Author of the publication

Identifying critical factors for corporate implementing virtualization technology.

, , , , and . Computers in Human Behavior, 28 (6): 2244-2257 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Auditing in the e-commerce era., , and . Inf. Manag. Comput. Security, 12 (5): 389-400 (2004)Intranets for organizational innovation., and . Inf. Manag. Comput. Security, 9 (2): 80-87 (2001)Disaster recovery planning: a strategy for data security., , and . Inf. Manag. Comput. Security, 8 (5): 222-230 (2000)Enterprise integration with advanced information technologies: ERP and data warehousing., , and . Inf. Manag. Comput. Security, 11 (3): 115-122 (2003)Bluetooth technology: an exploratory study of the analysis and implementation frameworks., , and . Computer Standards & Interfaces, 26 (4): 263-277 (2004)An exploratory investigation of two internet-based communication modes., , and . Computer Standards & Interfaces, 29 (2): 238-243 (2007)An analytical study towards the development of a standardized IM application., , and . Computer Standards & Interfaces, 26 (4): 343-355 (2004)XML and WML integration: An analysis and strategies for implementation to meet mobile commerce challenges., , and . Computer Standards & Interfaces, 29 (1): 97-108 (2007)G2G information sharing among government agencies., , and . Information & Management, 51 (1): 120-128 (2014)Exploring the potential effects of emoticons., , and . Information & Management, 45 (7): 466-473 (2008)