

Author: Bibbo Danielle
Publisher: Palgrave Macmillan Ltd
ISSN: 2043-8869
Source: Journal of Information Technology Teaching Cases, Vol.2, Iss.1, 2012-03, pp. : 17-28
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


By Chu Samuel Kai Wah Siu Felix Liang Michael Capio Catherine M. Wu Wendy W.Y.
Online Information Review, Vol. 37, Iss. 2, 2013-04 ,pp. :








INTELLIGENT INFORMATION, KNOWLEDGE, AND TECHNOLOGY MANAGEMENT
Cybernetics and Systems, Vol. 37, Iss. 6, 2006-09 ,pp. :