Showing results 1 to 20 of 89
next >
Title | Author(s) | Issue Date | |
---|---|---|---|
Adoption of identity theft countermeasures and its impact on market value of global firms Proceeding/Conference:Proceedings of Workshop on e-Business (WEB 2009) | 2009 | ||
An analysis of investment in identity theft countermeasures Proceeding/Conference:APBITM Proceedings | 2010 | ||
Applying Kohonen vector quantization networks for profiling customers of mobile telecommunication services Proceeding/Conference:PACIS 2006 - 10th Pacific Asia Conference on Information Systems: ICT and Innovation Economy | 2006 | ||
Are Hong Kong Banks Ready To Face Phishing Attacks? Proceeding/Conference:Third International Multiconference Of Engineers And Computer Scientists | 2008 | ||
Asia-Pacific Financial Market Forecast by Computational Methodologies Proceeding/Conference:The NTU International Conference on Economics, Finance and Accounting (IEFA) | 2008 | ||
Assessing Anti-Phishing Preparedness Among Hong Kong Banks Proceeding/Conference:Proceedings of the Eleventh Asia Pacific Conference of the Decision Sciences Institute | 2006 | ||
Assessing anti-phishing preparedness: A study of online banks in Hong Kong Journal:Decision Support Systems | 2008 | ||
Assessing the severity of phishing attacks: A hybrid data mining approach Journal:Decision Support Systems | 2011 | ||
Asynchronous transfer mode networks with parallel links and multiple service classes Journal:European Journal of Operational Research | 2003 | ||
Auto-ID: managing anything, anywhere, anytime in the supply chain Journal:Communications of the ACM | 2005 | ||
Average waiting time of customers in a priority M/D/k queue with finite buffers Journal:Computers and Operations Research | 2002 | ||
Bandwidth Packing For Priority Classes Proceeding/Conference:The International Conference on Business and Information | 2005 | ||
Bandwidth packing with priority classes Journal:European Journal of Operational Research | 2009 | ||
2008 | |||
2008 | |||
Business Data Warehouse: The Case of Wal-Mart Book:Database Modeling for Industrial Data Management: Emerging Technologies and Applications | 2006 | ||
Business Strategies For Mobile Marketing Book:Encyclopedia Of Mobile Computing And Commerce | 2007 | ||
Challenges Facing Deployment Of The Third Generation Wireless Technology In Hong Kong Proceeding/Conference:Proceedings Of The Second AIMS International Conference On Management | 2004 | ||
2009 | |||
2009 |