Login / Signup

The use of domination and legitimation in information systems implementation.

Zahid I. HussainNelarine E. Cornelius
Published in: Inf. Syst. J. (2009)
Keyphrases