default search action
J. Michael Tarn
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j21]Jiahe Song, Muhammad A. Razi, J. Michael Tarn:
Is High ICT Intensity Always the Ideal?: Lessons Learned From Contemporary Virtual Teams. J. Cases Inf. Technol. 23(1): 49-64 (2021)
2010 – 2019
- 2018
- [c3]Pei-Ju Lee, Ya-Han Hu, Kuanchin Chen, J. Michael Tarn, Lien-En Cheng:
Cyberbullying Detection on Social Network Services. PACIS 2018: 61 - 2016
- [j20]Colin Lai, Hung-Lian Tang, J. Michael Tarn, Sock H. Chung:
The Compliance of IT Control and Governance: A Case of Macao Gaming Industry. Int. J. Inf. Secur. Priv. 10(1): 28-44 (2016) - [c2]Ya-Han Hu, Pei-Ju Lee, Kuanchin Chen, J. Michael Tarn, Duyen-Vi Dang:
Hotel Recommendation System based on Review and Context Information: a Collaborative filtering Appro. PACIS 2016: 221 - [c1]Shin-Yuan Hung, Yu-Wen Huang, Ching-Chieh Lin, Kuanchin Chen, J. Michael Tarn:
Factors Influencing Business Intelligence Systems Implementation Success in the Enterprises. PACIS 2016: 297 - 2015
- [j19]Kun Chen, Gang Kou, J. Michael Tarn, Yan Song:
Bridging the gap between missing and inconsistent values in eliciting preference from pairwise comparison matrices. Ann. Oper. Res. 235(1): 155-175 (2015) - [j18]Qing Yang, Chuan Pang, Liu Liu, David C. Yen, J. Michael Tarn:
Exploring consumer perceived risk and trust for online payments: An empirical study in China's younger generation. Comput. Hum. Behav. 50: 9-24 (2015) - [j17]Mong-Yuan Chang, Chuan Pang, J. Michael Tarn, Tai-Shun Liu, David C. Yen:
Exploring user acceptance of an e-hospital service: An empirical study in Taiwan. Comput. Stand. Interfaces 38: 35-43 (2015) - 2012
- [j16]Jengchung V. Chen, Fu-Chi Chen, J. Michael Tarn, David C. Yen:
Improving network congestion: A RED-based FuzzyPID approach. Comput. Stand. Interfaces 34(5): 426-438 (2012) - 2011
- [j15]Sharie L. Falan, Bernard T. Han, Linda H. Zoeller, J. Michael Tarn, Donna M. Roach:
Sustaining Healthcare Through Waste Elimination: A Taxonomic Analysis with Case Illustrations. Int. J. Heal. Inf. Syst. Informatics 6(4): 1-22 (2011)
2000 – 2009
- 2009
- [j14]J. Michael Tarn, Chuan Pang, David C. Yen, Jon Chen:
Exploring the implementation and application of Bluetooth technology in the shipping industry. Comput. Stand. Interfaces 31(1): 48-55 (2009) - 2007
- [j13]Dustin Swallows, David C. Yen, J. Michael Tarn:
XML and WML integration: An analysis and strategies for implementation to meet mobile commerce challenges. Comput. Stand. Interfaces 29(1): 97-108 (2007) - [j12]J. Michael Tarn, Muhammad A. Razi, Noelle Wiley, Jeffrey Hsu:
Exploring user perception of wireless campus. Int. J. Mob. Commun. 5(6): 710-730 (2007) - 2006
- [j11]J. Michael Tarn, Kuanchin Chen:
Mobile technology as a learning object and an exploration tool in an IS curriculum: an innovative instruction of wireless network security. IEEE Trans. Educ. 49(2): 193-198 (2006) - 2004
- [j10]Jau-Yang Liu, Jyh-Horng Michael Tarn, H. Joseph Wen:
Adopting e-commerce Web site operation modes: The current state of large US firms. Inf. Manag. Comput. Secur. 12(1): 73-90 (2004) - [j9]Muhammad A. Razi, J. Michael Tarn, Faisal A. Siddiqui:
Exploring the failure and success of DotComs. Inf. Manag. Comput. Secur. 12(3): 228-244 (2004) - 2003
- [j8]J. Michael Tarn, David C. Yen, H. Joseph Wen:
XML and electronic business. Int. J. Electron. Bus. 1(3): 296-309 (2003) - 2002
- [j7]J. Michael Tarn, H. Joseph Wen:
Exploring organizational expansion modes and their associated communication system requirements: consolidation and complementation. Int. J. Inf. Manag. 22(1): 3-26 (2002) - [j6]J. Michael Tarn, Muhammad A. Razi, David C. Yen, Zhuojun Xu:
Linking ERP and SCM systems. Int. J. Manuf. Technol. Manag. 4(5): 420-439 (2002) - [j5]Jyh-Horng Michael Tarn, David C. Yen, Marcus Beaumont:
Exploring the rationales for ERP and SCM integration. Ind. Manag. Data Syst. 102(1): 26-34 (2002) - [j4]Darene B. Lewis, H. Joseph Wen, J. Michael Tarn:
Managing Legal Issues in the Software Development Life Cycle. Inf. Syst. Manag. 19(3): 25-31 (2002) - 2001
- [j3]H. Joseph Wen, J. Michael Tarn:
Privacy and Security in E-Healthcare Information Management. Inf. Secur. J. A Glob. Perspect. 10(4): 1-16 (2001) - 2000
- [j2]Shahong Zheng, David C. Yen, J. Michael Tarn:
The New Spectrum of the Cross-Enterprise Solution: The Integration of Supply Chain Management and Enterprise Resources Planning Systems. J. Comput. Inf. Syst. 41(1): 84-93 (2000)
1990 – 1999
- 1998
- [j1]H. Joseph Wen, Jyh-Horng Michael Tarn:
Internet security: a case study of firewall selection. Inf. Manag. Comput. Secur. 6(4): 178-184 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint