粘连 发表于 2025-3-25 04:17:40

Activating a Brand Through Digital Marketing: The Case of ‘Os Bonitos’haring information. Therefore, this has impacted the communication between brands and their consumers, who recognized the opportunity to use them to promote their products, establish closer relationships with consumers, add value to the brand, and increase awareness. So, brands are using digital med

OTHER 发表于 2025-3-25 10:13:48

http://reply.papertrans.cn/39/3874/387373/387373_22.png

foreign 发表于 2025-3-25 12:24:25

The Impact of Process Automation on Employee Performanceorganizational processes is a key factor in improving operational efficiency. This paper intends to contribute for a better understanding of the adoption of automation systems in organizations and analyze their impact on employee performance, considering the conditions under which they were implemen

Charlatan 发表于 2025-3-25 16:28:53

http://reply.papertrans.cn/39/3874/387373/387373_24.png

宪法没有 发表于 2025-3-25 22:44:13

http://reply.papertrans.cn/39/3874/387373/387373_25.png

失望未来 发表于 2025-3-26 02:50:52

http://reply.papertrans.cn/39/3874/387373/387373_26.png

Infirm 发表于 2025-3-26 06:24:02

The Influence of TikTok in Portuguese Millennials’ Footwear Consumer Behaviourons of users in Portugal (almost half of the country’s total social media users), but little research has been done so far to understand how the platform impacts users and their consumer behaviour, specifically regarding the footwear industry..This investigation emphasizes how different strategies i

媒介 发表于 2025-3-26 08:53:33

Promoting Inclusion in the Brazilian Educational Scenario: Actions for Teacher Trainingvely reducing barriers to access to education for these students. These barriers are due to infrastructure in schools, prejudice, lack of adequate skills to accommodate these students, even the lack of preparation of teachers to meet the individual educational demands of students. This work presents

farewell 发表于 2025-3-26 13:32:44

http://reply.papertrans.cn/39/3874/387373/387373_29.png

微不足道 发表于 2025-3-26 20:08:55

https://doi.org/10.1007/978-3-658-31608-2on, and insider attacks are carried out by users who have been granted access to the target organization’s network, apps, or databases. An attacker with administrative capabilities can edit logs and login records to remove traces of the attack, making insider attacks difficult to detect. Such data b
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Good Practices and New Perspectives in Information Systems and Technologies; WorldCIST 2024, Volu Álvaro Rocha,Hojjat Adeli,Aneta Poniszews