Immediate rewards for no physical attendance at a meeting of shareholders
|
2007 |
Herik, Jaap van den |
Doing LPO business in India
|
2007 |
Bharti, Nalin |
Exploring the impact of national culture on the outcome on international technology transfer projects
|
2007 |
Steenhuis, Harm-Jan |
Evidencing trade usages : the case of encryption practices in internet banking
|
2007 |
Polanski, Paul Przemyslaw |
Constructing a "coordinated structure" in the contract for the transfer of technology
|
2007 |
Ul Haq, Hayyan |
Personal data protection, certificate service providing and e-Government : a feasible equation?
|
2007 |
Valero, Julián |
A closer look at data retention
|
2007 |
Tičar, Klemen |
The importance of live link in child abuse cases (incest)
|
2007 |
Nazeri, Norbani Mohamed |
Modelling trust relationships in Collaborative Networked Organisations
|
2007 |
Msanjila, Simon Samwel |
Towards a unified perspective of Business Process Reengeneering methodologies
|
2007 |
Abdolvand, Neda |
Technology transfer and catch-up; lessons from the commercial aircraft industry
|
2007 |
Steenhuis, Harm-Jan |
Legal and technological developments concerning e-Government services in Poland
|
2007 |
Polanski, Paul Przemysław |
Erroneous execution of payment transactions according to the new Payment Services Directive
|
2007 |
Steennot, Reinhard |
Virtual criminal law in boundless new environments
|
2007 |
Keupink, Bart J. V. |
Elimination of anonymity in regard to liability for unlawful acts on the internet
|
2007 |
Roosendaal, Arnold |
Biosorption technology : starting up an enterprise
|
2007 |
Volesky, B. |
An exploratory study of Japanese company research and development links with British universities
|
2007 |
Woolgar, Lee |
Extent of protection offered by the Indian Information Technology Act, 2000 : a case study
|
2007 |
Thakur, Harish V. |
A six-dimensional approach to online privacy
|
2007 |
Harkiolakis, Nicholas |
Nature and future of IT-security regulation
|
2007 |
Rátai, Balázs |