IT Major Project: Managing Copyright, Ethics, and Privacy for HDS
VerifiedAdded on 2023/06/15
|12
|2849
|186
Project
AI Summary
This project solution focuses on managing copyright, ethics, and privacy for Hosted Desktop Solutions (HDS), a company building a new business website. It includes a copyright policies and procedures document, a code of ethics document, and a privacy policy for HDS. The copyright document covers protection of intellectual property rights, trademark protection, control of website content access, and respect for personal data. The code of ethics outlines ethical responsibilities for professionals involved in website development, addressing confidentiality, data protection, and relationships with management, suppliers, clients, competitors, and employees. The privacy policy details securing confidential and transactional information, protecting customer data, and securing email messages. The project emphasizes the importance of adhering to copyright laws, privacy policies, and ethical guidelines to develop a secure and competitive website for HDS.

Running head: IT MAJOR PROJECT
Managing copyright, ethics and privacy of Hosted Desktop Solutions (HDS)
Name of the Student:
Name of the University:
Managing copyright, ethics and privacy of Hosted Desktop Solutions (HDS)
Name of the Student:
Name of the University:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1IT MAJOR PROJECT
Table of Contents
Introduction......................................................................................................................................2
1.0 Copyrights policies and procedures document..........................................................................2
2.0 Code of ethics document...........................................................................................................4
3.0 Privacy policy for HDS.............................................................................................................6
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
Table of Contents
Introduction......................................................................................................................................2
1.0 Copyrights policies and procedures document..........................................................................2
2.0 Code of ethics document...........................................................................................................4
3.0 Privacy policy for HDS.............................................................................................................6
Conclusion.......................................................................................................................................8
References........................................................................................................................................9

2IT MAJOR PROJECT
Introduction
The report is based on managing of the copyrights, ethics and privacy of Hosted Desktop
Solutions (HDS) which provides of hosted open source IT solutions to both small as well as
medium sized businesses. The company is going to build a new business website as its current
website is not managed well. The design of website is little back dated, and there is lack of
functionality into the website (Fennelly 2016). The content of website is old as well as inaccurate
which are not being updated for long time. Therefore, HDS is going to deliver hosted services
from the equipments into the premises.
In this report, copyrights policies and procedures document, code of ethics document and
privacy policies for HDS are summarized so as to mitigate the ethics and privacy related issues
into the organization. The service requirements of the clients as well as business requirement are
developed for HDS.
1.0 Copyrights policies and procedures document
The main purpose of new website design for HDS is to promote their business online for
continuing to grow as well as innovative their organizational culture to become more efficient as
well as effective. Laws as well as services in license for the copyright are established in HDS to
define the implementation of website following some of the copyright policies as well as
procedures (Campbell, Jardine and McGlynn 2016). Intellectual property rights and copyrights
policies as well as procedures are to be protected at the time of developing the website:
Protection of IP rights: Register the trademark and register the domain name which
reflects the business trademark of HDS. The domain name allows others to access of new
Introduction
The report is based on managing of the copyrights, ethics and privacy of Hosted Desktop
Solutions (HDS) which provides of hosted open source IT solutions to both small as well as
medium sized businesses. The company is going to build a new business website as its current
website is not managed well. The design of website is little back dated, and there is lack of
functionality into the website (Fennelly 2016). The content of website is old as well as inaccurate
which are not being updated for long time. Therefore, HDS is going to deliver hosted services
from the equipments into the premises.
In this report, copyrights policies and procedures document, code of ethics document and
privacy policies for HDS are summarized so as to mitigate the ethics and privacy related issues
into the organization. The service requirements of the clients as well as business requirement are
developed for HDS.
1.0 Copyrights policies and procedures document
The main purpose of new website design for HDS is to promote their business online for
continuing to grow as well as innovative their organizational culture to become more efficient as
well as effective. Laws as well as services in license for the copyright are established in HDS to
define the implementation of website following some of the copyright policies as well as
procedures (Campbell, Jardine and McGlynn 2016). Intellectual property rights and copyrights
policies as well as procedures are to be protected at the time of developing the website:
Protection of IP rights: Register the trademark and register the domain name which
reflects the business trademark of HDS. The domain name allows others to access of new
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3IT MAJOR PROJECT
website. The internet addresses which ends with “.au” are being registered into Australian
business (Bradner and Contreras 2017). In order to register with this domain name, the business
should have to meet auDA’s policy on the domain name for eligibility.
