

Publisher: IGI Global_journal
E-ISSN: 1947-3605|3|1|83-93
ISSN: 1947-3591
Source: International Journal of Business Intelligence Research (IJBIR), Vol.3, Iss.1, 2012-01, pp. : 83-93
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










By Waarbeek Henriëtte ter Hoebe Christian Freund Hermann Bochat Verena Kara-Zaïtr Chakib
Journal of Business Continuity & Emergency Planning, Vol. 5, Iss. 2, 2011-06 ,pp. :