Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 14, Number 2, 2006

An empirical study of information security policy on information security elevation in Taiwan
pp. 104-115(12)
Authors: Hong, Kwo-Shing; Chi, Yen-Ping; Chao, Louis R.; Tang, Jih-Hsing

Favourites:
ADD

Distributed database damage assessment paradigm
pp. 116-139(24)
Authors: Zuo, Yanjun; Panda, Brajendra

Favourites:
ADD

IT governance, architectural competency, and the Vasa
pp. 140-154(15)
Author: Brown, William C.

Favourites:
ADD
Favourites:
ADD

E-supply chain management: an evaluation of current web initiatives
pp. 167-184(18)
Authors: Lancaster, Sean; Yen, David C.; Ku, Cheng-Yuan

Favourites:
ADD
Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content
Cookie Policy
X
Cookie Policy
Ingenta Connect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more