-
2
-
-
0036795634
-
A value chain model for mobile data service providers
-
P.Olla, N.V.Patel. A value chain model for mobile data service providers.Telecommunications policy, Vol. 26 (2002), p.551-571.
-
(2002)
Telecommunications Policy
, vol.26
, pp. 551-571
-
-
Olla, P.1
Patel, N.V.2
-
3
-
-
79952061136
-
-
Springer, Berlin, Heidelberg
-
A.Tsalgatidou, J.Veijalainen. Mobile Electronic Commerce: Emerging Issues.Springer, Berlin, Heidelberg, (2000), p.477-486
-
(2000)
Mobile Electronic Commerce: Emerging Issues.
, pp. 477-486
-
-
Tsalgatidou, A.1
Veijalainen, J.2
-
4
-
-
84951078301
-
-
Ministry of Industry and Information Technology of the People's Republic of China
-
The 2009 Statistical Bulletin of the National Telecom Industry, Ministry of Industry and Information Technology of the People's Republic of China, (2009).
-
(2009)
The 2009 Statistical Bulletin of the National Telecom Industry
-
-
-
5
-
-
33847293679
-
Investment decisions in the wireless industry applying real options
-
F.C.Harmantzis, V.P.Tanguturi. Investment decisions in the wireless industry applying real options. Telecommunications Policy, Vol. 31, (2007), p.107-123.
-
(2007)
Telecommunications Policy
, vol.31
, pp. 107-123
-
-
Harmantzis, F.C.1
Tanguturi, V.P.2
-
6
-
-
0033170355
-
An investment view of mobile telecommunications in the European
-
H.Gruber. An investment view of mobile telecommunications in the European Union. Telecommunications Policy, Vol. 23 (1999), p.521-538.
-
(1999)
Union Telecommunications Policy
, vol.23
, pp. 521-538
-
-
Gruber, H.1
-
7
-
-
50349085556
-
Value network dynamics in 3G-4G wireless communications: A systems thinking approach to strategic value assessment
-
M.Pagani , C.H.Fine.Value network dynamics in 3G-4G wireless communications: A systems thinking approach to strategic value assessment. Journal of Business Research, Vol. 61, (2008), p.1102-1112.
-
(2008)
Journal of Business Research
, vol.61
, pp. 1102-1112
-
-
Pagani, M.1
Fine, C.H.2
-
8
-
-
33745658894
-
Migration to 3G wireless broadband internet and real options: The case of an operator in India
-
V.P.Tanguturi , F.C. Harmantzis . Migration to 3G wireless broadband internet and real options: The case of an operator in India. Telecommunications Policy, Vol. 30( 2006), p.400-419.
-
(2006)
Telecommunications Policy
, vol.30
, pp. 400-419
-
-
Tanguturi, V.P.1
Harmantzis, F.C.2
-
9
-
-
34249290047
-
Business models and financial impacts of future mobile broadband networks
-
E.Bohlin. Business models and financial impacts of future mobile broadband networks. Telematics and Informatics, Vol. 24(2007), p.217-37.
-
(2007)
Telematics and Informatics
, vol.24
, pp. 217-237
-
-
Bohlin, E.1
-
10
-
-
33748916795
-
3G telecommunication operators' challenges and roles: A perspective of mobile commerce value chain
-
Y.F, Kuo, C.W, Yu. 3G telecommunication operators' challenges and roles: A perspective of mobile commerce value chain. Technovation, Vol. 26, (2006), p.1347-56.
-
(2006)
Technovation
, vol.26
, pp. 1347-1356
-
-
Kuo, Y.F.1
Yu, C.W.2
-
11
-
-
0002544658
-
Software security and privacy risks in mobile e-commerce
-
A.K.Ghosh, T.M.Swaminatha. Software security and privacy risks in mobile e-commerce, Communications of the ACM, Vol. 44, (2001), p.51-57.
-
(2001)
Communications of the ACM
, vol.44
, pp. 51-57
-
-
Ghosh, A.K.1
Swaminatha, T.M.2
-
12
-
-
14044255310
-
The price of convenience: Privacy and mobile commerce
-
G.Ng-Kruelle, P.A.Swatman, D.S.Rebne, F.Hampe. The Price of Convenience: Privacy and Mobile Commerce. Quarterly Review of Electronic Commerce, Vol. 3, (2002), p.273-285.
-
(2002)
Quarterly Review of Electronic Commerce
, vol.3
, pp. 273-285
-
-
Ng-Kruelle, G.1
Swatman, P.A.2
Rebne, D.S.3
Hampe, F.4
-
13
-
-
50849097878
-
Privacy issues in the era of ubiquitous commerce
-
H.Galanxhi, H.Nah FF. Privacy issues in the era of ubiquitous commerce. Electronic markets, Vol. 16(2006), p.222-232.
