Academic literature on the topic 'Computer based information systems'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer based information systems.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer based information systems"

1

Lepper, Adrian. "Computer-based information systems." Data Processing 27, no. 8 (October 1985): 49. http://dx.doi.org/10.1016/0011-684x(85)90242-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Partin, Mary H., and Mary Lou Monahan. "Computer-based information systems models." Journal of Medical Systems 9, no. 1-2 (April 1985): 5–18. http://dx.doi.org/10.1007/bf00992518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Goodyear, Terry. "Organising Computer‐based Information Systems Resources." Industrial Management & Data Systems 85, no. 7/8 (July 1985): 11–16. http://dx.doi.org/10.1108/eb057407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Allert, Jeffrey, and Brian H. Kleiner. "Developments in computer‐based information systems." Logistics Information Management 10, no. 5 (October 1997): 195–98. http://dx.doi.org/10.1108/09576059710174298.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frieder, Ophir. "On scalable (computer-based) information systems." Bulletin of the American Society for Information Science and Technology 34, no. 2 (September 17, 2008): 29–32. http://dx.doi.org/10.1002/bult.2008.1720340209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Albury, David. "Security of computer based information systems." Data Processing 28, no. 7 (September 1986): 380. http://dx.doi.org/10.1016/0011-684x(86)90157-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Alvarez, Jorge, and Peter Nuthall. "Adoption of computer based information systems." Computers and Electronics in Agriculture 50, no. 1 (January 2006): 48–60. http://dx.doi.org/10.1016/j.compag.2005.08.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kar Yan Tarn. "Computer-based security trading systems." Journal of Information Science 15, no. 6 (December 1989): 345–54. http://dx.doi.org/10.1177/016555158901500606.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Alshammari, Majid, and Christian Bach. "Defense Mechanisms for Computer-Based Information Systems." International Journal of Network Security & Its Applications 5, no. 5 (September 30, 2013): 107–14. http://dx.doi.org/10.5121/ijnsa.2013.5509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kimble, Chris, and Kevin McLoughlin. "Computer based information systems and managers' work." New Technology, Work and Employment 10, no. 1 (March 1995): 56–67. http://dx.doi.org/10.1111/j.1468-005x.1995.tb00005.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer based information systems"

1

Onyino, Walter. "Rearchitecting legacy information systems : a service based method." Thesis, Lancaster University, 2001. http://eprints.lancs.ac.uk/11941/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Katoma, Victor. "A framework for computer-based knowledge management systems." Master's thesis, University of Cape Town, 2007. http://hdl.handle.net/11427/6406.

Full text
Abstract:
Includes bibliographical references (leaves 83-92).
This study aims at investigating a framework that utilises the latest advances in KMS technology. This research outlines the framework and describes a system developed around this. The framework is based on fundamental knowledge management concepts, Resource Description Framework (RDF) and basic modeling concepts and tools. It also incorporates notions of knowledge quality measure and a simple inference mechanism in order to probe, learn and adapt the KMS with the changing needs of its users.
APA, Harvard, Vancouver, ISO, and other styles
3

Blair, Garry John. "A management framework for implementing computer-based information systems." Thesis, Manchester Metropolitan University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.418125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Clarke, Stephen Allen. "Critical complementarism and information systems : a total systems approach to computer-based information systems strategy and development." Thesis, Brunel University, 1997. http://bura.brunel.ac.uk/handle/2438/4284.

Full text
Abstract:
This thesis is about intervening in organisations to improve both operational and strategic computer-based information systems. It addresses a particular situation, in which human activity is seen to be a key factor in the success of the system. A stance is taken regarding current approaches to such development, supported by historical analysis of both the theory and practice of such approaches: in particular, the failure of traditional information systems development methodologies to address these situations is seen to question their validity. A review of existing theory and practice shows that computer-based information systems development appears to be dominated by functionalist, reductionist, engineering methods, marginally challenged by soft, interpretivist approaches. Analysis of the computer-based information systems development domain shows this to be an impoverished view, and indicates that an approach based on social systems is likely to be more representative of the problem situations faced. As a result, computer-based information systems development is taken beyond the 'hard-soft' debate, into a search for theoretical underpinning and practical approaches informed from social theory. However, whilst the theory is readily available, the application of that theory to computer-based information systems development is seen to be problematic. Potential improvement is achieved by the development of an interventionist framework which is based on a branch of social systems theory, that of critical social theory, and which draws heavily on work already undertaken in the domain of management science under the headings of critical systems thinking and total systems intervention. This framework is applied to two case studies and a major, longitudinal action research based investigation. The findings strongly support computer-based information systems development based on social, and especially critical social, theories. These findings are critiqued within the study, and from this emerge clear conclusions, and recommendations for future development.
APA, Harvard, Vancouver, ISO, and other styles
5

Gregory, Frank Hutson. "A logical analysis of soft systems modelling : implications for information system design and knowledge based system design." Thesis, University of Warwick, 1993. http://wrap.warwick.ac.uk/2888/.

