Leo Burnett
Steganography with RSA Algorithm
Recovery Tender Document 26th August 2013 -version 7.doc
Business Dashboard June 2015.pdf
The role of prior experience and task characteristics in object-oriented modeling: an empirical study
Training experiences and usage intentions: a field study of a graphical user interface
MIS planning: A methodology for systems prioritization
Technology diffusion in a centralized MIS environment: Experiences at Carrier
Systems development life-cycle for expert systems
Formal validation of a knowledge-based system using a variation of the Turing test
Assessing the impact of expert systems: The experiences of a small firm
Targeting COBOL programmers for C training: The role of job insecurity and organizational tenure
Copper affinity precipitation as an initial step in protein purification
Are Individual Differences Germane to the Acceptance of New Information Technologies?
A structured methodology for developing production systems
Knowledge-based model validation support for end-user computing environments
The antecedents and consequents of user perceptions in information technology adoption
RA
Equity Detail
In Dependant