

Author: Faisal Mohd Nishat Banwet D.K.
Publisher: Inderscience Publishers
ISSN: 1746-0972
Source: International Journal of Business Information Systems, Vol.4, Iss.1, 2008-11, pp. : 47-62
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


By Keramati Abbas Samadi Homa Nazari-Shirkouhi Salman
International Journal of Business Information Systems, Vol. 12, Iss. 2, 2013-02 ,pp. :





