2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)最新文献

筛选
英文 中文
A Conceptual Model for Designing a Gamified Intermittent Fasting Mobile App 设计游戏化间歇性禁食移动应用的概念模型
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073629
S. Ansong, N. A. Iahad
{"title":"A Conceptual Model for Designing a Gamified Intermittent Fasting Mobile App","authors":"S. Ansong, N. A. Iahad","doi":"10.1109/ICRIIS48246.2019.9073629","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073629","url":null,"abstract":"Mobile health (m-health) applications, are widely used across various platforms for different purposes. One application is for self-monitoring to ensure achievement of goals. Specifically, in the area of wellness, there has been a rise in the use of mobile apps for intermittent fasting (IF). Previous researchers have identified the determinants that leverage the intention to continue to use mobile phone wellness apps. Studies on the use of IF mobile apps for self-monitoring weight loss still indicate the lack of a catalyst (gamification) to persuade users to prolong use. With the growing interest in the area of gamification in healthcare and behaviour change support systems, this study proposes a model for designing IF mobile apps that embed gamification","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128946174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
It’s a bird… It’s a plane… It’s a drone…: Telecommunication Tower Inspection Using Drone 这是一只鸟,这是一架飞机,这是一架无人机:使用无人机检查电信塔
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073663
Mohd Fuad Mohd Isa, N. A. Rahim, M. Fathi
{"title":"It’s a bird… It’s a plane… It’s a drone…: Telecommunication Tower Inspection Using Drone","authors":"Mohd Fuad Mohd Isa, N. A. Rahim, M. Fathi","doi":"10.1109/ICRIIS48246.2019.9073663","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073663","url":null,"abstract":"Despite its benefits, the use of drone in the inspection context particularly in the telecommunication tower inspection are still not popular. There are also lack of research paper found that discuss on the usage of drone for inspecting telecommunication tower. Therefore, this paper intend to highlight the significance of the drone technology over the current methods used in the inspection business. Relevant papers reviews resulted in the identification of the advantages of drone usage in the context of telecommunication tower inspection. The contribution of the paper is the understanding of the drone usage within the focused context and the similarities of the applications in other inspection context. The outcome of this paper would assists the stakeholders in the relevant industry in their investment decision making towards digitizing their businesses for future ready ecosystem.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121606812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybernetic Diagnosis Approach for Publication Productivity of Malaysian Research University 马来西亚研究型大学出版生产力的控制论诊断方法
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073664
S. Dhillon, R. Ibrahim, Ali Selemat
{"title":"Cybernetic Diagnosis Approach for Publication Productivity of Malaysian Research University","authors":"S. Dhillon, R. Ibrahim, Ali Selemat","doi":"10.1109/ICRIIS48246.2019.9073664","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073664","url":null,"abstract":"It is essential for academic staffs to keep track of their publication records. Publication is seen to be the main resource for evaluation in the academic world. Besides, the publication criteria are mainly being evaluated for promotion and to access research grants from the institution or the government entities. The basis of this research is to unveil personal, behavioral and environmental factors using social cognitive theory (SCT) and by implementing the Viable System Model (VSM) as the diagnostic tool using cybernetic concept which is more viable to changes in the organization, which relate to key performance indicators (KPI) delivery on scholarly publications (SP). Thus, this study is aimed at investigating factors associated with publication productivity among the research university academic staffs by integrating VSM and SCT. This study applies qualitative method triangulated with quantitative method. The findings show that the most influential factors for the SP of Universiti Teknologi Malaysia (UTM) are age, gender, experience, rank, teaching load, collaboration, funding, resource, discipline and skill. The model was evaluated for the SP KPI monitoring process, which further can be used by public and private universities to improve the performance of their institution’s publication.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Standardization for Penetration Testing Reports and Documents 渗透测试报告和文档标准化综述
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073393
Mohd Zaidi Zakaria, Poon Ai Phin, Nurfarahin Mohmad, Saiful Adli Ismail, M. Kama, O. Yusop
{"title":"A Review of Standardization for Penetration Testing Reports and Documents","authors":"Mohd Zaidi Zakaria, Poon Ai Phin, Nurfarahin Mohmad, Saiful Adli Ismail, M. Kama, O. Yusop","doi":"10.1109/ICRIIS48246.2019.9073393","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073393","url":null,"abstract":"Penetration testing or pen test is a simulated cyber-attack conducted to find the vulnerabilities and weaknesses in a computer system. The test is conducted by professionals hired by the organization that produces a report to the organization for further actions. However, the report produce varies according to the different tester. This is because there is no standardized format of a pen test report approved by any security organization or bodies. Each tester would submit a report based on the findings on their company’s policy. We analyse eight pen test report available online to find any similarities or pattern so that we can come out with a standardized format which comprises of components we think is needed in the report. The proposed format will also cater to the understanding of both security system personnel and the upper management of the organization. This is due to the fact that technicality of the report may not be clear to the top management, which results in them taking less consideration upon the issues of vulnerabilities in their system. This standardized report will cater to the needs of both system security personnel and the upper management by taking further actions upon improving the security of their network, servers, computers, firewalls and all of the access channels of their system.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115746795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Prediction Scoring in Exergames for Rehabilitation Patients using K-Means Clustering 基于k -均值聚类的康复患者运动预测评分
