

Publisher: IGI Global_journal
E-ISSN: 1548-1123|1|3|56-68
ISSN: 1548-1115
Source: International Journal of Enterprise Information Systems (IJEIS), Vol.1, Iss.3, 2005-07, pp. : 56-68
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










Quality Assurance: Good Practice, Regulation, and Law, Vol. 9, Iss. 3-4, 2002-07 ,pp. :