Search Result Save to File Save as CSV
Your search for 41730 returns 3982 document(s)
Using Retweets When Shaping Our Online Persona: Topic Modeling Approach, Page 501-524
Author: Hilah Geva, Gal Oestreicher-Singer, and Maytal Saar-Tsechansky | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Trust and the Strength of Ties in Online Social Networks: An Exploratory Field Experiment, Page 115-130
Author: Ravi Bapna, Alok Gupta, Sarah Rice, and Arun Sundararajan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
The Dark Side of Reviews: The Swaying Effects of Online Product Reviews on Attribute Preference Construction, Page 427-448
Author: Qianqian Ben Liu and Elena Karahanna | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Platform or Wholesale? A Strategic Tool for Online Retailers to Benefit from Third-Party Information, Page 763-785
Author: Young Kwark, Jianqing Chen, and Srinivasan Raghunathan | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Irrational Bidders The First-price Sealed Auction And Trembling-hand Perfect Equilibrium Paper Title (V2-133--V2-136)
Author: Han Zhen-guo Wang Wen-ju Qing Lie-rong; | Call Number: SEM-328 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Alternate Distribution Strategies for Digital Music
Author: G. Prem Premkumar | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Object models: strategies, patterns and applications
Author: Coad, Peter; | Call Number: 005.1 Coa o | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Social Media Analytics, Strategies and Governance
Author: Jahankhani, Hamid Kendzierskvi, Stefan Montasari, Reza Chelvachandran, Nishan; | Type: E-book
Find Similar |  Add To Favorites |  Detail in New Window 
Computer and communications security: strategies for the 1990
Author: Cooper, James Arlin; | Call Number: 005.8 Coo c | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
E-Commerce security strategies: protecting the enterprise
Author: Cameron, Debra; | Call Number: 658.478 Cam e | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   7 8 9 10 11 12 13 14 15 16  Next