Browsing by Author rp01041

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 61 to 80 of 85 < previous   next >
TitleAuthor(s)Issue DateViews
 
Managing RFID projects in organizations
Journal:European Journal of Information Systems
2009
55
 
2011
175
 
A method for extension of generative topographic mapping for fuzzy clustering
Journal:Journal of the American Society for Information Science and Technology
2009
71
 
2005
49
 
Multi-period Design Of Survivable Wireless Access Networks Under Capacity Constraints
Proceeding/Conference:Proceedings Of The Fifth International Congress On Industrial And Applied Mathematics
2004
28
 
On returns policies with exogenous price
Journal:European Journal of Operational Research
2007
76
 
2009
47
 
2004
940
 
Phishing Is Here: Are We Ready?
Proceeding/Conference:Proceedings Of The International Multiconference Of Engineers And Computer Scientists
2006
33
 
Phishing – The New Security Threat On The Internet
Book:Advances In Enterprise Information Technology Security
2007
31
 
Predicting the survival or failure of click-and-mortar corporations
Proceeding/Conference:Proceedings - 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service, EEE-05
2005
38
 
2006
73
 
Profiling Customers of Mobile Telecommunications Services
Proceeding/Conference:Proceedings of the Eleventh Asia Pacific Conference of the Decision Sciences Institute
2006
26
 
2009
126
 
Quantitative models in support of direct marketing in electronic channels
Journal:Journal of Organizational Computing and Electronic Commerce
2009
51
 
Radio Frequency Identification For Customer Relationship Management
Book:RFID In Operations And Supply Chain Management: Research And Applications
2007
59
 
RFID And Its Use In CRM: Opportunities And Challenges
Proceeding/Conference:Second International Multiconference Of Engineers And Computer Scientists
2007
40
 
2008
62
 
A Study Of The Impact Of Announcements Of Phishing Attacks On Firm Value
Proceeding/Conference:Workshop On Information Security And Privacy
2007
29
 
2003
59