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073659
Nurezayana Zainal, M. Faeid, Seyed Mostafa Mousavi Kahaki, Hafez Hussain, M. Bahari, W. Ismail
{"title":"Prediction Scoring in Exergames for Rehabilitation Patients using K-Means Clustering","authors":"Nurezayana Zainal, M. Faeid, Seyed Mostafa Mousavi Kahaki, Hafez Hussain, M. Bahari, W. Ismail","doi":"10.1109/ICRIIS48246.2019.9073659","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073659","url":null,"abstract":"This paper highlighted a prediction scoring of difficulty modes in Medical Interactive Recovery Assistant (MIRA) exergames based on Kinect-based Rehabilitation Gaming System (RGS) for rehabilitation patients. The case study uses 19 rehabilitation patients with different lower limb limitations caused by stroke, traumatic brain injury (TBI) and spinal cord injury (SCI). MIRA exergames consists of three difficulty modes which are easy, medium and hard. Currently, physiotherapist will decide on difficulty mode based on the patients’ improvement and most of the time they will used the default setting for every patient playing exergames. Thus, this study proposed a new prediction scoring using k-means clustering algorithm to help suggesting the difficulty mode of the game. K-means clustering also is used to find the benchmarks of the patients’ history. The performance of the K-Mean algorithm is to make sure the patients are comfortable with their weakness side as suggested.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132221884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart City Security Measures in King Hussein Business Park (KHBP), Amman, Jordan 约旦安曼侯赛因国王商业园区(KHBP)的智慧城市安全措施
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073280
Q. Saber, Huda Ibrahim, Mawarny Md. Rejab
{"title":"Smart City Security Measures in King Hussein Business Park (KHBP), Amman, Jordan","authors":"Q. Saber, Huda Ibrahim, Mawarny Md. Rejab","doi":"10.1109/ICRIIS48246.2019.9073280","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073280","url":null,"abstract":"Given the possibilities of smart cities to significantly affect human lives, issues related to security have come into a spotlight to public and industries. People are now connected to each other through smart telephones and other gadgets. Facilities like smart meters, security gadgets and smart machines are being utilized in numerous cities. This study presents the security measures in the context of smart city advancement. Security matters in this context encompasses unlawful access to information and attacks causing physical disturbances in administration accessibility. Semi-structured interviews on 30 government officials, policymakers and regulators were applied to saturate categories. The outcome uncovered a dimension of “evolving security” as having positive effect and prompts how King Hussein Business Park (KHBP) is a mix for planning a robust security initiative for the securing of a smart city. City foundations and administrations are now evolving and experiencing changes amidst new interrelated systems for monitoring, control, and automation. Smart transportation, open and private, will get to a snare of interrelated information from GPS area to weather and traffic updates. Integrated systems will help open wellbeing, emergency responders and in misfortune recuperation.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124916384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberbullying Lexicon for Social Media 社交媒体网络欺凌词典
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073679
O. Hang, Halina Mohamed Dahlan
{"title":"Cyberbullying Lexicon for Social Media","authors":"O. Hang, Halina Mohamed Dahlan","doi":"10.1109/ICRIIS48246.2019.9073679","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073679","url":null,"abstract":"The presence of cyberbullying lexicon can be used to prevent cyberbullying, since user can know which words represent the cyberbullying word in social media. However, there is less research been done for developing the cyberbullying lexicon. Many researches are focusing on cyberbullying detection rather than cyberbullying instances. In order to fill the gaps, this paper aims to propose a cyberbullying lexicon for social media. This paper is focusing on exclusion cyberbullying and proposing an exclusion cyberbullying lexicon by using an ontological approach. This approach consists of several phases, namely: understanding the concepts of exclusion cyberbullying, word list selection, keyword identification, classes and subclasses identification, and lastly cyberbullying ontology and lexicon development. The classes, subclasses and the documentation have been included in the development of exclusion cyberbullying ontology. Classes are based on the semantic frame, subclasses are based on the lexical entry, while documentation of classes and subclasses are based on the definition of the semantic frame and lexical entry from FrameNet. The proposed exclusion cyberbullying lexicon is arranged in alphabetical order and it contains 13 exclusion cyberbullying keywords with its definition and category. In the proposed exclusion cyberbullying lexicon, keyword, definition, and category represent the subclasses, documentation, and classes from the exclusion cyberbullying ontology respectively. The presence of exclusion cyberbullying lexicon can provide a reference for the social media users as well as for cyberbullying detection.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Proposing Construct for Organizational Agility Model in Malaysian Automotive Organization 马来西亚汽车企业组织敏捷性模型的构建
