EXCEL 发表于 2025-3-26 23:16:57

http://reply.papertrans.cn/71/7045/704473/704473_31.png

不能逃避 发表于 2025-3-27 04:52:30

Automation as Management of Paradoxical Tensions: The Role of Industrial Engineering,pting a Grounded Theory approach, we carried out a study that highlighted profound and unexpected organizational implications and management challenges connected to the introduction of the new technology. Our analysis revealed the key role of the Industrial Engineering function as a change agent in

神圣不可 发表于 2025-3-27 05:32:45

Visualizing Big Data: The Impact on Sense-Making and Decision-Making,ciently and effectively. This study aims at investigating the role of innovative digital tools to manipulate big data in transforming managers and executives activities, in particular their sense-making (how they interpret data) and decision-making (who is using data and to what extent). A qualitati

Ambulatory 发表于 2025-3-27 10:44:54

http://reply.papertrans.cn/71/7045/704473/704473_34.png

Limited 发表于 2025-3-27 15:35:31

Information Security Policies in Organizations,s guide information security policy implementation, but the challenge of ensuring compliance is still a major issue, despite extensive information security research. The lack of versatility in theoretical approaches spurred calls for sociological approaches to contribute to the literature, but they

极大的痛苦 发表于 2025-3-27 19:22:47

http://reply.papertrans.cn/71/7045/704473/704473_36.png

pus840 发表于 2025-3-27 22:01:34

http://reply.papertrans.cn/71/7045/704473/704473_37.png

Culpable 发表于 2025-3-28 03:43:58

AIS and MCS for Port Community Systems: An Empirical Analysis from Italy,ports when an information technology platform has been adopted, such as the Port Community Systems (PCSs). We conducted a literature review on PCSs and on how AIS and MCS could contribute to the platform in order to support the decision-making processes of port players, like forwarder and shipping a

Acclaim 发表于 2025-3-28 10:20:08

Securing National e-ID Infrastructures: Tor Networks as a Source of Threats, artefacts in the darknet facilitates illegal activities such as identity theft in both physical and virtual worlds. This paper reports the findings of an exploratory analysis of identity trading in the darknet. We capture the key features of three major markets of fake IDs in Tor networks, and appl

Macronutrients 发表于 2025-3-28 13:57:55

http://reply.papertrans.cn/71/7045/704473/704473_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Organizing for the Digital World; IT for Individuals, Federico Cabitza,Carlo Batini,Massimo Magni Conference proceedings 2019 Springer Int