Your search for 21580 returns 4390 document(s) |
Managing consumer privacy concerns in personalization: A strategic analysis of privacy protection, page 423-444 |
Author: Dong-Joo Lee, Jae-Hyeon Ahn, and Youngsok Bang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Counterarcting phishing page polymorphims: an image layout analysis appraoch, (LNCS-Lecture Notes in Computer Science 5576) Hal. 270-279 |
Author: Ieng-Fat Lam; Wei-Cheng Xino; Szu-Chi Wang; Kuan Ta Chen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An empirical analysis of the impact of information capabilities design on business process outsourcing performance, page 39-62 |
Author: Deepa Mani, Anitesh Barua, and Andrew Whinston | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Toward Agile: An integrated analysis of quantitative and qualitative field data on software development agility, page 87-114 |
Author: Gwanhoo Lee and Weidong Xia | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
CyberGate: a design framework and system for text analysis of computer-mediated communication, page 811-837 |
Author: Ahmed Abbasi and Hsinchun Chen | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Know yourself and know your enemy: an analysis of firm recommendations and consumer reviews in a competitive environment, page 635-654 |
Author: Wael Jabr and Zhiqiang (Eric) Zheng | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Estimating returns to training in the knowledge economy: a firm-level analysis of small and medium enterprises, page 757-771 |
Author: Amit Mehra, Nishtha Langer, Ravi Bapna, and Ram Gopal | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Looking Toward the Future of IT-Business Strategic Alignment through the Past: A Meta-Analysis, page 1059-1085 |
Author: Jennifer E. Gerow, Varun Grover, Jason Thatcher, and Philip L. Roth | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications, page 91-112 |
Author: Jingguo Wang, Manish Gupta, and H. Raghav Rao | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The “Invisible Hand” of Piracy: An Economic Analysis of the Information-Goods Supply Chain, Page 1117-1169 |
Author: Antino Kim, Atanu Lahiri, and Debabrata Dey | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|