Trademark protection: The trade secrets are not disclosure to any third party person. The
organization should contain of legacy system which can protect the intellectual property of their
business (Wheelen et al. 2017). The register of trademark provides of legal protection which
prevents other business to use the same brand name.
Control of access and use of website content: The website of the business should be
accessed by only the authorized person. Online agreements are used to only limit the license to
be used the content available to the website. Encryption is used to safeguard the unlicensed use
(Cohen et al. 2015). The conditional access system should check the identity of user and then
identity the website content files.
Respect personal data of people: When the website is received of consumer information,
then it is complied with applicable data protection as well as privacy laws (American Library
Association 2016). The organization should ensure that personal identifiable information of the
consumers are protected and displayed to privacy policy of the website.
Internal material: The materials which are shared into the website are to be protected by
the copyright law. The internet carries of license in order to browse the website and create of
external link to site (Senter et al. 2017). The website should carry of copyright notice and the
copyright terms and conditions are defined scope of license granted to the end users.
website. The internet addresses which ends with “.au” are being registered into Australian
business (Bradner and Contreras 2017). In order to register with this domain name, the business
should have to meet auDA’s policy on the domain name for eligibility.
Trademark protection: The trade secrets are not disclosure to any third party person. The
organization should contain of legacy system which can protect the intellectual property of their
business (Wheelen et al. 2017). The register of trademark provides of legal protection which
prevents other business to use the same brand name.
Control of access and use of website content: The website of the business should be
accessed by only the authorized person. Online agreements are used to only limit the license to
be used the content available to the website. Encryption is used to safeguard the unlicensed use
(Cohen et al. 2015). The conditional access system should check the identity of user and then
identity the website content files.
Respect personal data of people: When the website is received of consumer information,
then it is complied with applicable data protection as well as privacy laws (American Library
Association 2016). The organization should ensure that personal identifiable information of the
consumers are protected and displayed to privacy policy of the website.
Internal material: The materials which are shared into the website are to be protected by
the copyright law. The internet carries of license in order to browse the website and create of
external link to site (Senter et al. 2017). The website should carry of copyright notice and the
copyright terms and conditions are defined scope of license granted to the end users.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4IT MAJOR PROJECT
Registering copyright: There is no such registration for the copyright protection into
Australia as well as copyright protection is dependent on the copyright notice and symbol ©. The
work is protected from time it is being recorded.
Design protection: Australia consists of framework to register the design of website into
their database. Applications for the registration in order to design the website are filed with the
design office of the IP Australia, those would assess if design of website is meet with the
legislative requirements (Adelstein and Clegg 2016).
Those procedures are to be read with the copyright which would set the outline of the
processes to manage the policy throughout the lifecycle. Those copyright policies as well as
procedures are used to manage along with establishment of the business processes based on
legislation compliance, license as well as creation of agreement to design the website (Resnik
2015). The employees of HDS follow all this copyright policies and regulations, so that a
successful website is formed and developed.
2.0 Code of ethics document
Chief Information Officer has code of ethics, used to guide the principles which help to
make decision. Codes help the client to meet with their requirements. Code of ethics help into
safe as well as efficient development of the website so that the business can gain of more sales
and gain of competitive advantage in the marketplace. The code of ethics provides framework to
the ethical responsibilities of the professionals those are involved into the website development
(Wood 2015). In order to do so, ethical guidelines are required to be adopted by HDS which are
summarized as follows:
Registering copyright: There is no such registration for the copyright protection into
Australia as well as copyright protection is dependent on the copyright notice and symbol ©. The
work is protected from time it is being recorded.
Design protection: Australia consists of framework to register the design of website into
their database. Applications for the registration in order to design the website are filed with the
design office of the IP Australia, those would assess if design of website is meet with the
legislative requirements (Adelstein and Clegg 2016).
