Governing Information Technology (IT) and Security Vulnerabilities: Empirical Study Applied on the Jordanian Industrial Companies
暂无分享,去创建一个
[1] Mehdi Khosrowpour,et al. Annals of Cases on Information Technology , 2002 .
[2] Anatália Saraiva Martins Ramos,et al. Internet Diffusion in the Hospitality Industry , 2005, Encyclopedia of Information Science and Technology.
[3] Amar Gupta,et al. Outsourcing in the Healthcare Industry: Information Technology, Intellectual Property, and Allied Aspects , 2009 .
[4] Ronggong Song,et al. Privacy Rights Management: Implementation Scenarios , 2007, Inf. Resour. Manag. J..
[5] George C. Polyzos,et al. Mobility-Aware Grid Computing , 2009 .
[6] Antonio Cartelli,et al. Encyclopedia of Information Communication Technology , 2008 .
[7] Muhammed A. Badamas. Information Technology Project Outcomes: An Exploratory Study of Project Managers' Viewpoints , 2011, Int. J. Inf. Technol. Proj. Manag..
[8] William Haseman,et al. An Empirical Investigation of the Influences of the Degree of Interactivity on User-Outcomes in a Multimedia Environment , 2002, Inf. Resour. Manag. J..
[9] Donatella Sciuto,et al. IS management and success of an Italian fashion shoe company , 2003 .
[10] Mehdi Khosrow-Pour,et al. Printed at: , 2011 .
[11] Penelope Markellou,et al. E-Commerce Recommendation Systems , 2009 .