Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-9 of 9
Mayur S. Desai
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
E‐commerce policies and customer privacy: a longitudinal study (2000‐2010)
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2012) 20 (3): 222–244.
Published: 13 July 2012
Journal Articles
Escalation and premature termination in MIS projects: the role of real options
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (4): 324–335.
Published: 10 October 2008
Journal Articles
Managing electronic information: an ethics perspective
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2008) 16 (1): 20–27.
Published: 21 March 2008
Journal Articles
Conceptualizing strategic issues in information technology outsourcing
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2005) 13 (4): 281–296.
Published: 01 September 2005
Journal Articles
Information technology project failures: Applying the bandit problem to evaluate managerial decision making
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2005) 13 (2): 135–143.
Published: 01 April 2005
Journal Articles
A global information technology model: business applications in developing economies (case studies)
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2004) 12 (5): 401–410.
Published: 01 December 2004
Journal Articles
How well are corporate ethics codes and policies applied in the trenches?: Key factors and conditions
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2004) 12 (2): 146–153.
Published: 01 April 2004
Journal Articles
E‐commerce policies and customer privacy
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2003) 11 (1): 19–27.
Published: 01 March 2003
Journal Articles
System insecurity – firewalls
Available to Purchase
Journal:
Information and Computer Security
Information Management & Computer Security (2002) 10 (3): 135–139.
Published: 01 August 2002
