| 461. |
Making the Right Customer Connections |
Download |
| 462. |
Management Aspects of E-Business – An Empirical Research |
Download |
| 463. |
Marketing Strategy in Creating of Brand Equity on Internet |
Download |
| 464. |
Methodology for Computer Security Incident Response Teams into IoT Strategy |
Download |
| 465. |
Multifunctional Product Marketing Using Social Media Based on the Variable-Scale Clustering |
Download |
| 466. |
Persuasive linguistic tricks in social media marketing communication—The memetic approach |
Download |
| 467. |
Selecting the Right eBusiness Channel |
Download |
| 468. |
The effectiveness of celebrities in conservation marketing |
Download |
| 469. |
Use of E-Business to Gain Competitive Advantage |
Download |
| 470. |
Using Web Engineering and Programming Languages in Documents Management |
Download |
| 471. |
VisTAS: blockchain-based visible and trusted remote authentication system |
Download |
| 472. |
AI-Driven Cyber Security Analytics and Privacy Protection |
Download |
| 473. |
Analysis of Human Factors in Cyber Security: A Case Study of Anonymous Attack on Hbgary |
Download |
| 474. |
Artificial intelligence applications in social media for depression screening: A systematic review protocol for content validity processes |
Download |
| 475. |
Big Data Analytics for Cyber Security |
Download |
| 476. |
Credit Risk Management of P2P Network Lending |
Download |
| 477. |
Cyber Forensics: Computer Security and Incident Response |
Download |
| 478. |
Cyber Security Considerations When Moving to Public Cloud Computing |
Download |
| 479. |
Cyber Security, Threat Intelligence: Defending the Digital Platform |
Download |
| 480. |
Defending againts cyberattacks |
Download |