ACM Transactions on Management Information Systems最新文献

筛选
英文 中文
From Dissonance to Dialogue: A Token-Based Approach to Bridge the Gap Between Manufacturers and Customers 从分歧到对话:基于令牌的方法弥合制造商与客户之间的差距
IF 2.5
ACM Transactions on Management Information Systems Pub Date : 2024-01-04 DOI: 10.1145/3639058
Norman Pytel, Christian Ziegler, Axel Winkelmann
{"title":"From Dissonance to Dialogue: A Token-Based Approach to Bridge the Gap Between Manufacturers and Customers","authors":"Norman Pytel, Christian Ziegler, Axel Winkelmann","doi":"10.1145/3639058","DOIUrl":"https://doi.org/10.1145/3639058","url":null,"abstract":"This paper presents a novel token-based recall communication system, which integrates Enterprise Resource Planning (ERP) systems and blockchain technology to enhance recall communication and cooperation between manufacturers and customers. We employed a design science research methodology to develop a set of design principles and features that support the interoperable system. Our findings demonstrate that we can significantly improve recall coordination, traceability, and co-value creation between involved parties. By focusing on the integration potential of traditional technologies like ERP systems with blockchain and token techniques, we reveal innovative synergies for both social and technical subsystems. The study explores the implications of the proposed system for both theory and practice, offering insights into the advantages and challenges of such integration. The evaluation conducted with industry experts demonstrates high reusability of the design principles.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139384508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Process Mining Method for Inter-organizational Business Process Integration 组织间业务流程整合的流程挖掘方法
IF 2.5
ACM Transactions on Management Information Systems Pub Date : 2023-12-19 DOI: 10.1145/3638062
Moufida Aouachria, Abderrahmane Leshob, A. R. Ghomari, M. Aouache
{"title":"A Process Mining Method for Inter-organizational Business Process Integration","authors":"Moufida Aouachria, Abderrahmane Leshob, A. R. Ghomari, M. Aouache","doi":"10.1145/3638062","DOIUrl":"https://doi.org/10.1145/3638062","url":null,"abstract":"Business process integration (BPI) allows organizations to connect and automate their business processes in order to deliver the right economic resources at the right time, place, and price. BPI requires the integration of business processes and their supporting systems across multiple autonomous organizations. However, such integration is complex and can face coordination complexities that occur during the resource exchanges between the partners’ processes. This paper proposes a new method called Process Mining for Business Process Integration (PM4BPI) that helps process designers to perform BPI by creating new process models that cross the boundaries of multiple organizations from a collection of process event logs. PM4BPI uses federated process mining techniques to detect incompatibilities before the integration of the partners’ processes. Then, it applies process adaptation patterns to solve detected incompatibilities. Finally, organizations’ processes are merged to build a collaborative process model that crosses the organizations’ boundaries. Adapt ({}_{WF_Net} ) , an extension of a Petri net, is used to design inter-organizational business processes and adaptation patterns. An integrated care pathway is used as a case study to assess the applicability and effectiveness of the proposed method.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138959171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Issue on IT-enabled Business Management and Decision Making in the (Post) Covid-19 Era 后)Covid-19 时代信息技术辅助的企业管理和决策特刊导言
IF 2.5
ACM Transactions on Management Information Systems Pub Date : 2023-12-11 DOI: 10.1145/3627995
Xin Li, Juhee Kwon, B. Padmanabhan, Pengzhu Zhang
{"title":"Introduction to the Special Issue on IT-enabled Business Management and Decision Making in the (Post) Covid-19 Era","authors":"Xin Li, Juhee Kwon, B. Padmanabhan, Pengzhu Zhang","doi":"10.1145/3627995","DOIUrl":"https://doi.org/10.1145/3627995","url":null,"abstract":"","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138584385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Monotonic Generation of Knowledge Paths for Context Understanding 上下文理解知识路径的非单调生成
ACM Transactions on Management Information Systems Pub Date : 2023-10-20 DOI: 10.1145/3627994
Pei-Chi Lo, Ee-Peng Lim
{"title":"Non-Monotonic Generation of Knowledge Paths for Context Understanding","authors":"Pei-Chi Lo, Ee-Peng Lim","doi":"10.1145/3627994","DOIUrl":"https://doi.org/10.1145/3627994","url":null,"abstract":"Knowledge graphs can be used to enhance text search and access by augmenting textual content with relevant background knowledge. While many large knowledge graphs are available, using them to make semantic connections between entities mentioned in the textual content remains to be a difficult task. In this work, we therefore introduce contextual path generation (CPG) which refers to the task of generating knowledge paths, contextual path , to explain the semantic connections between entities mentioned in textual documents with given knowledge graph. To perform CPG task well, one has to address its three challenges, namely path relevance, incomplete knowledge graph, and path well-formedness. This paper designs a two-stage framework the comprising of the following: (1) a knowledge-enabled embedding matching and learning-to-rank with multi-head self attention context extractor to determine a set of context entities relevant to both the query entities and context document, and (2) a non-monotonic path generation method with pretrained transformer to generate high quality contextual paths. Our experiment results on two real-world datasets show that our best performing CPG model successfully recovers 84.13% of ground truth contextual paths, outperforming the context window baselines. Finally, we demonstrate that non-monotonic model generates more well-formed paths compared to the monotonic counterpart.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135618435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk Exposure in their Industrial IoT Network? 企业如何量化和分析其工业物联网网络中的(多方)APT网络风险暴露?
