461. |
Making the Right Customer Connections |
Download |
462. |
Management Aspects of E-Business – An Empirical Research |
Download |
463. |
Marketing Strategy in Creating of Brand Equity on Internet |
Download |
464. |
Methodology for Computer Security Incident Response Teams into IoT Strategy |
Download |
465. |
Multifunctional Product Marketing Using Social Media Based on the Variable-Scale Clustering |
Download |
466. |
Persuasive linguistic tricks in social media marketing communication—The memetic approach |
Download |
467. |
Selecting the Right eBusiness Channel |
Download |
468. |
The effectiveness of celebrities in conservation marketing |
Download |
469. |
Use of E-Business to Gain Competitive Advantage |
Download |
470. |
Using Web Engineering and Programming Languages in Documents Management |
Download |
471. |
VisTAS: blockchain-based visible and trusted remote authentication system |
Download |
472. |
AI-Driven Cyber Security Analytics and Privacy Protection |
Download |
473. |
Analysis of Human Factors in Cyber Security: A Case Study of Anonymous Attack on Hbgary |
Download |
474. |
Artificial intelligence applications in social media for depression screening: A systematic review protocol for content validity processes |
Download |
475. |
Big Data Analytics for Cyber Security |
Download |
476. |
Credit Risk Management of P2P Network Lending |
Download |
477. |
Cyber Forensics: Computer Security and Incident Response |
Download |
478. |
Cyber Security Considerations When Moving to Public Cloud Computing |
Download |
479. |
Cyber Security, Threat Intelligence: Defending the Digital Platform |
Download |
480. |
Defending againts cyberattacks |
Download |