Login / Signup
The use of domination and legitimation in information systems implementation.
Zahid I. Hussain
Nelarine E. Cornelius
Published in:
Inf. Syst. J. (2009)
Keyphrases
</>
information systems
implementation details
information technology
future development
implementation issues
information retrieval
social networks
feature selection
object oriented
information security
design science