Those procedures are to be read with the copyright which would set the outline of the
processes to manage the policy throughout the lifecycle. Those copyright policies as well as
procedures are used to manage along with establishment of the business processes based on
legislation compliance, license as well as creation of agreement to design the website (Resnik
2015). The employees of HDS follow all this copyright policies and regulations, so that a
successful website is formed and developed.
2.0 Code of ethics document
Chief Information Officer has code of ethics, used to guide the principles which help to
make decision. Codes help the client to meet with their requirements. Code of ethics help into
safe as well as efficient development of the website so that the business can gain of more sales
and gain of competitive advantage in the marketplace. The code of ethics provides framework to
the ethical responsibilities of the professionals those are involved into the website development
(Wood 2015). In order to do so, ethical guidelines are required to be adopted by HDS which are
summarized as follows:

5IT MAJOR PROJECT
i. The confidential information into the HDS is not to be disclosed by the employees to
others. It should be ensured that the information which are provided to the client are true
and it will never mislead the customers (Bradner and Contreras 2017).
ii. As per the privacy policy and norms of HDS, the confidential information are not shared
with any of the third party person and not even discussed with others.
iii. The employees should not distribute any sort of spyware into the business functions of
HDS.
iv. None of the unlicensed software is used for the business purpose. The organization
should adopt of strict policy to secure the intellectual properties and copyright policies
for development of the website (Cohen et al. 2015).
v. Most important is that the financial details are not to be shared with others as it will
become a huge loss for HDS in the future as it leads to financial loss and stolen.
vi. The social workers should be demonstrated with respect for the clients and promote of
dignity with rights as well as responsibilities (Adelstein and Clegg 2016). They also
ensure that the clients should have access to required information along with resources to
participate into the decision making.
In relation to the following responsibilities of people, code of ethics is to be followed:
1. In relation to the management functions: They carry out activities into ethical
manner. They make the code in order to guarantee the website application that it
would provide required website as per organizational requirements (Bennett and Raab
2017). The management also maintain of confidential data and information so as to
access by virtue of company’s functions.
i. The confidential information into the HDS is not to be disclosed by the employees to
others. It should be ensured that the information which are provided to the client are true
and it will never mislead the customers (Bradner and Contreras 2017).
ii. As per the privacy policy and norms of HDS, the confidential information are not shared
with any of the third party person and not even discussed with others.
iii. The employees should not distribute any sort of spyware into the business functions of
HDS.
iv. None of the unlicensed software is used for the business purpose. The organization
should adopt of strict policy to secure the intellectual properties and copyright policies
for development of the website (Cohen et al. 2015).
v. Most important is that the financial details are not to be shared with others as it will
become a huge loss for HDS in the future as it leads to financial loss and stolen.
vi. The social workers should be demonstrated with respect for the clients and promote of
dignity with rights as well as responsibilities (Adelstein and Clegg 2016). They also
ensure that the clients should have access to required information along with resources to
participate into the decision making.
In relation to the following responsibilities of people, code of ethics is to be followed:
1. In relation to the management functions: They carry out activities into ethical
manner. They make the code in order to guarantee the website application that it
would provide required website as per organizational requirements (Bennett and Raab
2017). The management also maintain of confidential data and information so as to
access by virtue of company’s functions.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6IT MAJOR PROJECT
2. In relation to the suppliers and clients: The organization should maintain ethical
relationships with supplying of goods as well as services. The organization should
select of those suppliers those business practices are to be respect with human dignity
(Squicciarini et al. 2017).
3. In relation to competitors: The competitors should gain of good faith with the
company when the organization should provide them with their desired requirements
(Liu et al. 2016). The company should achieve of market based on respect among the
competitors as well as engagement of unfair practices.
4. In relation to employees: The organization should treat the employees with respect as
well as justice into considerations into various cultural sensitivities. HDS should not
disseminate against the employees on religion, sex, race, age and nationality based on
their different social conditions (Slavin et al. 2016). The organization should not any
permit of any type of violation and harassment on the employees at the workplace.
HDS should also promote of professional development and training of the employees.
The organization guarantees health as well as safety of their employees so as to
prevent the occupational risks.
