![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Lavesson Niklas
Publisher: Springer Publishing Company
ISSN: 0219-1377
Source: Knowledge and Information Systems, Vol.26, Iss.2, 2011-02, pp. : 285-307
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Ko Catherine Hurley Margaret
Information Management & Computer Security, Vol. 3, Iss. 3, 1995-03 ,pp. :