-
(2006)
Electronic Markets
, vol.16
, pp. 222-232
-
-
Galanxhi, H.1
Nah, H.2
-
14
-
-
24644522325
-
Secure mobile business applications-framework, architecture and implementation
-
T.Walter, L.Bussard, Y.Roudier. Secure mobile business applications-framework, architecture and implementation. Information Security Technical Report, Vol. 9(2004), p.6-21.
-
(2004)
Information Security Technical Report
, vol.9
, pp. 6-21
-
-
Walter, T.1
Bussard, L.2
Roudier, Y.3
-
16
-
-
84979819452
-
Implementing the legal criteria of meaningful consent in the concept of mobile advertising
-
E, B, Cleff. Implementing the legal criteria of meaningful consent in the concept of mobile advertising. Computer Law & Security Report, Vol. 23(2007), p.262-269.
-
(2007)
Computer Law & Security Report
, vol.23
, pp. 262-269
-
-
Cleff, E.B.1
-
17
-
-
0742305249
-
Assessing legal challenges on the mobile internet
-
O.Pitkanen, M.Mantyla, M.Valimaki , J.Kemppinen. Assessing Legal Challenges on the Mobile Internet. International journal of electronic commerce. Vol. 8 (2003), p.101-120.
-
(2003)
International Journal of Electronic Commerce.
, vol.8
, pp. 101-120
-
-
Pitkanen, O.1
Mantyla, M.2
Valimaki, M.3
Kemppinen, J.4
-
21
-
-
0037291222
-
E-commerce project development risks: Evidence from a Delphi survey
-
T. Addison. E-commerce project development risks: evidence from a Delphi survey. International Journal of Information Management, Vol. 23 (2003), p.25-40.
-
(2003)
International Journal of Information Management
, vol.23
, pp. 25-40
-
-
Addison, T.1
-
22
-
-
0038041976
-
Reconciling user and project manager perceptions of IT project risk: A Delphi study
-
M.Keil, A.Tiwana, A.Bush. Reconciling user and project manager perceptions of IT project risk: a Delphi study. Information systems journal, Vol. 12, (2002), p.103-19.
-
(2002)
Information Systems Journal
, vol.12
, pp. 103-119
-
-
Keil, M.1
Tiwana, A.2
Bush, A.3
-
23
-
-
0034894377
-
Identifying software project risks: An international Delphi study
-
R.Schmidt, K.Lyytinen, M.Keil, P.Cule. Identifying software project risks: An international Delphi study. Journal of Management Information Systems, Vol. 17( 2001), p.5-36.
-
(2001)
Journal of Management Information Systems
, vol.17
, pp. 5-36
-
-
Schmidt, R.1
Lyytinen, K.2
Keil, M.3
Cule, P.4
-
26
-
-
0025791156
-
Software risk management: Principles and practices
-
B.W.Boehm . Software Risk Management: Principles and Practices. IEEE software, Vol. 8(1991), p.32.
-
(1991)
IEEE Software
, vol.8
, pp. 32
-
-
Boehm, B.W.1
-
27
-
-
0031316499
-
Managing Delphi surveys using non-parametric statistical techniques
-
R.Schmidt.Managing Delphi surveys using non-parametric statistical techniques. Decision sciences, Vol. 28(1997), p.63-74.
-
(1997)
Decision Sciences
, vol.28
, pp. 63-74
-
-
Schmidt, R.1
-
28
-
-
42249094900
-
What's wrong with risk matrices?
-
A.T.Cox Jr . What's wrong with risk matrices? Risk Analysis, Vol. 28(2008), p.497-512.
-
(2008)
Risk Analysis
, vol.28
, pp. 497-512
-
-
Cox, A.T.1
-
29
-
-
84948868795
-
Relation of profit rate to industry concentration: American manufacturing, 1936-1940
-
J.S.Bain. Relation of profit rate to industry concentration: American manufacturing, 1936-1940. The Quarterly Journal of Economics, Vol. 65 (1951), p.293-324.
-
(1951)
The Quarterly Journal of Economics
, vol.65
, pp. 293-324
-
-
Bain, J.S.1
-
31
-
-
33846076215
-
A review for mobile commerce research and applications
-
E.W.T.Ngai, A. Gunasekaran. A review for mobile commerce research and applications. Decision support systems, Vol. 43(2007), p.3-15.
-
(2007)
Decision Support Systems
, vol.43
, pp. 3-15
-
-
Ngai, E.W.T.1
Gunasekaran, A.2
|