Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Investigation on auditing principles and rules for PDM/PLM system implementation., , , and . Computers in Industry, 64 (6): 741-753 (2013)Determinants of intangible assets value: The data mining approach., , and . Knowl.-Based Syst., (2012)An empirical study of the factors affecting Internet security for the financial industry in Taiwan., , , and . Telematics and Informatics, 23 (4): 343-364 (2006)Auditing in the e-commerce era., , and . Inf. Manag. Comput. Security, 12 (5): 389-400 (2004)Intranets for organizational innovation., and . Inf. Manag. Comput. Security, 9 (2): 80-87 (2001)Disaster recovery planning: a strategy for data security., , and . Inf. Manag. Comput. Security, 8 (5): 222-230 (2000)Enterprise integration with advanced information technologies: ERP and data warehousing., , and . Inf. Manag. Comput. Security, 11 (3): 115-122 (2003)An analytical study towards the development of a standardized IM application., , and . Computer Standards & Interfaces, 26 (4): 343-355 (2004)XML and WML integration: An analysis and strategies for implementation to meet mobile commerce challenges., , and . Computer Standards & Interfaces, 29 (1): 97-108 (2007)Bluetooth technology: an exploratory study of the analysis and implementation frameworks., , and . Computer Standards & Interfaces, 26 (4): 263-277 (2004)