PDF 253
peer-to-peer (P2P) computing 82
power theories 220
privacy 272
privacy violation 279
product life cycle management (PLM) 7
project collaboration 175