International Journal of Information Management最新文献

筛选
英文 中文
Feeling good about letting go? Learned helplessness and privacy calculus in citizen acceptance of electronic identification apps 对放手感觉良好吗?在公民接受电子身份识别应用的过程中,学会了无助感和隐私微积分
IF 20.1 1区 管理学
International Journal of Information Management Pub Date : 2025-05-27 DOI: 10.1016/j.ijinfomgt.2025.102928
Tin Trung Nguyen , Van Thi Thanh Tran , Eldrin Hermoso , Minh Tu Tran Hoang
{"title":"Feeling good about letting go? Learned helplessness and privacy calculus in citizen acceptance of electronic identification apps","authors":"Tin Trung Nguyen ,&nbsp;Van Thi Thanh Tran ,&nbsp;Eldrin Hermoso ,&nbsp;Minh Tu Tran Hoang","doi":"10.1016/j.ijinfomgt.2025.102928","DOIUrl":"10.1016/j.ijinfomgt.2025.102928","url":null,"abstract":"<div><div>Drawing on learned helplessness theory and privacy calculus theory, this research investigates how privacy helplessness influences citizens’ benefit-privacy trade-offs in using electronic identification (eID) apps. Using Vietnam as a research context, potential eID app users were surveyed to uncover how a sense of privacy helplessness influences their eID app usage decisions. Findings from the partial least squares structural equation modeling showed that individuals engage in benefit-privacy trade-offs when deciding to install the app, and that privacy helplessness moderated the relationships between hedonic value and perceived benefit, and between usage likelihood and anticipated well-being. These results indicate that citizens experiencing high privacy helplessness derive greater enjoyment from using eID apps and anticipate improvements in their subjective well-being. Fuzzy-set qualitative comparative analysis (fsQCA) further revealed that individuals are willing to use eID apps despite privacy concerns and limited perceived value, suggesting that privacy helplessness can supplant perceived benefit in the benefit-privacy equation. FsQCA also showed that a lack of perceived utilitarian value is a key deterrent to eID app usage. This research contributes to theory by elucidating the role of privacy helplessness in benefit-privacy trade-offs. Specifically, while prior work focuses on the negative outcomes of helplessness, our findings highlight its potential to shift citizens’ attention towards hedonic value and anticipated well-being. Furthermore, this study proposes a reconsideration of the theoretical focus, suggesting that technology adoption may signify resignation to protection measures instead of pure acceptance. The research concludes with practical recommendations for ethical strategies to promote eID app usage rather than capitalizing on privacy helplessness.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102928"},"PeriodicalIF":20.1,"publicationDate":"2025-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144139300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technological identity and basic psychological needs in the use of new technologies: A two-wave cross-national survey study 新技术使用中的技术认同和基本心理需求:一项两波跨国调查研究
IF 20.1 1区 管理学
International Journal of Information Management Pub Date : 2025-05-22 DOI: 10.1016/j.ijinfomgt.2025.102926
Moona Heiskari , Magdalena Celuch , Aki Koivula , Iina Savolainen , Atte Oksanen
{"title":"Technological identity and basic psychological needs in the use of new technologies: A two-wave cross-national survey study","authors":"Moona Heiskari ,&nbsp;Magdalena Celuch ,&nbsp;Aki Koivula ,&nbsp;Iina Savolainen ,&nbsp;Atte Oksanen","doi":"10.1016/j.ijinfomgt.2025.102926","DOIUrl":"10.1016/j.ijinfomgt.2025.102926","url":null,"abstract":"<div><div>AI and smart technologies are increasingly embedded in almost all aspects of everyday life, and their usage might inevitably affect individuals’ self-concept and psychological and social well-being. Evidently, cross-national and longitudinal analyses of this phenomenon and its mediating factors are required. To this end, our study examined how in-group identification with new technology users influences individuals’ satisfaction of the basic psychological needs of autonomy, competence, and relatedness in the context of new technology use. We used longitudinal two-wave data collected from 18- to 75-year-old adult populations in Finland (<em>N</em> = 1541), France (<em>N</em> = 1561), Germany (<em>N</em> = 1529), Ireland (<em>N</em> = 1112), Italy (<em>N</em> = 1530), and Poland <em>(N</em> = 1533). Based on hybrid multilevel regression models, we found consistent evidence across these six European countries that individuals’ in-group identification with new technology users is positively associated with relatedness but negatively associated with autonomy and competence. Our results suggest that the level of social identification with other technology users is a meaningful social context that shapes the well-being outcomes of new technologies.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102926"},"PeriodicalIF":20.1,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144115635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “Situational awareness about data breaches and ransomware attacks: A multi-dimensional cyber threat impact framework and content analyses of practitioner-public discourses” [International Journal of Information Management 83 (2025) 102902] “关于数据泄露和勒索软件攻击的态势感知:多维网络威胁影响框架和从业者-公众话语的内容分析”的勘误表[国际信息管理杂志83 (2025)102902]
