Most Recent Additions*
Examining the Role of Artificial Intelligence on Modern Auditing Techniques
Parina Lotlikar and James Mohs
Effects of Product and Product Company Information on Generation Zs’ Purchasing Preferences
Steven Dahlquist and Michael Scott Garver
Industry 4.0 (I4.0) Based Virtual Organization Model for the Coordination of Sustainable Textile Supply Chain
Patanjal Kumar, Dheeraj Sharma, and Peeyush Pandey
The Role of Multiple Large Shareholders in Dividend Payouts: Evidence from India
Samridhi Suman and Shveta Singh
Carry Forward Modeling for High-Frequency Limit-Order Executions: An Emerging Market Perspective
Aritra Pan and Arun Kumar Misra
Does Absorptive Capacity Protect Shareholder Wealth in Times of Crisis? Evidence from the COVID-19 Pandemic
Amanjot Singh
When Failure is Neither Fatal nor Final: Understanding Re-internationalization Processes
Salman Ali and Ajeet N. Mathur
Why and When Do Leaders Express Humility? Leader Expressed Humility as Psycho-Social Signaling
Kelly G. Manix
Economic Freedom, Capital, and Growth: Evidence from the States
Sarah Ihlenfeld, Joshua C. Hall, and Yang Zhou
Opportunism vs. Excellence in Academia: Quality Accreditation of Collegiate Business Schools
João Ricardo Faria and Franklin G. Mixon Jr.
Presenting Volume 25 and Celebrating ABR Reviewers
Kamal Upadhyaya and Subroto Roy
Exploring the Impact of Tariffs on the U.S. Economy, FDI and Trade: Lessons from China
Kelly Flannery and James Mohs
A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy
Elie Chicha, Bechara al Bouna, Mohamed Nassar, Richard Chbeir, Ramzi A. Haraty, Mourad Oussalah, Djamal Benslimane, and Mansour Naser Alraja
A Framework for Monitoring SIP Enterprise Networks
Mohamed Nassar, Radu State, and Olivier Festor
Outbound SPIT Filter with Optimal Performance Guarantees
Tobias Jung, Sylvain Martin, Mohamed Nassar, Damien Ernst, and Guy Leduc
An SQL-like Query Tool for Data Anonymization and Outsourcing
Mohamed Nassar, Adel Al-Rahal Orabi, Marwan Doha, and Bechara al Bouna
K-NN Classification under Homomorphic Encryption: Application on a Labeled Eigen Faces Dataset
Mohamed Nassar, Nathalie Wehbe, and Bechara al Bouna
Protecting from Cloud-based SIP Flooding Attacks by Leveraging Temporal and Structural Fingerprints
Khaled Dassouki, Haidar Safa, Mohamed Nassar, and Abbas Hijazi
Throttling Malware Families in 2D
Mohamed Nassar and Haidar Safa
*Updated as of 05/16/22.