3.0 Privacy policy for HDS
The privacy policy is intended to provide information on the policies as well as practices
regards the collection of the personal information based on use of website and services (Westin
and Ruebhausen 2015). In order to develop the website, a proper strategic planning is required so
that all the privacy policies are to be followed properly. HDS has informal policies as well as
2. In relation to the suppliers and clients: The organization should maintain ethical
relationships with supplying of goods as well as services. The organization should
select of those suppliers those business practices are to be respect with human dignity
(Squicciarini et al. 2017).
3. In relation to competitors: The competitors should gain of good faith with the
company when the organization should provide them with their desired requirements
(Liu et al. 2016). The company should achieve of market based on respect among the
competitors as well as engagement of unfair practices.
4. In relation to employees: The organization should treat the employees with respect as
well as justice into considerations into various cultural sensitivities. HDS should not
disseminate against the employees on religion, sex, race, age and nationality based on
their different social conditions (Slavin et al. 2016). The organization should not any
permit of any type of violation and harassment on the employees at the workplace.
HDS should also promote of professional development and training of the employees.
The organization guarantees health as well as safety of their employees so as to
prevent the occupational risks.
3.0 Privacy policy for HDS
The privacy policy is intended to provide information on the policies as well as practices
regards the collection of the personal information based on use of website and services (Westin
and Ruebhausen 2015). In order to develop the website, a proper strategic planning is required so
that all the privacy policies are to be followed properly. HDS has informal policies as well as
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7IT MAJOR PROJECT
procedures to manage increased growth. Following are the privacy policies for the case
organization which is followed to securely development of website:
Secure the confidential information: The confidential information such as personal
information and contact information of customers are kept secured from any unauthorized access
(Waldman 2017). The personal data of customers are collected at the time of registration into the
website which may be stolen from email or any other type of communication channel. For the
visitors those are visiting the website of HDS, a log in session is required to create on the home
page so that the visitor can sign up into efficient manner.
Transactional information: The financial information of the customers may be stolen at
the time of transfer of finance from one place to other. The hackers should steal the password of
the account and then may transfer the fund from their account (Adelstein and Clegg 2016).
Therefore, all the transactional data should be kept secured with authentication password. When
the company makes links with other websites to make the transaction, then at that time there are
high chances of hacking of financial data and information.
Secure the customer’s information: The management of the personal information
includes of privacy policy. While registering the customer into the website page, HDS requires
collecting personal information of the customer such as name, age, sex, contact information and
address (Senter et al. 2017). It is the responsibility of HDS to collect information and secure
them into the company’s database so that none of unauthorized person can able to access it
without prior permission of the owner. The company can access to the personal information of
customer when it is required. Each of the privacy terms as well as conditions is applicable for the
procedures to manage increased growth. Following are the privacy policies for the case
organization which is followed to securely development of website:
Secure the confidential information: The confidential information such as personal
information and contact information of customers are kept secured from any unauthorized access
(Waldman 2017). The personal data of customers are collected at the time of registration into the
website which may be stolen from email or any other type of communication channel. For the
visitors those are visiting the website of HDS, a log in session is required to create on the home
page so that the visitor can sign up into efficient manner.
Transactional information: The financial information of the customers may be stolen at
the time of transfer of finance from one place to other. The hackers should steal the password of
the account and then may transfer the fund from their account (Adelstein and Clegg 2016).
Therefore, all the transactional data should be kept secured with authentication password. When
the company makes links with other websites to make the transaction, then at that time there are
high chances of hacking of financial data and information.
Secure the customer’s information: The management of the personal information
includes of privacy policy. While registering the customer into the website page, HDS requires
collecting personal information of the customer such as name, age, sex, contact information and
address (Senter et al. 2017). It is the responsibility of HDS to collect information and secure
them into the company’s database so that none of unauthorized person can able to access it
without prior permission of the owner. The company can access to the personal information of
customer when it is required. Each of the privacy terms as well as conditions is applicable for the

8IT MAJOR PROJECT
website to develop the business functions of HDS such as productivity, IT innovation and value
creation.