IF 20.1 1区 管理学
International Journal of Information Management Pub Date : 2025-05-21 DOI: 10.1016/j.ijinfomgt.2025.102931
Paras Bhatt , Rohit Valecha , H. Raghav Rao
{"title":"Corrigendum to “Situational awareness about data breaches and ransomware attacks: A multi-dimensional cyber threat impact framework and content analyses of practitioner-public discourses” [International Journal of Information Management 83 (2025) 102902]","authors":"Paras Bhatt ,&nbsp;Rohit Valecha ,&nbsp;H. Raghav Rao","doi":"10.1016/j.ijinfomgt.2025.102931","DOIUrl":"10.1016/j.ijinfomgt.2025.102931","url":null,"abstract":"","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102931"},"PeriodicalIF":20.1,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144614382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital transformation, emergence and complexity in supply networks 供应网络的数字化转型、出现和复杂性
IF 20.1 1区 管理学
International Journal of Information Management Pub Date : 2025-05-20 DOI: 10.1016/j.ijinfomgt.2025.102917
Hugo Michou, Jean-Loup Richet
{"title":"Digital transformation, emergence and complexity in supply networks","authors":"Hugo Michou,&nbsp;Jean-Loup Richet","doi":"10.1016/j.ijinfomgt.2025.102917","DOIUrl":"10.1016/j.ijinfomgt.2025.102917","url":null,"abstract":"<div><div>This longitudinal study was conducted to investigate the emergence of strategic misalignment within a large supply system during a digital transformation initiative at the world’s largest tourism company. We explored the interplay between emergent strategic misalignments, the inherent complexity of the supply network, and their impact on the success of digital transformation. Using the complex adaptive supply network (CASN) theoretical perspective, we analyzed the complexity within the network’s internal environment. Our two case studies revealed the intricate relationships among agents within a complex organization operating as a supply network. This research contributes to the CASN literature, particularly within the tourism industry, by conceptualizing the multiple facets of complexity in supply network and unveiling the emerging causes of strategic misalignment.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102917"},"PeriodicalIF":20.1,"publicationDate":"2025-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144089961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Device and risk-avoidance behavior in the context of cybersecurity phishing attacks 网络安全网络钓鱼攻击背景下的设备和风险规避行为
IF 20.1 1区 管理学
International Journal of Information Management Pub Date : 2025-05-19 DOI: 10.1016/j.ijinfomgt.2025.102919
Naama Ilany-Tzur , Lior Fink
{"title":"Device and risk-avoidance behavior in the context of cybersecurity phishing attacks","authors":"Naama Ilany-Tzur ,&nbsp;Lior Fink","doi":"10.1016/j.ijinfomgt.2025.102919","DOIUrl":"10.1016/j.ijinfomgt.2025.102919","url":null,"abstract":"<div><div>Phishing has been the most common type of cybercrime in recent years. The fact that successful phishing attempts require victims to collaborate with their attackers highlights the importance of identifying factors that influence users’ avoidance behavior. Drawing from evidence that mobile users process information differently than personal computer (PC) users, this research suggests that the device used may influence users’ risk-avoidance behavior, as manifested in their tendency to avoid clicking on potentially risky messages. Indeed, three studies suggest that mobile users are more risk-avoidant than PC users. Specifically, analyzing data from a cybersecurity company regarding ∼500,000 URL requests in a sample of household networks, we show that mobile devices are less likely than PCs to access unsafe URLs. Next, in two online controlled experiments in which device and URL risk levels were randomly assigned, we show that mobile users are less likely than PC users to click on a URL in a phishing-like message. Notably, this difference is observed for lower-risk URLs, whereas PC and mobile users display similar risk-avoidance tendencies in the presence of highly risky URLs. This work contributes to the mobile use literature, as well as to developing information systems theory regarding technology-threat avoidance, by showing that the device used is a contextual factor influencing users’ susceptibility to phishing attacks.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102919"},"PeriodicalIF":20.1,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144084586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulated responses in reality-enhancing technologies: Scale development and validation 现实增强技术中的模拟反应:规模开发和验证
IF 20.1 1区 管理学
International Journal of Information Management Pub Date : 2025-05-19 DOI: 10.1016/j.ijinfomgt.2025.102927
Erol Pala , Sommer Kapitan , Patrick van Esch