Full text
Abstract:
The thesis undertakes an analysis of the modelling methods used in the Soft Systems Methodology (SSM) developed by Peter Checkland and Brian Wilson. The analysis is undertaken using formal logic and work drawn from modern Anglo-American analytical philosophy especially work in the area of philosophical logic, the theory of meaning, epistemology and the philosophy of science. The ability of SSM models to represent causation is found to be deficient and improved modelling techniques suitable for cause and effect analysis are developed. The notional status of SSM models is explained in terms of Wittgenstein's language game theory. Modal predicate logic is used to solve the problem of mapping notional models on to the real world. The thesis presents a method for extending SSM modelling in to a system for the design of a knowledge based system. This six stage method comprises: systems analysis, using SSM models; language creation, using logico-linguistic models; knowledge elicitation, using empirical models; knowledge representation, using modal predicate logic; codification, using Prolog; and verification using a type of non-monotonic logic. The resulting system is constructed in such a way that built in inductive hypotheses can be falsified, as in Karl Popper's philosophy of science, by particular facts. As the system can learn what is false it has some artificial intelligence capability. A variant of the method can be used for the design of other types of information system such as a relational database.
APA, Harvard, Vancouver, ISO, and other styles
6

Susarapu, Santa Ram. "ALIGNING SECURITY AND USABILITY OBJECTIVES FOR COMPUTER BASED INFORMATION SYSTEMS." VCU Scholars Compass, 2012. http://scholarscompass.vcu.edu/etd/2866.

Full text
Abstract:
With extensive use of information systems in day-to-day business operations, many organizations are facing challenges to develop robust computer-based information systems that are secure and widely used by the user community. In order to develop information systems that are secure and useful, understanding what stakeholders consider important and value about the security and usability is critical. Security refers to confidentiality, integrity and availability and usability refers to efficiency, effectiveness and user satisfaction. Using Value Focused Thinking approach, this research first proposes the usability objectives based on the values of system developers and users. Using the security objectives proposed by Dhillon & Torkzadeh (2006) and the usability objectives, this research proposes hierarchies with the overall/over-arching goals of security (confidentiality, integrity, availability) and/or usability (efficiency, effectiveness and satisfaction). This research also analyzes a case of computer hacking and identifies which of the security and usability objectives that have not been met in that case study. The research contributions which include the usability objectives and security and usability hierarchies can be useful for theoretical as well as practical purposes.
APA, Harvard, Vancouver, ISO, and other styles
7

Mancuso, Vincent M. "Fighter Pilot Ground-Based Information Acquisition: A Conceptual Model for Information Systems Design." NSUWorks, 1993. http://nsuworks.nova.edu/gscis_etd/696.

Full text
Abstract:
The primary purpose of this dissertation was to develop a conceptual model for information systems design based on a qualitative analysis of the fighter pilot's environment. The model was derived from the fighter pilot's conceptions and perceptions of his informational environment. The resultant model and the corresponding environmental specification can serve as the conceptual cornerstones for further development by providing the designers a common conceptual focal point for further information system design. The model used for overall information systems design was the Rolland & Cauvet development model. This model identifies two independent development domains: requirements engineering and design engineering. This dissertation represents the requirements engineering work. The approach selected in developing the requirements engineering aspect was Checkland's Soft Systems approach. Checkland's approach was suited to this project due to its model building orientation and its ability to handle the complexity and flexibility dictated by real-world human activity. The cognitive model, recommendations, hypotheses, and conclusions serve as an important step toward development of the fighter pilot's ground-based information system. There had been very little research, however, that addressed the cognitive structure and processes pilots use to develop memory frames necessary for airborne situational awareness. The goal of this project was to develop the first stage of a process leading to an inquiry system that will be used to augment the pilot's inquiry and conceptual structure building to capture the inherent complexity of this multidimensional environment, the researcher observed fighter pilots in their natural environment utilizing the multiple-site case study methodology supplemented by other qualitative data sources. The researcher utilized these data to develop the conceptual model. In addition, findings were derived, recommendations were generated and hypotheses were extracted using the Checkland model as a guide. The Glaser and Struass Constant Comparative Method was used for data analysis. The researcher identified the information environment as having two distinctly different components: structure and process. Seven versions of the model were presented in this iterative development effort. The dissertation is concluded with a series of recommendations, implications and conclusions that serve as the link between the conceptual model and the future work on the information system that will be completed by design engineers.
APA, Harvard, Vancouver, ISO, and other styles
8

Lycett, Mark Geoffrey. "The development of component-based evolutionary information systems." Thesis, Brunel University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mena, Eduardo Illarramendi Arantza. "Ontology-based query processing for global information systems /." Boston [u.a.] : Kluwer Acad. Publ, 2001. http://www.loc.gov/catdir/enhancements/fy0813/2001029621-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Booth, Ronald L. "An Information Systems Project Delivery Methodology for Implementing Web-Based Program Management Systems." NSUWorks, 2003. http://nsuworks.nova.edu/gscis_etd/420.

Full text
Abstract:
In this study the researcher applied an Information Systems Project Delivery Methodology (ISPDM) for implementing a Web-based Program Management System in an organization that did not have one. The problem investigated in this study was the difficulty encountered when organizations implement ISPDMs. The research questions were (1) what is the role of each of Roberts' et al. five factors in the implementation of an ISPDM? And (2) how effective is a Web-based program management system implemented using an ISPDM in meeting the participants desired outcomes? The general approach utilized to address the research questions was to describe the implementation of a Web-based program management ISPDM using a single descriptive case study. A survey, focus group, and usability testing were utilized at three different stages of the Web-based program management module's implementation. In conducting this study research, multiple sources of data were collected to develop an in-depth description of the case as it developed. The open-ended survey was given at three different points, the beginning, the middle and the end of the ISPDM Web based program management module implementation. A focus group was conducted for planning evaluation to assess the participant's desired outcomes for the Web-based program management system. A focus group for in-process evaluation assessed the extent to which the Web-based program management module achieved the outcome measures. A focus group for summative evaluation determined whether or not the final product met the expectations of the users. In addition, a usability survey was conducted in conjunction with the in-process and summative evaluation focus groups. The results of this study indicated the role of organizational transition when implementing a Web-based program management system using an ISPDM is to provide training, education, and communications. The role of functional management involvement/support during the implementation process is to provide resources and lead the process of adopting the new methodology. The role of the ISPDM during the transition stage is to communicate the change and to foster cultural integration, provide a framework for using the product, and to provide training. The role of the use of software development models in the implementation process is to provide guidelines, framework, metrics, and to lend credibility to the value of the methodology. The role of external support during the implementation process is to provide an industry-wide knowledge base, oversight, and an independent review of the new methodology.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer based information systems"

1

Computer based information systems. Homewood, Ill: R.D. Irwin, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Imel, Susan. Computer-based career information systems. Columbus, OH: ERIC Clearinghouse on Adult, Career, and Vocational Education, Center on Education and Training for Employment, College of Education, the Ohio State University, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Partridge, D. Knowledge-based information systems. London: McGraw-Hill, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Security of computer based information systems. Houndmills, Basingstoke, Hampshire: Macmillan Education, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walker, D. W. Computer-based information systems: An introduction. 2nd ed. Sydney: Pergamon Press, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lane, V. P. Security of computer based information systems. Basingstoke: Macmillan, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lane, V. P. Security of Computer Based Information Systems. London: Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-18011-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

McLeod, Raymond. Management information systems: A study of computer-based information systems. 4th ed. New York: Macmillan, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

McLeod, Raymond. Management information systems: A study of computer-based information systems. 6th ed. Englewood Cliffs, N.J: Prentice Hall, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

McLeod, Raymond. Management information systems: A study of computer-based information systems. 5th ed. New York: Macmillan Pub. Co., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer based information systems"

1

Cooley, William W., and William E. Bickel. "Computer-Based Information Systems." In Decision-Oriented Educational Research, 239–51. Dordrecht: Springer Netherlands, 1986. http://dx.doi.org/10.1007/978-94-009-4227-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cooley, William W., and William E. Bickel. "Computer-Based Information Systems." In Decision-Oriented Educational Research, 73–82. Dordrecht: Springer Netherlands, 1986. http://dx.doi.org/10.1007/978-94-009-4227-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anderson, Roy. "Economics of Computer-Based Information Systems." In Management, Information Systems and Computers, 238–49. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-18419-4_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Peters, Georg, Tom Rückert, and Jan Seruga. "A Computer-Based Framework Supporting Education in STEM Subjects." In Enterprise Information Systems, 1–21. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26169-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Seffah, Ahmed. "Patterns in Web-Based Information Systems." In Human–Computer Interaction Series, 181–217. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15687-3_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bosc, Patrick, Vincent Claveau, Olivier Pivert, and Laurent Ughetto. "Graded-Inclusion-Based Information Retrieval Systems." In Lecture Notes in Computer Science, 252–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00958-7_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Miller, David R. "Knowledge-based systems coupled with geographic information systems." In Lecture Notes in Computer Science, 143–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58795-0_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weihs, Claus, and Wolfgang Seewald. "Computer-based Design of Experiments in Industry." In Data Analysis and Information Systems, 272–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/978-3-642-80098-6_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Doyle, D. John. "Computer-Based Oxygen Transport Scenario Analysis: A New Web-Based Medical Education Resource." In Annals of Information Systems, 191–204. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-1274-9_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tang, Paul C., and Clement J. McDonald. "Computer-Based Patient-Record Systems." In Medical Informatics, 327–58. New York, NY: Springer New York, 2001. http://dx.doi.org/10.1007/978-0-387-21721-5_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer based information systems"

1

"[Publisher's information]." In 2015 IEEE 28th International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2015. http://dx.doi.org/10.1109/cbms.2015.91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Publisher's Information." In 2016 IEEE 29th International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2016. http://dx.doi.org/10.1109/cbms.2016.77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"[Publisher's information]." In 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2017. http://dx.doi.org/10.1109/cbms.2017.171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"[Publisher's information]." In 2014 IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2014. http://dx.doi.org/10.1109/cbms.2014.142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"[Publisher's information]." In 2018 IEEE 31st International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2018. http://dx.doi.org/10.1109/cbms.2018.00090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Antani, Sameer. "Integrating image and text information for biomedical information retrieval." In 2010 IEEE 23rd International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2010. http://dx.doi.org/10.1109/cbms.2010.6042631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Croitoru, Madalina, Bo Hu, Srinandan Dasmahapatra, Paul Lewis, David Dupplaw, Alex Gibb, Margarida Julia-Sape, et al. "Conceptual Graphs Based Information Retrieval in HealthAgents." In Twentieth IEEE International Symposium on Computer-Based Medical Systems. IEEE, 2007. http://dx.doi.org/10.1109/cbms.2007.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Inenaga, Shinichi, Kaoru Sugita, Tetsushi Oka, and Masao Yokota. "An Evaluation System for Different Types of User Interfaces According to User Computer Skill and Computer Specifications." In 2011 14th International Conference on Network-Based Information Systems (NBiS). IEEE, 2011. http://dx.doi.org/10.1109/nbis.2011.70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zillner, Sonja, Tamas Hauer, Dmitry Rogulin, Alexey Tsymbal, Martin Huber, and Tony Solomonides. "Semantic Visualization of Patient Information." In 2008 21st International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2008. http://dx.doi.org/10.1109/cbms.2008.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karlsson, Tor Johan Mikael. "Interface for Accessing Pharmacological Information." In 2008 21st International Symposium on Computer-Based Medical Systems (CBMS). IEEE, 2008. http://dx.doi.org/10.1109/cbms.2008.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer based information systems"

1

Forsdick, Harry C., and Robert H. Thomas. Research in Distributed Personal Computer-Based Information Systems. Volume 1. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada203780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Forsdick, Harry C., and Robert H. Thomas. Research in Distributed Personal Computer-Based Information Systems. Volume 2. Fort Belvoir, VA: Defense Technical Information Center, August 1988. http://dx.doi.org/10.21236/ada203845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sampson, James. Current Status and Future Potential for Evaluating the Design and Use of Computer-Based Career Information Delivery Systems in the United States. Florida State University Libraries, December 1993. http://dx.doi.org/10.17125/fsu.1525960033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bidgoli, Hossein. A descriptive predictive model for the employment of computer-based management information systems for the government of a developing country: case, Iran. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gall, W. E. Brain-Based Devices for Neuromorphic Computer Systems. Fort Belvoir, VA: Defense Technical Information Center, July 2013. http://dx.doi.org/10.21236/ada587348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

PHILLIPS, LAURENCE R., HAMILTON E. LINK, and STEVEN Y. GOLDSMITH. Agent-Based Mediation and Cooperative Information Systems. Office of Scientific and Technical Information (OSTI), June 2002. http://dx.doi.org/10.2172/800991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Garrett, R. G., and A. G. Fabbri. Introduction, Intelligent information management: knowledge-based systems. Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 1994. http://dx.doi.org/10.4095/193922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Harris, R. V. Jr, L. J. Angel, S. R. Doctor, W. R. Park, G. J. Schuster, and T. T. Taylor. Evaluation of computer-based ultrasonic inservice inspection systems. Office of Scientific and Technical Information (OSTI), March 1994. http://dx.doi.org/10.2172/10144011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), February 1989. http://dx.doi.org/10.2172/6137987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Jie, and Jim Alves-Foss. Architecture-Based Refinements for Secure Computer Systems Design. Fort Belvoir, VA: Defense Technical Information Center, January 2006. http://dx.doi.org/10.21236/ada459287.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography