

Publisher: IGI Global_journal
E-ISSN: 1930-1669|7|1|45-62
ISSN: 1930-1650
Source: International Journal of Information Security and Privacy (IJISP), Vol.7, Iss.1, 2013-01, pp. : 45-62
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




By Carley K.M.
Annals of Operations Research, Vol. 75, Iss. 1, 1997-01 ,pp. :






User-driven innovation and communications development
SourceOECD Science & Information Technology, Vol. 2009, Iss. 20, 2009-11 ,pp. :