EXCEL
发表于 2025-3-26 23:16:57
http://reply.papertrans.cn/71/7045/704473/704473_31.png
不能逃避
发表于 2025-3-27 04:52:30
Automation as Management of Paradoxical Tensions: The Role of Industrial Engineering,pting a Grounded Theory approach, we carried out a study that highlighted profound and unexpected organizational implications and management challenges connected to the introduction of the new technology. Our analysis revealed the key role of the Industrial Engineering function as a change agent in
神圣不可
发表于 2025-3-27 05:32:45
Visualizing Big Data: The Impact on Sense-Making and Decision-Making,ciently and effectively. This study aims at investigating the role of innovative digital tools to manipulate big data in transforming managers and executives activities, in particular their sense-making (how they interpret data) and decision-making (who is using data and to what extent). A qualitati
Ambulatory
发表于 2025-3-27 10:44:54
http://reply.papertrans.cn/71/7045/704473/704473_34.png
Limited
发表于 2025-3-27 15:35:31
Information Security Policies in Organizations,s guide information security policy implementation, but the challenge of ensuring compliance is still a major issue, despite extensive information security research. The lack of versatility in theoretical approaches spurred calls for sociological approaches to contribute to the literature, but they
极大的痛苦
发表于 2025-3-27 19:22:47
http://reply.papertrans.cn/71/7045/704473/704473_36.png
pus840
发表于 2025-3-27 22:01:34
http://reply.papertrans.cn/71/7045/704473/704473_37.png
Culpable
发表于 2025-3-28 03:43:58
AIS and MCS for Port Community Systems: An Empirical Analysis from Italy,ports when an information technology platform has been adopted, such as the Port Community Systems (PCSs). We conducted a literature review on PCSs and on how AIS and MCS could contribute to the platform in order to support the decision-making processes of port players, like forwarder and shipping a
Acclaim
发表于 2025-3-28 10:20:08
Securing National e-ID Infrastructures: Tor Networks as a Source of Threats, artefacts in the darknet facilitates illegal activities such as identity theft in both physical and virtual worlds. This paper reports the findings of an exploratory analysis of identity trading in the darknet. We capture the key features of three major markets of fake IDs in Tor networks, and appl
Macronutrients
发表于 2025-3-28 13:57:55
http://reply.papertrans.cn/71/7045/704473/704473_40.png