search query: @indexterm Computer security / total: 169
references: 3-12 / 169
« previous page | next page »
title | year | author | ||
3. |
Financial management : the magazine from CIMA
2004 : APR, p. 32-33 |
2004 | Corbitt, T |
|
4. |
Electronic markets
2004 : VOL. 14:4, p. 344-359 |
2004 | Kim, D.J. Sivasailam, N. Rao, H.R. |
|
5. |
Information & Management
2004 : JAN, VOL. 41:3, p. 377-397 |
2004 | Koufaris, M. Hampton-Sosa, W. |
|
6. |
Harvard Business Review
2003 : JUN, VOL. 81:6, p. 120-126 |
2003 | Austin, R.D. Darby, C.A.R. |
|
7. |
International Journal of Electronic Commerce
2002 : WINTER, VOL. 7:2, p. 143-157 |
2002 | Juang, W-S. Lei, C-L. Liaw, H-T. |
|
8. |
Research Technology Management
2001 : NOV/DEC, VOL. 44:6, p. 53-55 |
2001 | Cutler, G. |
|
9. |
Information & Management
2001 : OCT, VOL. 38:8, p. 487-498 |
2001 | Jung, B. Han, I. Lee, S. |
|
10. |
Journal of Business Ethics
2000 : DEC, VOL. 28:4, p. 279-284 |
2000 | Hilton, Thomas |
|
11. |
Connectis
2000 : OCT, 5, p. 51, 53 |
2000 | Gröndahl, B. |
|
12. |
IO Management-Zeitschrift industrielle Organisation
1999 : VOL. 68:11, p. 72-75 |
1999 | Grubenmann, R. P. |
« previous page | next page »
SCIMA