Information Management & Computer Security
暂无分享,去创建一个
Zeng H. Joseph | Wen David | C. Yen | Wen David | C. Yen
[1] Ravinder Nath,et al. Success factors for domestic and international electronic data interchange (EDI) implementation for US firms , 2001, Int. J. Inf. Manag..
[2] Richard L. Sites,et al. Alpha Architecture Reference Manual , 1995 .
[3] Adam P. Vrechopoulos,et al. CRM literature: conceptual and functional insights by keyword analysis , 2009 .
[4] Kallol Das,et al. Relationship marketing research (1994‐2006) , 2009 .
[5] Stephen P. Morse,et al. The 80286 Architecture , 1986 .
[6] Alain Yee-Loong Chong,et al. Security mechanism in computer network environment: A study of adoption status in Malaysian company , 2009 .
[7] Amir Albadvi,et al. Mapping B2B value exchange in marketing relationships: a systematic approach , 2011 .
[8] Elliott I. Organick,et al. The multics system: an examination of its structure , 1972 .
[9] R. Dale Wilson,et al. Using clickstream data to enhance business‐to‐business web site performance , 2010 .
[10] Călin Gurău. Digital B2B interactions in Romania , 2007 .
[11] E. W. T. Ngai,et al. A literature review and classification of electronic commerce research , 2002, Inf. Manag..
[12] Ming-Hsien Yang,et al. Applying internet-based information systems to facilitate business alliance activities , 2007, Ind. Manag. Data Syst..