Information infrastructure (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Information infrastructure" in English language version.

refsWebsite
Global rank English rank
1st place
1st place
2nd place
2nd place
2,613th place
2,294th place
11th place
8th place
4,969th place
3,370th place
low place
low place
5th place
5th place
2,435th place
1,699th place
low place
low place
low place
low place

apdip.net (Global: low place; English: low place)

doi.org (Global: 2nd place; English: 2nd place)

doi.org

dx.doi.org

isaca.org (Global: low place; English: low place)

  • Pironti, J. P. (2006). "Key Elements of a Threat and Vulnerability Management Program" (PDF). INFORMATION SYSTEMS AUDIT AND CONTROL Shyam ASSOCIATION. 3: 52–56. Archived from the original (PDF) on 11 June 2014. Retrieved 17 September 2010.

pwgsc.gc.ca (Global: low place; English: low place)

dsp-psd.pwgsc.gc.ca

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

techtarget.com (Global: 2,435th place; English: 1,699th place)

searchcio.techtarget.com

  • "SearchCIO.com". Global Information Infrastructure. SearchCIO.com. Retrieved 25 October 2011.

uio.no (Global: 2,613th place; English: 2,294th place)

heim.ifi.uio.no

usaid.gov (Global: 4,969th place; English: 3,370th place)

  • "USAID". USAID Leland Initiative: Leland Activity Update. USAID. Archived from the original on 29 October 2011. Retrieved 25 October 2011.
  • "USAID Leland Initiative". Leland Initiative: Africa GII Gateway Project Project Description & Frequently Asked Questions. USAID. Archived from the original on 29 October 2011. Retrieved 25 October 2011.

web.archive.org (Global: 1st place; English: 1st place)

  • Hanseth, Ole (2002). KD "From systems and tools to networks and infrastructures – From design to cultivation. Towards a theory of ICT solutions and its design methodology implications Archived 14 August 2018 at the Wayback Machine, accessed 21 September 2004
  • Pironti, J. P. (2006). "Key Elements of a Threat and Vulnerability Management Program" (PDF). INFORMATION SYSTEMS AUDIT AND CONTROL Shyam ASSOCIATION. 3: 52–56. Archived from the original (PDF) on 11 June 2014. Retrieved 17 September 2010.
  • Bygstad, Bendik (2008). "Information infrastructure as an organization: a critical realist view." Retrieved from http://heim.ifi.uio.no/~phddays/15thPhDDays/Documents/Paper_Bendik.pdf Archived 25 May 2013 at the Wayback Machine
  • "USAID". USAID Leland Initiative: Leland Activity Update. USAID. Archived from the original on 29 October 2011. Retrieved 25 October 2011.
  • "USAID Leland Initiative". Leland Initiative: Africa GII Gateway Project Project Description & Frequently Asked Questions. USAID. Archived from the original on 29 October 2011. Retrieved 25 October 2011.

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org