E-Business and Telecommunications
暂无分享,去创建一个
[1] Michael A. Cusumano,et al. Platform Leadership How Intel, Microsoft, and Cisco Drive Industry Innovation , 2002 .
[2] Johann Cas. Ubiquitous Computing, Privacy and Data Protection: Options and Limitations to Reconcile the Unprecedented Contradictions , 2011, Computers, Privacy and Data Protection.
[3] Dimitris Gritzalis,et al. A Secure Smartphone Applications Roll-out Scheme , 2011, TrustBus.
[4] Dai Hai-qun,et al. On relationship marketing , 2005 .
[5] Dimitris Gritzalis,et al. In Cloud We Trust: Risk-Assessment-as-a-Service , 2013, IFIPTM.
[6] Christopher Pearson Fazekas. 1984 Is Still Fiction: Electronic Monitoring in the Workplace and U.S. Privacy Law , 2004 .
[7] Alicja Mikołajewicz-Woźniak,et al. Virtual currency schemes – the future of financial services , 2015 .
[8] S. Nason. Free: The future of a radical price , 2010 .
[9] Jean-Charles Rochet,et al. Cooperation Among Competitors: Some Economics of Payment Card Associations , 2002 .
[10] Byron Sharp,et al. Loyalty programs and their impact on repeat-purchase loyalty patterns , 1997 .
[11] M. Armstrong. Competition in Two-Sided Markets ¤ , 2005 .
[12] Dimitris Gritzalis,et al. Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..
[13] Pieter Ballon,et al. Business Model Scenarios for Remote Management , 2007, J. Theor. Appl. Electron. Commer. Res..
[14] G. Balabanis,et al. Bases of e-store loyalty: Perceived switching barriers and satisfaction , 2006 .
[15] Franck Dumortier. Facebook and Risks of "De-contextualization" of Information , 2010, Data Protection in a Profiled World.
[16] J. Rochet,et al. Platform competition in two sided markets , 2003 .
[17] F. Webster. The Changing Role of Marketing in the Corporation , 1992 .
[18] Bart W. Schermer,et al. The limits of privacy in automated profiling and data mining , 2011, Comput. Law Secur. Rev..
[19] F. F. Reichheld,et al. Zero defections: quality comes to services. , 1990, Harvard business review.
[20] Panayiotis Kotzanikolaou,et al. Interdependencies between Critical Infrastructures: Analyzing the Risk of Cascading Effects , 2011, CRITIS.
[21] Julie E. Cohen. Examined Lives: Informational Privacy and the Subject as Object , 2000 .
[22] Thomas Cortade. A Strategic Guide on Two-Sided Markets Applied to the ISP Market , 2007 .
[23] Nick Barker,et al. Buy now fly later: an investigation of airline frequent flyer programmes. , 1996 .
[24] Luca Buccoliero,et al. Emerging Trends in Local Governments Web Strategies - Citizen Web Empowerment Assessment in Italy , 2013, DCNET/ICE-B/OPTICS.
[25] Pieter Ballon,et al. The Platformisation of the European Mobile Industry , 2009 .
[26] Denish Shah,et al. Building and sustaining profitable customer loyalty for the 21st century , 2004 .
[27] Serge Gutwirth,et al. Regulating Profiling in a Democratic Constitutional State , 2008, Profiling the European Citizen.
[28] C. Ranaweera,et al. On the relative importance of customer satisfaction and trust as determinants of customer retention and positive word of mouth , 2003 .
[29] Patricia S. Abril,et al. Blurred Boundaries: Social Media Privacy and the Twenty‐First‐Century Employee , 2012 .
[30] Lilian Mitrou. The impact of communications data retention on fundamental rights and democracy – the case of the EU Data Retention Directive , 2010 .
[31] Alexander Osterwalder,et al. The business model ontology a proposition in a design science approach , 2004 .
[32] L. O’Malley. Can loyalty schemes really build loyalty , 1998 .
[33] U. McMahon-Beattie,et al. Influences on loyalty programme effectiveness: a conceptual framework and case study investigation , 2000 .
[34] Pieter Ballon,et al. Business Modelling Revisited: The Configuration of Control and Value , 2007 .
[35] M. Uncles,et al. Do Customer Loyalty Programs Really Work , 1997 .
[36] Dimitris Gritzalis,et al. A Formally Verified Mechanism for Countering SPIT , 2010, CRITIS.
[37] H. Chesbrough. Open Business Models: How to Thrive in the New Innovation Landscape , 2006 .