Secure the e-mail messages: The networking capability of HDS is 4 years older,
therefore their networking storage, sharing of files becomes difficult to perform. The email is
being hosted throughout the Google app, and their website is also hosted externally (Westin and
Ruebhausen 2015). When one person is shared any confidential messages throughout email,
therefore there should be use of digital signature mechanism to secure the messages so that only
authorized person can access to it. IT system monitoring along with maintenance are being taken
throughout the internal IT. The customers of HDS should deal with the staffs properly when they
gain trust (Bradner and Contreras 2017). Most of the clients think that the website should be
good enough to provide required services. The internal infrastructure is used and maintained to
meet with the performance demands of HDS.
Conclusion
It is concluded that most important is to secure the personal information of the customers
which identifies the person personally. While registering the website of a company, it is required
to collect information from the visitors to the website such as personal information, non-personal
information such as IP address, cookies and others. From the entire study, it is concluded that in
order to securely develop a website, a proper code of ethics are required to be followed. The
purpose of HDS is to develop a secured website for clients so that they can achieve competitive
advantage by following the copyright laws, privacy policies in addition to guidelines. Based on
the “Australian copyright law”, the company adopted the policies of information technology and
ensured the confidentiality, security along with availability of the data. HDS should implement
website to develop the business functions of HDS such as productivity, IT innovation and value
creation.
Secure the e-mail messages: The networking capability of HDS is 4 years older,
therefore their networking storage, sharing of files becomes difficult to perform. The email is
being hosted throughout the Google app, and their website is also hosted externally (Westin and
Ruebhausen 2015). When one person is shared any confidential messages throughout email,
therefore there should be use of digital signature mechanism to secure the messages so that only
authorized person can access to it. IT system monitoring along with maintenance are being taken
throughout the internal IT. The customers of HDS should deal with the staffs properly when they
gain trust (Bradner and Contreras 2017). Most of the clients think that the website should be
good enough to provide required services. The internal infrastructure is used and maintained to
meet with the performance demands of HDS.
Conclusion
It is concluded that most important is to secure the personal information of the customers
which identifies the person personally. While registering the website of a company, it is required
to collect information from the visitors to the website such as personal information, non-personal
information such as IP address, cookies and others. From the entire study, it is concluded that in
order to securely develop a website, a proper code of ethics are required to be followed. The
purpose of HDS is to develop a secured website for clients so that they can achieve competitive
advantage by following the copyright laws, privacy policies in addition to guidelines. Based on
the “Australian copyright law”, the company adopted the policies of information technology and
ensured the confidentiality, security along with availability of the data. HDS should implement
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9IT MAJOR PROJECT
of the ethical policies so that the employees can take proper decision regarding the development
of website. It is also summarized that the privacy policies which are adopted into HDS Company
are the legal documents which can use and manage the client’s data. Those policies are protected
the privacy information of the clients from being hacked or stolen. The content of those policies
are based on applicable law which are required to address requirements across the legal
justifications.
References
Adelstein, J. and Clegg, S., 2016. Code of ethics: A stratified vehicle for compliance. Journal of
business ethics, 138(1), pp.53-66.
American Library Association, 2016. ALA code of ethics.
Bennett, C.J. and Raab, C.D., 2017. The governance of privacy: Policy instruments in global
perspective. Routledge.
Bradner, S. and Contreras, J., 2017. Intellectual Property Rights in IETF Technology (No. RFC
8179).
Campbell, J.D., Jardine, A.K. and McGlynn, J. eds., 2016. Asset management excellence:
optimizing equipment life-cycle decisions. CRC Press.
Cohen, J.E., Loren, L.P., Okediji, R.L. and O'Rourke, M.A., 2015. Copyright in a global
information economy. Wolters Kluwer Law & Business.
Fennelly, L., 2016. Effective physical security. Butterworth-Heinemann.
of the ethical policies so that the employees can take proper decision regarding the development
of website. It is also summarized that the privacy policies which are adopted into HDS Company
are the legal documents which can use and manage the client’s data. Those policies are protected
the privacy information of the clients from being hacked or stolen. The content of those policies
are based on applicable law which are required to address requirements across the legal
justifications.
References
Adelstein, J. and Clegg, S., 2016. Code of ethics: A stratified vehicle for compliance. Journal of
business ethics, 138(1), pp.53-66.
American Library Association, 2016. ALA code of ethics.
Bennett, C.J. and Raab, C.D., 2017. The governance of privacy: Policy instruments in global
perspective. Routledge.
