Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 14, Number 2, 2006

An empirical study of information security policy on information security elevation in Taiwan
pp. 104-115(12)
Authors: Hong, Kwo-Shing; Chi, Yen-Ping; Chao, Louis R.; Tang, Jih-Hsing

Favourites:
ADD

Distributed database damage assessment paradigm
pp. 116-139(24)
Authors: Zuo, Yanjun; Panda, Brajendra

Favourites:
ADD

IT governance, architectural competency, and the Vasa
pp. 140-154(15)
Author: Brown, William C.

Favourites:
ADD
Favourites:
ADD

E-supply chain management: an evaluation of current web initiatives
pp. 167-184(18)
Authors: Lancaster, Sean; Yen, David C.; Ku, Cheng-Yuan

Favourites:
ADD
Favourites:
ADD

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more