Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 13, Number 2, 2005

The biometric technologies business case: a systematic approach
pp. 89-105(17)
Authors: Jr, Richard A. Riley; Kleist, Virginia Franke

Favourites:
ADD

An empirical study of the effect of perceived risk upon intention to use online applications
pp. 106-120(15)
Authors: Lu, Hsi-Peng; Hsu, Chin-Lung; Hsu, Hsiu-Ying

Favourites:
ADD

E-enterprise security management life cycle
pp. 121-134(14)
Authors: Shih, Stephen C.; Wen, H. Joseph

Favourites:
ADD
Favourites:
ADD

A conceptual model for enterprise resource planning (ERP)
pp. 144-155(12)
Authors: Marnewick, Carl; Labuschagne, Lessing

Favourites:
ADD

An automated framework for managing security vulnerabilities
pp. 156-166(11)
Authors: Al-Ayed, A.; Furnell, S.M.; Zhao, D.; Dowland, P.S.

Favourites:
ADD

Development of a qualitative reasoning model for financial forecasting
pp. 167-179(13)
Authors: Kesh, Someswar; Raja, M.K.

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content