

Publisher: IGI Global_journal
E-ISSN: 1548-7725|16|1|23-39
ISSN: 1548-7717
Source: Journal of Cases on Information Technology (JCIT), Vol.16, Iss.1, 2014-01, pp. : 23-39
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










By Ranjan Jayanthi Singh Raghuvir Bhatnagar Vishal
International Journal of Networking and Virtual Organisations, Vol. 9, Iss. 4, 2011-11 ,pp. :