Information and Communications Technologies, Strategic Asymmetry and National Security
暂无分享,去创建一个
[1] The economics of crime , 1995 .
[2] Andrew J. Hoffman,et al. INSTITUTIONAL EVOLUTION AND CHANGE: ENVIRONMENTALISM AND THE US CHEMICAL INDUSTRY , 1999 .
[3] Richard Walker,et al. The Capitalist Imperative: Territory, Technology, and Industrial Growth. , 1989 .
[4] Montgomery C. Meigs. Unorthodox Thoughts about Asymmetric Warfare , 2003 .
[5] C. Sabel,et al. World of Possibilities: Flexibility and Mass Production in Western Industrialization , 1997 .
[6] L. Piacentini,et al. The Russian Mafia: Private Protection in a New Market Economy. By Federico Varese (Oxford: Oxford University Press, 2005, 304pp. £14.99 pb) , 2006 .
[7] R. Freeman,et al. The economics of crime , 1999 .
[8] Larry P. English. Information Quality: Critical Ingredient for National Security , 2005, J. Database Manag..
[9] Philip Damas,et al. MEGA-PORT GROUPS BACK SECURITY PILOT. , 2002 .
[10] M. D. Myers,et al. Critical ethnography in information systems , 1997 .
[11] M. Hitt,et al. Attributes of Successful and Unsuccessful Acquisitions of US Firms , 1998 .
[12] Dan Verton,et al. Black Ice: The Invisible Threat of Cyber-Terrorism , 2003 .
[13] W. Scott,et al. Institutions and Organizations. , 1995 .
[14] Robert C Bonner. BONNER PROPOSES 'SMART BOX' , 2002 .
[15] E. Rogers,et al. Diffusion of Innovations , 1964 .
[16] Margaret L. Johnson. Biometrics and the threat to civil liberties , 2004, Computer.
[17] Rajiv Kishore,et al. A content-analytic longitudinal study of the drivers for information technology and systems outsourcing , 2000, ICIS.
[18] Wanda J. Orlikowski,et al. Studying Information Technology in Organizations: Research Approaches and Assumptions , 1991, Inf. Syst. Res..
[19] Jeroen de Kloet. Digitisation and Its Asian Discontents: The Internet, Politics and Hacking in China and Indonesia , 2002, First Monday.
[20] Federico Varese,et al. Reviews - The Russian Mafia. Private Protection in a New Market Economy , 2001 .
[21] M. Hirsh. Bush and the World , 2002 .
[22] Simon A. Price. Understanding Contemporary Cryptography and its Wider Impact upon the General Law , 1999 .
[23] William R Baron. VOLPE ENGINEERS USE BIOMETRICS TO HELP EASE BORDER CRUSH , 1997 .
[24] S. Kelman. Making Public Policy , 1988 .
[25] José María Sierra,et al. Beware of the Security Software , 2004, Inf. Secur. J. A Glob. Perspect..
[26] R. Yin. Case Study Research: Design and Methods , 1984 .
[27] G. Götz. Monopolistic Competition and the Diffusion of New Technology , 1999 .
[28] J. C. Campbell,et al. How Nations Behave , 1979 .
[29] Özlem Öz. Using Boolean- and Fuzzy-Logic-Based Methods to Analyze Multiple Case Study Evidence in Management Research , 2004 .
[30] Douglas V. Johnson,et al. Asymmetry and U.S. Military Strategy: Definition, Background, and Strategic Concepts , 2001 .