{"title":"Simulated responses in reality-enhancing technologies: Scale development and validation","authors":"Erol Pala ,&nbsp;Sommer Kapitan ,&nbsp;Patrick van Esch","doi":"10.1016/j.ijinfomgt.2025.102927","DOIUrl":"10.1016/j.ijinfomgt.2025.102927","url":null,"abstract":"<div><div>Reality-enhancing technologies influence consumer decisions, yet our understanding of how consumers respond to marketing content using such technologies is nascent. We develop a scale to measure consumers’ simulated responses in reality-enhancing technology experiences, resulting in the creation of a 12-item simulated responses scale with two dimensions, simulated satiation (6 items) and simulated immersion (6 items). The analyses revealed that simulated responses is a multidimensional construct, with each dimension considered an independent scale. Consequently, simulated satiation lowers evaluations of augmented reality tools and purchase intent, yet simulated immersion raises both responses. The results reveal how content variety and exposure duration interact with simulated satiation and simulated immersion to influence consumers’ evaluations and decisions. By employing the simulated responses scale, marketing practitioners can assess the effectiveness of their reality-enhancing technology strategies. The goal is to optimize content variety and exposure duration to achieve better outcomes prior to launching a marketing campaign.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102927"},"PeriodicalIF":20.1,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144084522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI sensation and engagement: Unpacking the sensory experience in human-AI interaction
IF 20.1 1区 管理学
International Journal of Information Management Pub Date : 2025-05-13 DOI: 10.1016/j.ijinfomgt.2025.102918
Pantea Foroudi , Reza Marvi , Dongmei Zha
{"title":"AI sensation and engagement: Unpacking the sensory experience in human-AI interaction","authors":"Pantea Foroudi ,&nbsp;Reza Marvi ,&nbsp;Dongmei Zha","doi":"10.1016/j.ijinfomgt.2025.102918","DOIUrl":"10.1016/j.ijinfomgt.2025.102918","url":null,"abstract":"<div><div>Given the limited studies on AI sensation and its impact on consumer emotional response and engagement, we investigate its impact to drive engagement. Employing a mixed-methods approach, we began with a qualitative phase consisting of 68 interviews (18 healthcare employees, 37 users of Wearable Health Devices, 7 AI developers, and 6 academics). Grounded in the theories of constructed emotion and the uncanny valley, as well as insights from the qualitative phase, we developed a robust model investigating the role of AI sensation on costumer emotional responses and engagement. This was followed by a survey of 557 healthcare employees. Data analysis was conducted using SPSS for descriptive statistics and reliability assessments, and AMOS for confirmatory factor analysis to validate the robustness of our measurement models. our findings show that AI sensation can drive customer subjective feeling state and AI affects. We also found empirical evidence that both can mediate the relationship between AI sensation, customer subjective feeling state, AI affects and activation engagement. Our findings can offer valuable understanding for managers and AI developers, underscoring the important role of AI sensation for driving engagement.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102918"},"PeriodicalIF":20.1,"publicationDate":"2025-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143943716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When employees meet digital-intelligence transformation: Unveiling the role of employee intentions 当员工遇到数字智能转型:揭示员工意图的作用
IF 20.1 1区 管理学
International Journal of Information Management Pub Date : 2025-05-05 DOI: 10.1016/j.ijinfomgt.2025.102912
Tung-Ju Wu , Ruo-Xi Zhang , Jia-Min Li
{"title":"When employees meet digital-intelligence transformation: Unveiling the role of employee intentions","authors":"Tung-Ju Wu ,&nbsp;Ruo-Xi Zhang ,&nbsp;Jia-Min Li","doi":"10.1016/j.ijinfomgt.2025.102912","DOIUrl":"10.1016/j.ijinfomgt.2025.102912","url":null,"abstract":"<div><div>Although the reaction of change recipients is crucial in the successful implementation of organizational change, research on digital-intelligence transformation (DIT) neglected employees’ intentions to support DIT. Integrating the theory of planned behavior and job demands-resources model, this study presents a model that explains employees’ intention to support DIT. Derived from a preliminary interview study, we identified critical determinants that shape employees’ attitude towards DIT. We conducted a two-time point study with employees from enterprises presently undergoing DIT to test hypotheses. We found that DIT-supportive behavior is indirectly influenced by DIT-related attitude, DIT-related subjective norm and role clarity under DIT via employees’ intentions to support DIT. Our research also explored the moderating role of DIT-related perceived behavioral control. We further discuss the theoretical and practical implications of this research.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102912"},"PeriodicalIF":20.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143903537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-driven dynamic capabilities in emerging markets: A grounded theory approach to digital transformation in african retail banking 新兴市场中数据驱动的动态能力:非洲零售银行数字化转型的基础理论方法
IF 20.1 1区 管理学
International Journal of Information Management Pub Date : 2025-05-05 DOI: 10.1016/j.ijinfomgt.2025.102914
Thomas Anning-Dorson, Faeeza Baba, Melissa Zulu, George Acheampong
{"title":"Data-driven dynamic capabilities in emerging markets: A grounded theory approach to digital transformation in african retail banking","authors":"Thomas Anning-Dorson,&nbsp;Faeeza Baba,&nbsp;Melissa Zulu,&nbsp;George Acheampong","doi":"10.1016/j.ijinfomgt.2025.102914","DOIUrl":"10.1016/j.ijinfomgt.2025.102914","url":null,"abstract":"<div><div>This study develops a process model of Data-Driven Dynamic Capabilities (DDDC) in African retail banking, addressing critical gaps in our understanding of how organizations develop and deploy data capabilities in data-rich, resource-constrained environments. Through a qualitative multiple case study of two major African banks, we uncover the specific practices through which banks develop capabilities despite resource constraints, deploy them to address contextual challenges, and generate competitive advantage. Our analysis reveals three interconnected processes: capability development practices (including data-driven culture cultivation, cross-functional integration, and adaptive infrastructure development); core capabilities that emerge through these practices (Data Integration and Synthesis, Real-time Insight Generation, and Agile Marketing Execution); and capability deployment practices (such as contextually adaptive customer engagement and regulatory navigation) that translate capabilities into competitive outcomes. The process model explains how contextual factors—including regulatory complexity, varying digital infrastructure, and skills constraints—shape both capability development and deployment practices. Theoretically, our study extends dynamic capabilities theory by reconceptualizing capability development as an ongoing process enacted through specific organizational practices rather than as a linear sequence of activities. It contributes to the literature on big data analytics by revealing how capabilities emerge through the interplay of organizational practices and contextual factors, challenging traditional assumptions about resource requirements for advanced analytics capabilities. By focusing on practices rather than just capabilities, our process model shows how organizations in resource-constrained environments develop innovative approaches to overcome limitations in specialized analytics talent and infrastructure. This research provides a roadmap for digital transformation in emerging markets, emphasizing the development of contextually appropriate practices rather than simply importing approaches from resource-rich environments. It sets the stage for future research on organizational adaptation in data-rich, resource-constrained environments, exploring the intersection of data analytics, dynamic capabilities, and contextual innovation.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102914"},"PeriodicalIF":20.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143903539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the role of information systems-induced depletion, boreout syndrome, social media use on quiet quitting among digital cohorts 探索信息系统导致的耗竭、无聊综合症、社交媒体使用在数字人群中安静戒烟的作用
IF 20.1 1区 管理学
International Journal of Information Management Pub Date : 2025-05-05 DOI: 10.1016/j.ijinfomgt.2025.102911
A. Mohammed Abubakar , Ömer Turunç , Mohammad Soliman , Alexandre Sukhov
{"title":"Exploring the role of information systems-induced depletion, boreout syndrome, social media use on quiet quitting among digital cohorts","authors":"A. Mohammed Abubakar ,&nbsp;Ömer Turunç ,&nbsp;Mohammad Soliman ,&nbsp;Alexandre Sukhov","doi":"10.1016/j.ijinfomgt.2025.102911","DOIUrl":"10.1016/j.ijinfomgt.2025.102911","url":null,"abstract":"<div><div>This research explores the socio-technical factors behind employees’ quiet quitting by investigating how social factors (boreout syndrome and digital cohorts) and technical factors (IS-induced depletion and social media usage) interact to encourage this behavior. A two-wave design across two independent studies was used with an expanded analytical approach. Study 1 used a symmetric variable-based analysis to identify IS-induced depletion, boreout, low social media usage, and digital immigrant status as key predictors of quiet quitting. In Study 2, boreout, social media usage, and digital immigrant status emerged as significant predictors. An asymmetric case-based analysis further demonstrated that quiet quitting results from combinations of conditions: in Study 1, IS-induced depletion and boreout were prevalent among digital immigrants with low social media usage. Similarly, in Study 2, IS-induced depletion and boreout occurred among digital natives or individuals with low social media usage. Contrary to the assumption that digital natives are more prone to quiet quitting, the findings indicate that digital immigrants are, in fact, more susceptible to this behavior when exposed to these stressors.</div></div>","PeriodicalId":48422,"journal":{"name":"International Journal of Information Management","volume":"84 ","pages":"Article 102911"},"PeriodicalIF":20.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143903536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信