Publisher: Emerald Group Publishing Limited

Related content
Volume 13, Number 2, 2005

< previous issue | all issues | next issue >

Favourites:Add to Favourites

The biometric technologies business case: a systematic approach
pp. 89-105(17)
Authors: Jr, Richard A. Riley; Kleist, Virginia Franke

Favourites:Add to Favourites

An empirical study of the effect of perceived risk upon intention to use online applications
pp. 106-120(15)
Authors: Lu, Hsi-Peng; Hsu, Chin-Lung; Hsu, Hsiu-Ying

Favourites:Add to Favourites

E-enterprise security management life cycle
pp. 121-134(14)
Authors: Shih, Stephen C.; Wen, H. Joseph

Favourites:Add to Favourites
Favourites:Add to Favourites

A conceptual model for enterprise resource planning (ERP)
pp. 144-155(12)
Authors: Marnewick, Carl; Labuschagne, Lessing

Favourites:Add to Favourites

An automated framework for managing security vulnerabilities
pp. 156-166(11)
Authors: Al-Ayed, A.; Furnell, S.M.; Zhao, D.; Dowland, P.S.

Favourites:Add to Favourites

Development of a qualitative reasoning model for financial forecasting
pp. 167-179(13)
Authors: Kesh, Someswar; Raja, M.K.

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more