

Author: Maitland Carleen F
Publisher: Palgrave Macmillan Ltd
ISSN: 1466-4437
Source: Journal of Information Technology, Vol.27, Iss.4, 2012-12, pp. : 285-300
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Censorship, new technology and libraries
By Wilson David
The Electronic Library, Vol. 26, Iss. 5, 2008-10 ,pp. :