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073673
N. H. Hassan, N. Arshad
{"title":"Proposing Construct for Organizational Agility Model in Malaysian Automotive Organization","authors":"N. H. Hassan, N. Arshad","doi":"10.1109/ICRIIS48246.2019.9073673","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073673","url":null,"abstract":"In recent Malaysia economic growth, manufacturing is one of stated industry that contributed high source of income for the country. Automotive industry is one of widely manufacturing category discussed by researchers due to its importance. Malaysia automotive organizations play important roles in representing Malaysian products and technologies. In achieving Industrial Revolution 4.0 it is really imperative for automotive organizations to be highly competitive by be responsive to their stakeholders. This research-in-progress investigates how, Information Technology Infrastructure Flexibility (ITIF), Learning orientation (LO), and organizational Agility (OA) are related. In obtaining the answer, this paper mainly discussed on how the constructs and items are identified, how reflective, formative or mixed construct is determined. These phases are important to quantitative research in order to avoid wrong specification of measurement model. This followed by empirical findings for all hypotheses. Empirical test for reflective and formative construct are using SmartPLS 3. The proposed model will assist IT and business managers to improve information technology infrastructure, develop learning programs, staff development, as well as responsive initiatives for organization.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131633776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UiTM Share Ride: Requirements Validation, Design and Development of a Campus Ride-Sharing Mobile Application UiTM共享乘车:校园共享乘车移动应用程序的需求验证,设计和开发
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073510
Kamalia Azma Kamaruddin, Nur Rozliana Mohd Rozlis
{"title":"UiTM Share Ride: Requirements Validation, Design and Development of a Campus Ride-Sharing Mobile Application","authors":"Kamalia Azma Kamaruddin, Nur Rozliana Mohd Rozlis","doi":"10.1109/ICRIIS48246.2019.9073510","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073510","url":null,"abstract":"The excessive number of cars entering university campus and limitation of parking areas have resulted in difficulty of finding parking spaces for many university staff and students. It is a typical issue occurring in most of university campuses all around the world. Carpooling or ride-sharing is viewed as the practical approach to solve this problem. The suggestion to share rides will lessen the amount of vehicles entering university campuses thus reducing parking space problem and decrease fuel emission for a cleaner and healthier environment. Thus, development of a campus ride-sharing mobile application will be a good medium for university staff and students to share their rides and solve this pressing issue in many campuses. This research has attempted to validate the system requirements for UiTM Share Ride mobile application, followed by designing and developing the mobile application using Android platform for UiTM’s staff and students. Four phases have been undertaken in order to complete the research, which are preliminary study, requirements validation, user design, and followed by application construction. The outcome is a UiTM Share Ride mobile application, which can manage ride sharing requests among passengers and drivers in UiTM communities that will eventually solve the issue of congestion in the university campus.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131695173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feasibility of IoT Acceptance Among Malaysian Government Agencies Considering Security Factors 考虑安全因素,马来西亚政府机构接受物联网的可行性
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073633
Siti Riniy Fariza Mohd Borhan, N. Maarop, N. H. Hassan, R. Yusoff, Ganthan Narayana Samy, N. Kamaruddin
{"title":"Feasibility of IoT Acceptance Among Malaysian Government Agencies Considering Security Factors","authors":"Siti Riniy Fariza Mohd Borhan, N. Maarop, N. H. Hassan, R. Yusoff, Ganthan Narayana Samy, N. Kamaruddin","doi":"10.1109/ICRIIS48246.2019.9073633","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073633","url":null,"abstract":"The purpose of this study is to identify the factors influencing the users acceptance of IoT among Malaysian government agencies Thus, a conceptual model of secure acceptance of IoT implementation is proposed. Both human and security factors are considered in the formulation of this proposed model. In this study, a TAM model was chosen as the baseline model as TAM has been proved to significantly explain the user acceptance of IoT technology. A quantitative method was used as the research methodology occupying survey questionnaires which were distributed via online. Data were collected from 90 valid respondents among employees in Malaysian Government Agencies. The data analysis was executed using SmartPLS version 3.0. Based on the findings, four from eight postulated hypotheses yielded to be significant in explaining the acceptance of IoT in the government agencies setting and the factors are Expected Usefulness, Privacy Concern, Perceived Privacy Risk, and Perceived Security Protection. Overall, the research model can explain 65.2% of the variance in behavioral intention or the acceptance of IoT. This study can be useful in providing understanding regarding the factors that influence user acceptance of IoT from both human and security perspectives among Malaysian Government Agencies.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130824062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信