default search action
Jackie Rees Ulmer
Person information
- affiliation: Purdue University, West Lafayette, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j19]Wenqi Shen, Yu (Jeffrey) Hu, Jackie Rees Ulmer:
Competing for Attention: An Empirical Study of Online Reviewers' Strategic Behavior. MIS Q. 39(3): 683-696 (2015) - 2014
- [j18]Matthew J. Hashim, Karthik N. Kannan, Sandra Maximiano, Jackie Rees Ulmer:
Digital Piracy, Teens, and the Source of Advice: An Experimental Study. J. Manag. Inf. Syst. 31(2): 211-244 (2014) - [j17]M. Lisa Yeo, Erik Rolland, Jackie Rees Ulmer, Raymond A. Patterson:
Risk Mitigation Decisions for IT Security. ACM Trans. Manag. Inf. Syst. 5(1): 5:1-5:21 (2014) - 2013
- [j16]Tawei Wang, Karthik N. Kannan, Jackie Rees Ulmer:
The Association Between the Disclosure and the Realization of Information Security Risk Factors. Inf. Syst. Res. 24(2): 201-218 (2013) - [j15]Juhee Kwon, Jackie Rees Ulmer, Tawei Wang:
The Association between Top Management Involvement and Compensation and Information Security Breaches. J. Inf. Syst. 27(1): 219-236 (2013) - [j14]Tawei Wang, Jackie Rees Ulmer, Karthik N. Kannan:
The Textual Contents of Media Reports of Information Security Breaches and Profitable Short-Term Investment Opportunities. J. Organ. Comput. Electron. Commer. 23(3): 200-223 (2013)
2000 – 2009
- 2008
- [j13]Subhajyoti Bandyopadhyay, Jackie Rees, John M. Barron:
Reverse Auctions with Multiple Reinforcement Learning Agents. Decis. Sci. 39(1): 33-63 (2008) - [j12]Jackie Rees, Jonathan P. Allen:
The State of Risk Assessment Practices in Information Security: An Exploratory Investigation. J. Organ. Comput. Electron. Commer. 18(4): 255-277 (2008) - [c4]Tawei Wang, Jackie Rees, Karthik N. Kannan:
Reading the Disclosures with New Eyes: Bridging the Gap between Information Security Disclosures and Incidents. WEIS 2008 - 2007
- [j11]Joobin Choobineh, Gurpreet Dhillon, Michael R. Grimaila, Jackie Rees:
Management of Information Security: Challenges and Research Directions. Commun. Assoc. Inf. Syst. 20: 57 (2007) - [j10]Karthik N. Kannan, Jackie Rees, Sanjay Sridhar:
Market Reactions to Information Security Breach Announcements: An Empirical Analysis. Int. J. Electron. Commer. 12(1): 69-91 (2007) - 2006
- [j9]Subhajyoti Bandyopadhyay, Jackie Rees, John M. Barron:
Simulating sellers in online exchanges. Decis. Support Syst. 41(2): 500-513 (2006) - [j8]Mukul Gupta, Jackie Rees, Alok R. Chaturvedi, Jie Chi:
Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. Decis. Support Syst. 41(3): 592-603 (2006) - [j7]Jackie Rees, Gary J. Koehler:
Learning genetic algorithm parameters using hidden Markov models. Eur. J. Oper. Res. 175(2): 806-820 (2006) - 2005
- [c3]Sanjay Sridhar, Kemal Altinkemer, Jackie Rees:
Software Vulnerabilities: Open Source versus Proprietary Software Security. AMCIS 2005: 428 - 2004
- [j6]Jackie Rees, Gary J. Koehler:
Modeling search in group decision support systems. IEEE Trans. Syst. Man Cybern. Part C 34(3): 237-244 (2004) - 2003
- [j5]Jackie Rees, Subhajyoti Bandyopadhyay, Eugene H. Spafford:
PFIRES: a policy framework for information security. Commun. ACM 46(7): 101-106 (2003) - [c2]Subhajyoti Bandyopadhyay, Alok R. Chaturvedi, John M. Barron, Jackie Rees, Shailendra Raj Mehta:
Simulating Sellers' Behavior in a Reverse Auction B2B Exchange. International Conference on Computational Science 2003: 365-374 - 2002
- [j4]Jackie Rees, Gary J. Koehler:
An Evolutionary Approach to Group Decision Making. INFORMS J. Comput. 14(3): 278-292 (2002) - [j3]Jackie Rees, Gary J. Koehler:
Evolution in Groups: A Genetic Algorithm Approach to Group Decision Support Systems. Inf. Technol. Manag. 3(3): 213-227 (2002) - 2001
- [j2]Jackie Rees, Reza Barkhi:
The problem of highly constrained tasks in group decision support systems. Eur. J. Oper. Res. 135(1): 220-229 (2001) - 2000
- [j1]Jackie Rees, Gary J. Koehler:
Leadership and group search in group decision support systems. Decis. Support Syst. 30(1): 73-82 (2000)
1990 – 1999
- 1999
- [c1]Jackie Rees, Gary J. Koehler:
Brainstorming, Negotiating and Learning in Group Decision Support Systems: An Evolutionary Approach. HICSS 1999
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint