2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)最新文献

筛选
英文 中文
The Effect of Perceived Interactivity and Social Norm to the Continuance Use of Mobile Wellness Apps 感知互动性和社会规范对移动健康应用程序持续使用的影响
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073344
Ahmad Fadhil Yusof, N. A. Iahad
{"title":"The Effect of Perceived Interactivity and Social Norm to the Continuance Use of Mobile Wellness Apps","authors":"Ahmad Fadhil Yusof, N. A. Iahad","doi":"10.1109/ICRIIS48246.2019.9073344","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073344","url":null,"abstract":"Usage of Mobile Wellness Applications (MWA) has been proven to be one of the ways to overcome obesity thorough the practice of self-monitoring. However, based on the literature, users have difficulties in prolonging the usage of MWA. Study of MWA continuance use seems to be one of the less explored and least examined topics in Information Systems (IS) domains. Also, most of the existing research regarding MWA are not guided by IS theories. Thus, this study aims to identify the factors that influence continuance use of MWA in the context of Malaysia by adapting the Information Systems Continuance Model (ISCM) as a post adoption IS theory. A pilot study was applied using the purposive sampling technique and data were collected from 30 MWA users who had undergone a wellness program. Partial Least Squares (PLS) method based on Structural Equation Modelling (SEM) was used for analyzing the survey data. The outcome of this study offered a theoretical model for encouraging the continuance use of MWA. This pilot study research reveals that Perceived Interactivity and Social Norm influence the Continuance Intention to use MWA and Satisfaction is found to be the strongest factor.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130853621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trusted Follower Factors That Influence Purchase Intention In Social Commerce 社交商务中影响购买意愿的可信追随者因素
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073627
Humaira Hairudin, Halina Mohamed Dahlan, Md. Hafiz Selamat
{"title":"Trusted Follower Factors That Influence Purchase Intention In Social Commerce","authors":"Humaira Hairudin, Halina Mohamed Dahlan, Md. Hafiz Selamat","doi":"10.1109/ICRIIS48246.2019.9073627","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073627","url":null,"abstract":"Social commerce is an e-commerce platform where online shopper can shop and purchase online through social networking platforms such as Facebook, Instagram, and Twitter. There are many factors that influence online shopper to make a purchase through social commerce and one of the factors is follower. The follower is a social commerce user that can communicate with other follower through like, comment, and share another follower’s post. There are many types of follower in social commerce, such as trusted follower and fake follower. The trusted follower can influence online shoppers’ trust to purchase in social commerce. However, usually online shoppers do not know which follower is the trusted follower. Therefore, the aim of this paper is to identify the trusted follower factors that can influence purchase intention in social commerce. From the literature review, the trusted follower factors are identified, which is self-presentation, selfconfidence, social interaction, self-expressive and social sharing. Then, a questionnaire has been developed and distributed to the 33 experts who have the knowledge and experience regarding purchasing in social commerce. Based on the data received from the questionnaire, TOPSIS method has been applied in order to rank the trusted follower factors. The final rank shows that self-presentation is receiving the highest rank, followed by social sharing, self-confidence, social interaction and self-expressive. From the rank of trusted follower factors, we can recognize which one of the follower factors is the most influence factor that can influence purchase intention in social commerce.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128568249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Student Satisfaction and Perceived Learning Outcomes in Computerized Audit Course 计算机化审计课程学生满意度与学习成果感知
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073674
Riana Novita, R. Widuri
{"title":"Student Satisfaction and Perceived Learning Outcomes in Computerized Audit Course","authors":"Riana Novita, R. Widuri","doi":"10.1109/ICRIIS48246.2019.9073674","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073674","url":null,"abstract":"This study aims to analyze the student-perceived learning outcomes and satisfaction in Method and Practice of Computerized Audit Course at BINUS University. The Unified Theory of Acceptance and Use of Technology model (UTAUT) was used as the basis for the research framework. The variables involved in this study are attitude, performance expectancy, effort expectancy, hands-on training, course structure, perceived instructor knowledge, and self-reported knowledge. The research questionnaires were adopted from previous studies. SmartPLS was used to test the measurement and structural models using a convenience sample of 102 students. The results showed that all variables are significant towards student’s perceived learning outcomes and satisfaction except for effort expectancy, hands-on training, and perceived instructor knowledge. The result of this study can become a suggestion to the institutions to evaluate the aspects that influence the student’s satisfaction and learning outcomes.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"146-147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132990722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Media facilitate Compliance Communication in Higher Education Institutions 社交媒体促进高等教育机构的合规沟通
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073676
Nurlydia Natasha Md Hatta, S. Abdullah, S. Miskon
