

Author: Kaltenbrunner Andreas Gonzalez Gustavo Ruiz De Querol Ricard Volkovich Yana
Publisher: Taylor & Francis Ltd
ISSN: 1361-4568
Source: New Review in Hypermedia and Multimedia, Vol.17, Iss.3, 2011-12, pp. : 243-266
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, Vol. 66, Iss. 10, 2015-10 ,pp. :






International Journal of Cyber Warfare and Terrorism (IJCWT), Vol. 8, Iss. 2, 2018-04 ,pp. :