Bradner, S. and Contreras, J., 2017. Intellectual Property Rights in IETF Technology (No. RFC
8179).
Campbell, J.D., Jardine, A.K. and McGlynn, J. eds., 2016. Asset management excellence:
optimizing equipment life-cycle decisions. CRC Press.
Cohen, J.E., Loren, L.P., Okediji, R.L. and O'Rourke, M.A., 2015. Copyright in a global
information economy. Wolters Kluwer Law & Business.
Fennelly, L., 2016. Effective physical security. Butterworth-Heinemann.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10IT MAJOR PROJECT
Liu, F., Wilson, S., Schaub, F. and Sadeh, N., 2016, November. Analyzing vocabulary
intersections of expert annotations and topic models for data practices in privacy policies.
In 2016 AAAI Fall Symposium Series.
Resnik, D.B., 2015, December. What is ethics in research & why is it important. In ideas.
Senter, L., Bennett, R.L., Madeo, A.C., Noblin, S., Ormond, K.E., Schneider, K.W., Swan, K.
and Virani, A., 2017. National Society of Genetic Counselors Code of Ethics: Explication of
2017 Revisions. Journal of genetic counseling, pp.1-7.
Slavin, R., Wang, X., Hosseini, M.B., Hester, J., Krishnan, R., Bhatia, J., Breaux, T.D. and Niu,
J., 2016, May. Toward a framework for detecting privacy policy violations in android application
code. In Proceedings of the 38th International Conference on Software Engineering (pp. 25-36).
ACM.
Squicciarini, A.C., Lin, D., Sundareswaran, S. and Wede, J., 2015. Privacy policy inference of
user-uploaded images on content sharing sites. IEEE transactions on knowledge and data
engineering, 27(1), pp.193-206.
Waldman, A.E., 2017. A Statistical Analysis of Privacy Policy Design.
Westin, A.F. and Ruebhausen, O.M., 2015. Privacy and freedom. Ig Publishing.
Wheelen, T.L., Hunger, J.D., Hoffman, A.N. and Bamford, C.E., 2017. Strategic management
and business policy. pearson.
Wood, G.W., 2015. Communicating the ethos of codes of ethics in Australia's largest
organizations: a reliance on osmosis. In Proceedings of the 2000 Academy of Marketing Science
(AMS) Annual Conference (pp. 425-429). Springer, Cham.
Liu, F., Wilson, S., Schaub, F. and Sadeh, N., 2016, November. Analyzing vocabulary
intersections of expert annotations and topic models for data practices in privacy policies.
In 2016 AAAI Fall Symposium Series.
Resnik, D.B., 2015, December. What is ethics in research & why is it important. In ideas.
Senter, L., Bennett, R.L., Madeo, A.C., Noblin, S., Ormond, K.E., Schneider, K.W., Swan, K.
and Virani, A., 2017. National Society of Genetic Counselors Code of Ethics: Explication of
2017 Revisions. Journal of genetic counseling, pp.1-7.
Slavin, R., Wang, X., Hosseini, M.B., Hester, J., Krishnan, R., Bhatia, J., Breaux, T.D. and Niu,
J., 2016, May. Toward a framework for detecting privacy policy violations in android application
code. In Proceedings of the 38th International Conference on Software Engineering (pp. 25-36).
ACM.
Squicciarini, A.C., Lin, D., Sundareswaran, S. and Wede, J., 2015. Privacy policy inference of
user-uploaded images on content sharing sites. IEEE transactions on knowledge and data
engineering, 27(1), pp.193-206.
Waldman, A.E., 2017. A Statistical Analysis of Privacy Policy Design.
Westin, A.F. and Ruebhausen, O.M., 2015. Privacy and freedom. Ig Publishing.
Wheelen, T.L., Hunger, J.D., Hoffman, A.N. and Bamford, C.E., 2017. Strategic management
and business policy. pearson.
Wood, G.W., 2015. Communicating the ethos of codes of ethics in Australia's largest
organizations: a reliance on osmosis. In Proceedings of the 2000 Academy of Marketing Science
(AMS) Annual Conference (pp. 425-429). Springer, Cham.

11IT MAJOR PROJECT
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 12
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.