{"title":"Social Media facilitate Compliance Communication in Higher Education Institutions","authors":"Nurlydia Natasha Md Hatta, S. Abdullah, S. Miskon","doi":"10.1109/ICRIIS48246.2019.9073676","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073676","url":null,"abstract":"Managing compliance is never an easy task for the institutions to handle. Over the past decade, regardless of any increasingly expanding range of regulatory regulations that govern the higher ed, the institutional organizations must manage countless compliance obligations without losing focus on the institution’s vision, mission and culture. Any implications of non-compliance warrant major media attention and significant negative consequences. Given that the success rate of institutional’s compliance is highly depending on their reliability communication system. Recent benchmark studies evidenced that higher ed is contemplating the communication system failures between the compliance stakeholders that prevents them from having an effective compliance framework in place. Hence, this paper presents a systematic literature review (SLR) of 26 relevant published studies related to topics in compliance communication dated from 2010 to 2019 to review the problems. By addressing three specific research questions, this SLR shows the following evidence gathered of these studies: (1) an overview of compliance communication challenges in HEIs and aspects which need to be improved, (2) current compliance communication in practice, and (3) the fact on how current social media tools used to facilitate compliance communications. The findings suggest that compliance communication in HEIs still has severe limitations in terms of exercising effective and proactive ongoing oversight on communicating compliance-related issues as an important part of compliance initiatives. However, through correctly identifying and understanding the compliance communication requirements (future work), it is possible to develop an effective social media-based compliance communication model for HEIs.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116119099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges in Managing Information Systems Security for Internet of Things-enabled Smart Cities 面向物联网智能城市的信息系统安全管理挑战
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073661
Zarina Din, Dian Indrayani Jambari, M. Yusof, J. Yahaya
{"title":"Challenges in Managing Information Systems Security for Internet of Things-enabled Smart Cities","authors":"Zarina Din, Dian Indrayani Jambari, M. Yusof, J. Yahaya","doi":"10.1109/ICRIIS48246.2019.9073661","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073661","url":null,"abstract":"Smart Cities (SC) initiative involving Internet of Things (IoT) is forcing drastic changes to IT management approaches. A significant change occurs in the aspect of security management, particularly in the Information Systems (IS) security within the SC ecosystem. The Information Systems’ security management approach evolves as the organisation model changes. As public sector organisations prepare for SC with the adoption of IoT, revision on the existing security management approach remains critical. The preliminary phase of such revision requires an understanding of the specific challenges that pose risks to the IS security. Therefore, this study identifies the potential challenges by conducting a document analysis method on relevant literature. The findings showed that the IS security management for IoTenabled SC is challenged in terms of governance, integrity, interoperability, personalization, and self-organizing. Understanding these challenges initiates the effort towards revising the management approach, specifically for managing the IS security in IoT-enabled SC.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126169508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Evaluating the Usability of Browsing Songs by Mood using Visual Texture 利用视觉纹理评估心情浏览歌曲的可用性
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073406
Adzira Husain, M. F. Shiratuddin, K. Wong
{"title":"Evaluating the Usability of Browsing Songs by Mood using Visual Texture","authors":"Adzira Husain, M. F. Shiratuddin, K. Wong","doi":"10.1109/ICRIIS48246.2019.9073406","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073406","url":null,"abstract":"Recently, extensive use of digital music has led to an increase in songs in online music applications and personal music libraries. In large music libraries, songs which are not listened to regularly, most probably will go unnoticed. There are many ways of browsing songs in an online music library. In the field of Music Information Retrieval (MIR), some type of visual forms such as colour, avatar, mood picture and album cover to visualise music, have been introduced. However, there is no research focusing explicitly on textures. To create new method of browsing music, we proposed a framework to visualise music mood using visual texture. In order to determine how well people can interact with the visual texture to browse songs in music library, usability testing was conducted. In this paper, we will present the results of the usability testing.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130870071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Agronomist Station System for Water Table Management at Peatland 泥炭地地下水位管理农艺站系统的开发
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073651
M. R. Ismail, Ilham Fitriah Ahmad Shukri, Azri Azmi, Yazriwati Yahya, Saiful Adli Ismail, Mohd Suffian Sulaiman
{"title":"Development of Agronomist Station System for Water Table Management at Peatland","authors":"M. R. Ismail, Ilham Fitriah Ahmad Shukri, Azri Azmi, Yazriwati Yahya, Saiful Adli Ismail, Mohd Suffian Sulaiman","doi":"10.1109/ICRIIS48246.2019.9073651","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073651","url":null,"abstract":"The palm oil sector has been criticized globally for being the source of diverse negative impacts on the surrounding environment due to the increasing rate of land development in the peatland. Scientific evidence shows that the peatland becomes less tolerant of subsidence once the existing water is over drained for agriculture development. To overcome this problem, planters had established a water gate system in the vegetation area so that the distribution of water is possible to recover an area with a low water table. Commonly, a piezometer is deployed to evaluate the water table at the problematic zone. Unfortunately, this approach has limitations in which the manual reading assessment is prone to human error and requires a lot of time and effort. Therefore, the Agronomist Station (AGROST) is developed to counter these drawbacks. The purpose of this study is to improve water table management in the agriculture sector by developing a near real-time system, AGROST that continuously monitors water level at a remote area for data analysis and visualization. This project utilized probes that will be stationed on-site to automate the sensing process. At the central server, the collection of data is computed for analysis by displaying a rich graphical and visualization presentation style to improve end-user understanding. In conclusion, AGROST provides a clear understanding of the water table at the remote site, encouraging effective controls of the water level and predicts the possible water table pattern and trend in the future.