Skip to main content

Publisher: Emerald Group Publishing Limited

Volume 13, Number 4, 2005

An XML-based architecture for data integration in vulnerability assessments
pp. 260-273(14)
Authors: Blyth, Andrew; Thomas, Paula

Favourites:
ADD

Data mining as a technique for knowledge management in business process redesign
pp. 274-280(7)
Authors: Folorunso, O.; Ogunde, A.O.

Favourites:
ADD

Conceptualizing strategic issues in information technology outsourcing
pp. 281-296(16)
Authors: Pati, Niranjan; Desai, Mayur S.

Favourites:
ADD
Favourites:
ADD

What ERP systems can tell us about Sarbanes-Oxley
pp. 311-327(17)
Authors: Brown, William; Nasuti, Frank

Favourites:
ADD

Dynamic content attacks on digital signatures
pp. 328-336(9)
Authors: Alsaid, Adil; Mitchell, Chris J.

Favourites:
ADD

  • Access Key
  • Free content
  • Partial Free content
  • New content
  • Open access content
  • Partial Open access content
  • Subscribed content
  • Partial Subscribed content
  • Free trial content