Shu-Chiung Lin

Orcid: 0000-0002-5153-6847

According to our database1, Shu-Chiung Lin authored at least 17 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Emotional Reactions in Information Dissemination Through the Lens of SOR Theory.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Online marketplace sellers' influence on rating scores and comment orientation.
Electron. Commer. Res., June, 2023

2020
The trust model of enterprise purchasing for B2B e-marketplaces.
Comput. Stand. Interfaces, 2020

2019
Predicting Dementia Risk to Depressive Disorder Patients: A classification Approach.
Proceedings of the 2019 International Conference on Machine Learning and Cybernetics, 2019

2018
Toward an IT investment decision support model for global enterprises.
Comput. Stand. Interfaces, 2018

Product Lifecycle Management System and NPD Performance: The Role of Coordination Capability and Organizational Ambidexterity.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
A study on Impressiveness Management of Internet Celebrities.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Investigating the Effect of Pre-Purchase Search and Ongoing Search on Post-Purchase Dissonance.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
The Classification of Information Assets and Risk Assessment: An Exploratory Study using the Case of C-Bank.
J. Glob. Inf. Manag., 2015

Simple and effective method for detecting abnormal internet behaviors of mobile devices.
Inf. Sci., 2015

Adoption of 4G wireless services under consideration of technology and economic perspectives.
Int. J. Mob. Commun., 2015

Concerning Mobile Multitasking Post-Behavior State of Mind.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

A verification protocol of mobile payment based on signature recognition.
Proceedings of the International Carnahan Conference on Security Technology, 2015

2014
A novel method of mining network flow to detect P2P botnets.
Peer-to-Peer Netw. Appl., 2014

2013
Coding behavior of authentication code on the internet.
Comput. Hum. Behav., 2013

2011
A quasi-experiment approach to study the effect of e-mail management training.
Comput. Hum. Behav., 2011

2006
How R&D management practice affects innovation performance: An investigation of the high-tech industry in Taiwan.
Ind. Manag. Data Syst., 2006


  Loading...