

Author: Ghosh Sid Bertisen Martijn
Publisher: Inderscience Publishers
ISSN: 1461-4111
Source: International Journal of Information Technology and Management, Vol.6, Iss.2-3, 2007-06, pp. : 250-270
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


Critical purchasing incidents in e-business
Behaviour and Information Technology, Vol. 27, Iss. 1, 2007-07 ,pp. :






By Clegg Chris W. Icasati-Johanson Belen Bennett Stuart
Behaviour and Information Technology, Vol. 20, Iss. 4, 2001-07 ,pp. :