

Author: Liang Yuxian Eugene Yuan Soe-Tsyr Daphne
Publisher: Emerald Group Publishing Ltd
ISSN: 1066-2243
Source: Internet Research: Electronic Networking Applications and Policy, Vol.26, Iss.1, 2016-02, pp. : 74-100
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


International Journal of Intelligent Information Technologies (IJIIT), Vol. 13, Iss. 1, 2017-01 ,pp. :





