Skip to main content


Information Systems Frontiers

Information Systems Frontiers 1/2008

Ausgabe 1/2008

Inhaltsverzeichnis ( 9 Artikel )

01.03.2008 | Ausgabe 1/2008


R. Ramesh, H. R. Rao

01.03.2008 | Ausgabe 1/2008

Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation

Janice C. Sipior, Burke T. Ward

01.03.2008 | Ausgabe 1/2008

Formalising theories of trust for authentication protocols

Ji Ma, Mehmet A. Orgun

01.03.2008 | Ausgabe 1/2008

A scalable multi-level feature extraction technique to detect malicious executables

Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham

01.03.2008 | Ausgabe 1/2008

Building effective online game websites with knowledge-based trust

Clyde W. Holsapple, Jiming Wu

01.03.2008 | Ausgabe 1/2008

Market reaction to patent infringement litigations in the information technology industry

T. S. Raghu, Wonseok Woo, S. B. Mohan, H. Raghav Rao

01.03.2008 | Ausgabe 1/2008

Spectrum acquisition strategies adopted by wireless carriers in the USA

Hemant K. Sabat

01.03.2008 | Ausgabe 1/2008

Techno-economic analysis and empirical study of network broadband investment: The case of backbone upgrading

Borka Jerman-Blažič

01.03.2008 | Ausgabe 1/2008

A decision support system for locating VHF/UHF radio jammer systems on the terrain

Cevriye Gencer, Emel Kizilkaya Aydogan, Coskun Celik

Aktuelle Ausgaben

Premium Partner