

Author: Lee Cheng-Chi Hwang Min-Shiang Lin Chih-Wei
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.17, Iss.5, 2009-11, pp. : 408-417
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




By Ye WeiMing Sarrica Mauro Fortunati Leopoldina
Information, Communication and Society, Vol. 17, Iss. 7, 2014-08 ,pp. :






The Queer Sisters and its Electronic Bulletin Board
By Nip Joyce
Information, Communication and Society, Vol. 7, Iss. 1, 2004-03 ,pp. :