Privacy and ethics in the age of the smartphone
暂无分享,去创建一个
[1] Marc J. Epstein,et al. The Drivers of Success in Post-Merger Integration , 2004 .
[2] Z. Ács,et al. Innovation, Market Structure, and Firm Size , 1987 .
[3] Lawrence B. Mohr,et al. Determinants of Innovation in Organizations , 1969, American Political Science Review.
[4] Yasmin Merali,et al. The strategic positioning of information systems in post-acquisition management , 1993, J. Strateg. Inf. Syst..
[5] Gary D. Ellis,et al. Measuring Flow Experiences in Daily Life: An Examination of the Items Used to Measure Challenge and Skill , 1998 .
[6] Teresa M. Amabile,et al. How to kill creativity. , 1998, Harvard business review.
[7] K. Corts,et al. Conduct parameters and the measurement of market power , 1999 .
[8] Sebastiano Bavetta,et al. Constraints and the Measurement of Freedom of Choice , 2001 .
[9] David Simpson,et al. Disaster preparedness measures: a test case development and application , 2008 .
[10] Tadao Sumi,et al. Ramp new enterprise information systems in a merger & acquisition environment: a case study , 2002 .
[11] William L. Simon,et al. The Art of Intrusion , 2005 .
[12] Frederic M. Scherer,et al. Size of Firm, Oligopoly, and Research: A Comment , 1965 .
[13] Christopher Hadnagy,et al. Social Engineering: The Art of Human Hacking , 2010 .
[14] Edwin Mansfield,et al. The Speed of Response of Firms to New Techniques , 1963 .
[15] Morton I. Kamien,et al. Market Structure and Innovation: A Survey , 1975 .
[16] Antonis C. Stylianou,et al. Post-merger systems integration: the impact on IS capabilities , 1999, Inf. Manag..
[17] R. Kaplan,et al. Linking the Balanced Scorecard to Strategy , 1996 .
[18] J. Hage,et al. Program Change and Organizational Properties a Comparative Analysis , 1967, American Journal of Sociology.
[19] S. Eisenstadt. The Political Systems of Empires , 1993 .
[20] Markus Grünwald,et al. Business Intelligence , 2009, Informatik-Spektrum.
[21] James D. Blocher,et al. Measurement of Firm Diversification: Is It Robust? , 1992 .
[22] Y. Merali,et al. Integrating information systems after a merger , 1995 .
[23] Wil Allsopp. Unauthorised Access: Physical Penetration Testing For IT Security Teams , 2009 .
[24] R. Chandy,et al. Radical Innovation in Firms Across Nations , 2008 .
[25] Antonis C. Stylianou,et al. Corporate mergers and the problems of IS integration , 1996, Inf. Manag..
[26] Thomas D. Kuczmarski. What is innovation? The art of welcoming risk , 1996 .
[27] William L. Simon,et al. The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , 2005 .
[28] U. Steger,et al. The Roles of Supervisory Support Behaviors and Environmental Policy in Employee “Ecoinitiatives” at Leading-Edge European Companies. , 2000 .
[29] Byeongju Jeong,et al. Measurement of human capital input across countries: a method based on the laborer's income , 2002 .
[30] P WillcocksLeslie,et al. An empirical investigation of information technology sourcing practices , 1998 .
[31] Ton Spil,et al. Post-merger IT integration strategies: An IT alignment perspective , 2006, J. Strateg. Inf. Syst..