Your search for 28144 returns 3853 document(s) |
Profiting from value-added wireless services, page 87 |
Author: Andrew B.W. | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the assessment of the strategic value of information technologies: conceptual and analytical approaches, page 239-265 |
Author: Wonseok Oh and Alain Pinsonneault | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An Empirical analysis of the value of complete information for eCRM models, page 247-267 |
Author: Balaji Padmanabhan, Zhiqiang Zheng, and Steven O. Kimbrough | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Digression and value concatenation to enable privacy-preserving regression, page 679-698 |
Author: Xiao-Bai Li and Sumit Sarkar | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The Value of Reciprocity in Online Barter Markets: An Empirical Investigation, Page 521-549 |
Author: Shun Ye, Siva Viswanathan, and Il-Horn Hann | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Operational IT Failures, IT Value Destruction, and Board-Level IT Governance Changes, Page 729-762 |
Author: Michel Benaroch and Anna Chernobai | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches, Page 893-916 |
Author: Corey M. Angst, Emily S. Block, John D’Arcy, and Ken Kelley | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Innovation killers: how financial tools destroy your capacity to do new things, page 98 |
Author: Clayton M. Christensen, Stephen P. Kaufman and Willy S. Shih | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How Does the Internet Affect the Financial Market? An Equilibrium Model of Internet-Facilitated Feedback Trading, page 17-38 |
Author: Xiaoquan (Michael) Zhang and Lihong Zhang | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Insider Threats in a Financial Institution: Analysis of Attack-Proneness of Information Systems Applications, page 91-112 |
Author: Jingguo Wang, Manish Gupta, and H. Raghav Rao | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|