawhney, M.,
“Innovation Radar 2.0”,
Kauffman Symposiums on Entrepreneurship and Innovation Data. Washington, DC, 2008.
J. Chen and Sawhney, M.,
“The Innovation Radar: An Innovation Typology”,
American Marketing Association Conference. Boston, MA, 2010.