ACM Transactions on Management Information Systems Pub Date : 2023-10-19 DOI: 10.1145/3605949
Ranjan Pal, Rohan Xavier Sequeira, Xinlong Yin, Sander Zeijlemaker, Vineeth Kotala
{"title":"How Should Enterprises Quantify and Analyze (Multi-Party) APT Cyber-Risk Exposure in their Industrial IoT Network?","authors":"Ranjan Pal, Rohan Xavier Sequeira, Xinlong Yin, Sander Zeijlemaker, Vineeth Kotala","doi":"10.1145/3605949","DOIUrl":"https://doi.org/10.1145/3605949","url":null,"abstract":"Industrial Internet of Things (IIoT) networks (e.g., a smart grid industrial control system) are increasingly on the rise, especially in smart cities around the globe. They contribute to meeting the day-to-day needs (e.g., power, water, manufacturing, transportation) of the civilian society, alongside making societal businesses more efficient, productive, and profitable. However, it is also well known that IoT devices often operate on poorly configured security settings. This increases the chances of occurrence of (nation-sponsored) stealthy spread-based APT malware attacks in IIoT networks that might go undetected over a considerable period of time. Such attacks usually generate a negative first-party QoS impact with financial consequences for companies owning such IIoT network infrastructures. This impact spans (i.e., aggregates) space (i.e., the entire IIoT network or a sub-network) and time (i.e., duration of business disruption), and is a measure of significant interest to managers running their businesses atop such networks. It is of little use to network resilience boosting managers if they have to wait for a cyber-attack to happen to gauge this impact. Consequently, one of the questions that intrigues us is: can managers estimate this first-party impact prior to APT cyber-attack(s) causing financial damage to companies? In this paper, we propose the first computationally efficient and quantitative network theory framework to (a) characterize this first-party impact apriori as a statistical distribution over multiple attack configurations in a family of malware-driven APT cyber-attacks specifically launched on businesses running atop IIoT networks, (b) accurately compute the statistical moments (e.g., mean) of the resulting impact distribution, and (c) tightly bound the accuracy of worst-case risk estimate of such a distribution - captured through the tail of the distribution, using the Conditional Value at Risk (CVaR) metric. In relation to (a) above, our methodology extends the seminal Factor Analysis of Information Risk (FAIR) cyber-risk quantification methodology that does not explicitly account for network interconnections among system-risk contributing variables. We validate the effectiveness of our theory using trace-driven Monte Carlo simulations based upon test-bed experiments conducted in the FIT IoT-Lab. We further illustrate quantitatively that even if spread-based APT cyber-attacks induce a statistically light-tailed first-party cyber-loss distribution on an IIoT networked enterprise in the worst case, the aggregate multi-party cyber-risk distribution incurred by the same enterprise in supply-chain ecosystems could be heavy-tailed. This will pose significant market scale-up challenges to cyber-security improving commercial cyber (re-)insurance businesses. We subsequently propose managerial action items to mitigate the first-party cyber-risk exposure emanating from any given IIoT driven enterprise.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135729296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modular Social Sensing System for Personalized Orienteering in the COVID-19 Era 面向新冠肺炎时代个性化定向运动的模块化社会传感系统
IF 2.5
ACM Transactions on Management Information Systems Pub Date : 2023-09-06 DOI: 10.1145/3615359
Giovanni Pilato, Fabio Persia, Mouzhi Ge, Theodoros Chondrogiannis, D. D’Auria
{"title":"A Modular Social Sensing System for Personalized Orienteering in the COVID-19 Era","authors":"Giovanni Pilato, Fabio Persia, Mouzhi Ge, Theodoros Chondrogiannis, D. D’Auria","doi":"10.1145/3615359","DOIUrl":"https://doi.org/10.1145/3615359","url":null,"abstract":"Orienteering or itinerary planning algorithms in tourism are used to optimize travel routes by considering user preference and other constraints, such as time budget or traffic conditions. For these algorithms, it is essential to explore the user preference to predict potential Points-of-Interest (POIs) or tourist routes. However, nowadays, user preference has been significantly affected by COVID-19 since health concern plays a key trade-off role. For example, people may try to avoid crowdedness, even if there is a strong desire for social interaction. Thus, the orienteering or itinerary planning algorithms should optimize routes beyond user preference. Therefore, this paper proposes a social sensing system that considers the trade-off between user preference and various factors, such as crowdedness, personality, knowledge of COVID-19, POI features, and desire for socialization. The experiments are conducted on profiling user interests with a properly trained fastText neural network and a set of specialized Naïve Bayesian Classifiers based on the “Yelp!” data set. Also, we demonstrate how to approach and integrate COVID-related factors via conversational agents. Furthermore, the proposed system is in a modular design and evaluated in a user study; thus, it can be efficiently adapted to different algorithms for COVID-19-aware itinerary planning.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47914057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Connections among Personality, Job Position, and Work Behavior: Evidence from Joint Bayesian Learning 利用人格、工作岗位和工作行为之间的联系:来自联合贝叶斯学习的证据
IF 2.5
ACM Transactions on Management Information Systems Pub Date : 2023-07-12 DOI: 10.1145/3607875
Dazhong Shen, Hengshu Zhu, Keli Xiao, Xi Zhang, Hui Xiong
{"title":"Exploiting Connections among Personality, Job Position, and Work Behavior: Evidence from Joint Bayesian Learning","authors":"Dazhong Shen, Hengshu Zhu, Keli Xiao, Xi Zhang, Hui Xiong","doi":"10.1145/3607875","DOIUrl":"https://doi.org/10.1145/3607875","url":null,"abstract":"Personality has been considered as a driving factor for work engagement, which significantly affects people’s role performance at work. Although existing research has provided some intuitive understanding of the connection between personality traits and employees’ work behaviors, it still lacks effective quantitative tools for modeling personality traits, job position characteristics, and employee work behaviors simultaneously. To this end, in this article, we introduce a data-driven joint Bayesian learning approach, Joint-PJB, to discover explainable joint patterns from massive personality and job-position-related behavioral data. Specifically, Joint-PJB is designed with the knowledgeable guidance of the four-quadrant behavioral model, namely, DISC (Dominance, Influence, Steadiness, Conscientiousness). Based on the real-world data collected from a high-tech company, Joint-PJB aims to highlight personality-job-behavior joint patterns from personality traits, job responsibilities, and work behaviors. The model can measure the matching degree between employees and their work behaviors given their personality and job position characteristics. We find a significant negative correlation between this matching degree and employee turnover intention. Moreover, we also showcase how the identified patterns can be utilized to support real-world talent management decisions. Both case studies and quantitative experiments verify the effectiveness of Joint-PJB for understanding people’s personality traits in different job contexts and their impact on work behaviors.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46869714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Predicting ESG Ratings Using Dynamic Company Networks 利用动态公司网络预测ESG评级
IF 2.5
ACM Transactions on Management Information Systems Pub Date : 2023-07-08 DOI: 10.1145/3607874
Gary (Ming) Ang, Zhiling Guo, E. Lim
{"title":"On Predicting ESG Ratings Using Dynamic Company Networks","authors":"Gary (Ming) Ang, Zhiling Guo, E. Lim","doi":"10.1145/3607874","DOIUrl":"https://doi.org/10.1145/3607874","url":null,"abstract":"Environmental, social and governance (ESG) considerations play an increasingly important role due to the growing focus on sustainability globally. Entities, such as banks and investors, utilize ESG ratings of companies issued by specialized rating agencies to evaluate ESG risks of companies. The process of assigning ESG ratings by human analysts is however laborious and time intensive. Developing methods to predict ESG ratings could alleviate such challenges, allow ESG ratings to be generated in a more timely manner, cover more companies, and be more accessible. Most works study the effects of ESG ratings on target variables such as stock prices or financial fundamentals of companies, but few works study how different types of company information can be utilized to predict ESG ratings. Previous works also largely focus on using only the financial information of individual companies to predict ESG ratings, leaving out the different types of inter-company relationship networks. Such inter-company relationship networks are typically dynamic, i.e., they evolve across time. In this paper, we focus on utilizing dynamic inter-company relationships for ESG ratings prediction, and examine the relative importance of different financial and dynamic network information in this prediction task. Our analysis shows that utilizing dynamic inter-company network information, based on common director, common investor and news event-based knowledge graph relationships, can significantly improve ESG rating prediction performance. Robustness checks over different time-periods and different number of time-steps in the future further validate these insights.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47044767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICT Interactions and COVID-19 – A Theorization Across Two Pandemic Waves 信息通信技术互动与COVID-19——跨越两次大流行浪潮的理论分析
IF 2.5
ACM Transactions on Management Information Systems Pub Date : 2023-05-23 DOI: 10.1145/3597938
Jayson Killoran, Tracy A. Jenkin, J. Manseau
{"title":"ICT Interactions and COVID-19 – A Theorization Across Two Pandemic Waves","authors":"Jayson Killoran, Tracy A. Jenkin, J. Manseau","doi":"10.1145/3597938","DOIUrl":"https://doi.org/10.1145/3597938","url":null,"abstract":"The COVID-19 pandemic instigated the rapid shift to remote work and virtual interactions, constituting a new normal of professional interaction over information and communication technologies (ICT), such as videoconferencing platforms, email, and mobile devices. While ICT may provide many benefits for remote work, such as flexibility, reductions in travel time, and geographical interaction, ICT may also contribute to increases in job strain, reductions in social interactions, and the decline of mental health. While reliance on ICT for remote work interactions is becoming the new normal of organizational activity, scholarly appreciation of the stages in which employees, particularly educators, enact interactions over ICT is limited. Further, the intensity of the pandemic is unlike anything management scholars have studied before, and previous research into ICT use offers little insight into how ICT behaviours evolve over time. Our research explores how educators enact ICT interactions with students throughout the first two waves of the COVID-19 pandemic. We conducted 24 open-ended interviews with educators to learn about their experiences shifting to ICT for virtual classes. We found that ICT interactions between educators and students are enacted through two sequential, interrelated stages: divergent interaction behaviours and convergent interaction behaviours, with each stage corresponding to the first and second waves of the pandemic. We delineate the phases within each enacting stage of ICT interaction, and conjecture that future use of ICT may include iterative cycles of divergent and convergent interaction behaviours, particularly if educators explore how to leverage ICT in more creative ways. Our research presents a theorization of ICT interaction as an increasingly prevalent form of IT-enabled educational interactions and communication. We provide insight into how educators successfully shifted to ICT use for remote work, and offer implications for the facilitation of hybrid work arrangements in educational settings using ICT.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43803192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disentangling Affordances of Online Collaboration Tools for Mutual Aid in Emergencies: Insights from the COVID-19 Lockdown 解开紧急情况下互助在线协作工具的功能:来自COVID-19封锁的见解
IF 2.5
ACM Transactions on Management Information Systems Pub Date : 2023-05-03 DOI: 10.1145/3593056
Xiao Zeng, David Ji, D. Thadani, Boying Li, Xiaodie Pu, Zhao Cai, Patrick Y. K. Chau
{"title":"Disentangling Affordances of Online Collaboration Tools for Mutual Aid in Emergencies: Insights from the COVID-19 Lockdown","authors":"Xiao Zeng, David Ji, D. Thadani, Boying Li, Xiaodie Pu, Zhao Cai, Patrick Y. K. Chau","doi":"10.1145/3593056","DOIUrl":"https://doi.org/10.1145/3593056","url":null,"abstract":"With the uncertain trajectory of COVID-19 conditions worldwide, there lies the potential for emergencies to arise, abruptly yielding mass social and economic disruption. Gaining insight into how digital technologies may be leveraged for effective emergency response is therefore pertinent. Emergency-induced needs may prompt citizens to organize mutual aid initiatives where people give what they can and get what they need in response. An increasingly prominent technology used for emergency response, online collaboration tools (OCTs), enables the appropriate match between the supply of aid and its relevant demand in mutual aid initiatives by mediating information and interactions between participants. Through analysis of mutual aid cases during the 2022 Shanghai COVID-19 lockdown, this study elucidates the benefits OCTs provide through the lens of affordance theory and identifies five key affordances of OCTs for emergency mutual aid: persistent accessibility, iterative modifiability, structured consolidation and retrieval, multisynchronous participation, and multichannel broadcasting. We illustrate how such affordances are actualized and how their enabling features work across information flow processes, specifically highlighting benefits of software minimalism with implications for practitioners and future software design in emergency situations. This study contributes to the body of knowledge on OCTs and affordances by disentangling its role in emergency responses.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48582376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信