Prologue 发表于 2025-3-30 08:30:15

hnique, we outline a methodological framework for the elicitation and analysis of critical incidents that accounts for the rationalities and aesthetics of situated practices and the ways these are reproduced and altered by the participants. Based on two examples, we show how critical incidents can p

lanugo 发表于 2025-3-30 13:03:35

http://reply.papertrans.cn/47/4656/465548/465548_52.png

HAIRY 发表于 2025-3-30 18:08:11

Michael Kunz,Ludwig Fuchs,Michael Netter,Günther Pernulhnique, we outline a methodological framework for the elicitation and analysis of critical incidents that accounts for the rationalities and aesthetics of situated practices and the ways these are reproduced and altered by the participants. Based on two examples, we show how critical incidents can p

竖琴 发表于 2025-3-30 23:24:26

Davide Maiorca,Davide Ariu,Igino Corona,Giorgio Giacintocesses. Subsequently, it focuses on issues such as arts and cultural education in times of neoliberalism, (post-)migration and post-coloniality as well as on arts and cultural education under conditions of digital transformation. These theoretical and empirical contributions are complemented by insi

砍伐 发表于 2025-3-31 04:46:29

hnique, we outline a methodological framework for the elicitation and analysis of critical incidents that accounts for the rationalities and aesthetics of situated practices and the ways these are reproduced and altered by the participants. Based on two examples, we show how critical incidents can p

盟军 发表于 2025-3-31 07:40:41

Fabian Knirsch,Dominik Engel,Cristian Neureiter,Marc Frincu,Viktor Prasanna for heritage protection aligned with the international standards and with the doctrine, the role of the architect is essential. The project is indeed the form by which the intrinsic qualities of the built environment and cultural heritage in general, including movable objects from crafts and arts,

周兴旺 发表于 2025-3-31 11:35:00

Henrik Nergaard,Nils Ulltveit-Moe,Terje Gjøsæterptive events, both regional and global, it is important to understand what are the associated threats and ultimately the opportunities. The methodology adopted for this exploratory study is essentially quantitative, and, in addition to the literature and secondary data review, questionnaires were se

embolus 发表于 2025-3-31 14:01:23

http://reply.papertrans.cn/47/4656/465548/465548_58.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Information Systems Security and Privacy; First International Olivier Camp,Edgar Weippl,Esma Aïmeur Conference proceedings 2015 Springer I