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130990345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive and Dynamic Characteristics in Hybrid Agile Management Model for Software Development Project Success 软件开发项目成功的混合敏捷管理模型的自适应和动态特性
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073337
M. Jabar, Salfarina Abdullah, Y. Y. Jusoh, S. Mohanarajah, Norhayati Mohd. Ali
{"title":"Adaptive and Dynamic Characteristics in Hybrid Agile Management Model for Software Development Project Success","authors":"M. Jabar, Salfarina Abdullah, Y. Y. Jusoh, S. Mohanarajah, Norhayati Mohd. Ali","doi":"10.1109/ICRIIS48246.2019.9073337","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073337","url":null,"abstract":"The management of traditional software development methodologies and agile software development methodologies over the decades have not worked to its expectation in increasing the success rates of software projects. The Agile Manifesto in 2001 had promised to better manage IT projects with its 4 values and 12 principles but project success still appears to be elusive. The study and application of critical success and failure factors have been done by researchers but these factors are quick remedy solutions and not long-term robust improvements in the management of development methodologies. More research is required into the management of traditional and agile methodologies characteristics instead of success and failure factors. The coexistence of these characteristics as hybrid methods has also provided evidence of an increase in productivity and further research is required to strengthen and close current gaps in the management of hybrid methodologies. An empirical method with a quantitative approach is adopted to collect data with questionnaires from software development focus groups involved in industry projects. The data collected is analyzed using the Statistical Package for the Social Sciences (SPSS) technique and the Partial Least Squares (PLS) tool. The findings provide a set of significant characteristics of adaptive and dynamic features, which are combined with organizational objectives to prove there is a strong relationship between project success with hybrid methods and hybrid combination patterns.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation Phases in Modernisation of Legacy Systems 遗留系统现代化的实施阶段
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073628
Humairath Km Abu Bakar, R. Razali, Dian Indrayani Jambari
{"title":"Implementation Phases in Modernisation of Legacy Systems","authors":"Humairath Km Abu Bakar, R. Razali, Dian Indrayani Jambari","doi":"10.1109/ICRIIS48246.2019.9073628","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073628","url":null,"abstract":"Legacy systems continue to play an important role in the implementation of information systems in organisations. Many large organisations still rely heavily on these systems in delivering critical services. Legacy systems are important assets of organisations as they contain important business logics and data over several years. Although these systems are critical to the business yet organisations have to face technical difficulties and unnecessary expenses in maintaining the systems. In order to continue providing quality services in line with the global changes, legacy systems need to be refreshed through modernisation. This study therefore reviewed the phases involved in legacy systems modernisation to identify gaps and their insufficiencies. It aims to provide an overall guidance to the organisations in performing legacy systems modernisation.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123835678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cybersecurity Issues Among Working Youths in an IoT Environment: A Design Thinking Process for Solution 物联网环境下工作青年的网络安全问题:解决方案的设计思维过程
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) Pub Date : 2019-12-01 DOI: 10.1109/ICRIIS48246.2019.9073644
Magiswary Dorasamy, Genevieve Clarinda Joanis, Liow Wen Jiun, Manimekalai Jambulingam, Rahimah Samsudin, Ng Jun Cheng
{"title":"Cybersecurity Issues Among Working Youths in an IoT Environment: A Design Thinking Process for Solution","authors":"Magiswary Dorasamy, Genevieve Clarinda Joanis, Liow Wen Jiun, Manimekalai Jambulingam, Rahimah Samsudin, Ng Jun Cheng","doi":"10.1109/ICRIIS48246.2019.9073644","DOIUrl":"https://doi.org/10.1109/ICRIIS48246.2019.9073644","url":null,"abstract":"Recent alarming IoT-based cybersecurity incidents indicates that organisations are unimaginably exposed to potential impacts beyond simple economic or opportunity loss. As such, managers are giving high priority to cybersecurity vulnerabilities and measures. This paper aims to present perception of working adults on cybersecurity challenges surrounding IoT environment. Qualitative data from 20 working adults using design thinking method are presented in this paper based on its five stages, empathy, define, ideate, prototype and test. Data were collected using flash card interview technique on five key terms associated with cybersecurity challenges, cyber-attacks, IoT, safer society, privacy and password. Finding shows low level of cybersecurity awareness on IoT, which further warranted an innovative solution, a cybersecurity e-brocure cum playbook. We present the solution and concluded with recommendations.","PeriodicalId":294556,"journal":{"name":"2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131278851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信