Search Result Save to File Save as CSV
Your search for 28144 returns 3853 document(s)
Profiting from value-added wireless services, page 87
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
On the assessment of the strategic value of information technologies: conceptual and analytical approaches, page 239-265
Author: Wonseok Oh and Alain Pinsonneault | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
An Empirical analysis of the value of complete information for eCRM models, page 247-267
Author: Balaji Padmanabhan, Zhiqiang Zheng, and Steven O. Kimbrough | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Digression and value concatenation to enable privacy-preserving regression, page 679-698
Author: Xiao-Bai Li and Sumit Sarkar | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Value of Reciprocity in Online Barter Markets: An Empirical Investigation, Page 521-549
Author: Shun Ye, Siva Viswanathan, and Il-Horn Hann | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Operational IT Failures, IT Value Destruction, and Board-Level IT Governance Changes, Page 729-762
Author: Michel Benaroch and Anna Chernobai | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Innovation killers: how financial tools destroy your capacity to do new things, page 98
Author: Clayton M. Christensen, Stephen P. Kaufman and Willy S. Shih | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
How Does the Internet Affect the Financial Market? An Equilibrium Model of Internet-Facilitated Feedback Trading, page 17-38
Author: Xiaoquan (Michael) Zhang and Lihong Zhang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications, page 91-112
Author: Jingguo Wang, Manish Gupta, and H. Raghav Rao | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   2 3 4 5 6 7 8 9 10 11  Next