E-Commerce Security Standards and Loopholes (Manuscripts) More Books by Academy of Information and Management Sciences Journal

Employee Performance Evaluation Using the Analytic Hierarchy Process (Manuscripts) Employee Performance Evaluation Using the Analytic Hierarchy Process (Manuscripts)
2003
Heuristics for Scheduling Operations in MRP: Flowshop Case (Material Requirements Planning) Heuristics for Scheduling Operations in MRP: Flowshop Case (Material Requirements Planning)
2006
The Ebay Factor: The Online Auction Solution to the Riddle of Reverse Logistics (Manuscripts) The Ebay Factor: The Online Auction Solution to the Riddle of Reverse Logistics (Manuscripts)
2005
Six Sigma and Innovation (Manuscripts) Six Sigma and Innovation (Manuscripts)
2003
Customer Relationship Management Strategies for the Internet (Company Overview) Customer Relationship Management Strategies for the Internet (Company Overview)
2001
Toward an Understanding of MIS Survey Research Methodology: Current Practices, Trends, And Implications for Future Research (Manuscripts) Toward an Understanding of MIS Survey Research Methodology: Current Practices, Trends, And Implications for Future Research (Manuscripts)
2003
Artificial Neural Network Application to Business Performance with Economic Value Added (Manuscripts) Artificial Neural Network Application to Business Performance with Economic Value Added (Manuscripts)
2003
Predicting Leadership Success in Agile Environments: An Inquiring Systems Approach (Report) Predicting Leadership Success in Agile Environments: An Inquiring Systems Approach (Report)
2010
Functional Requirements for Secure Code: The Reference Monitor and Use Case. Functional Requirements for Secure Code: The Reference Monitor and Use Case.
2009
The Role of Consultants in the Implementation of Enterprise Resource Planning Systems (Report) The Role of Consultants in the Implementation of Enterprise Resource Planning Systems (Report)
2011
Integrating Sap R/3 Applications Into a Total Quality Management Course (Manuscripts) Integrating Sap R/3 Applications Into a Total Quality Management Course (Manuscripts)
2005
Expansion Into the Future: Healthcare and Information Systems Technology. Expansion Into the Future: Healthcare and Information Systems Technology.
1999
Production & Operations Quality Concepts: Deficient Diffusion Into the Service Sector (Manuscripts) Production & Operations Quality Concepts: Deficient Diffusion Into the Service Sector (Manuscripts)
2004
Semi-Automated Identification of Faceted Categories from Large Corpora. Semi-Automated Identification of Faceted Categories from Large Corpora.
2009
Understanding the Lack of Minority Representation in Graduate Programs in Computer Science and Information Technology: A Focus Group Study of Student Perceptions (Report) Understanding the Lack of Minority Representation in Graduate Programs in Computer Science and Information Technology: A Focus Group Study of Student Perceptions (Report)
2009
Students' Personality Type and Choice of Major. Students' Personality Type and Choice of Major.
2007
Exploratory Research to Apply Leadership Theory to the Implementation of Radio Frequency Identification (Rfid) (Report) Exploratory Research to Apply Leadership Theory to the Implementation of Radio Frequency Identification (Rfid) (Report)
2010
A Social Engineering Project in a Computer Security Course. A Social Engineering Project in a Computer Security Course.
2006
Domain Names and Trademarks--the Unhappy Marriage Continues But the Rules are Clearer. Domain Names and Trademarks--the Unhappy Marriage Continues But the Rules are Clearer.
2001
Objects-First vs. Structures-First Approaches to OO Programming Education: An Empirical Study. Objects-First vs. Structures-First Approaches to OO Programming Education: An Empirical Study.
2008