Browsing by Author rp01041

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 61 to 80 of 85 < previous   next >
TitleAuthor(s)Issue DateViews
 
Managing RFID projects in organizations
Journal:European Journal of Information Systems
2009
56
 
2011
184
 
A method for extension of generative topographic mapping for fuzzy clustering
Journal:Journal of the American Society for Information Science and Technology
2009
75
 
2005
58
 
Multi-period Design Of Survivable Wireless Access Networks Under Capacity Constraints
Proceeding/Conference:Proceedings Of The Fifth International Congress On Industrial And Applied Mathematics
2004
30
 
On returns policies with exogenous price
Journal:European Journal of Operational Research
2007
81
 
2009
55
 
2004
1152
 
Phishing Is Here: Are We Ready?
Proceeding/Conference:Proceedings Of The International Multiconference Of Engineers And Computer Scientists
2006
33
 
Phishing – The New Security Threat On The Internet
Book:Advances In Enterprise Information Technology Security
2007
31
 
Predicting the survival or failure of click-and-mortar corporations
Proceeding/Conference:Proceedings - 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE-05
2005
40
 
2006
76
 
Profiling Customers of Mobile Telecommunications Services
Proceeding/Conference:Proceedings of the Eleventh Asia Pacific Conference of the Decision Sciences Institute
2006
28
 
2009
137
 
Quantitative models in support of direct marketing in electronic channels
Journal:Journal of Organizational Computing and Electronic Commerce
2009
53
 
Radio Frequency Identification For Customer Relationship Management
Book:RFID In Operations And Supply Chain Management: Research And Applications
2007
62
 
RFID And Its Use In CRM: Opportunities And Challenges
Proceeding/Conference:Second International Multiconference Of Engineers And Computer Scientists
2007
43
 
2008
68
 
A Study Of The Impact Of Announcements Of Phishing Attacks On Firm Value
Proceeding/Conference:Workshop On Information Security And Privacy
2007
30
 
2003
60