EXCEL 发表于 2025-3-26 23:16:57
http://reply.papertrans.cn/71/7045/704473/704473_31.png不能逃避 发表于 2025-3-27 04:52:30
Automation as Management of Paradoxical Tensions: The Role of Industrial Engineering,pting a Grounded Theory approach, we carried out a study that highlighted profound and unexpected organizational implications and management challenges connected to the introduction of the new technology. Our analysis revealed the key role of the Industrial Engineering function as a change agent in神圣不可 发表于 2025-3-27 05:32:45
Visualizing Big Data: The Impact on Sense-Making and Decision-Making,ciently and effectively. This study aims at investigating the role of innovative digital tools to manipulate big data in transforming managers and executives activities, in particular their sense-making (how they interpret data) and decision-making (who is using data and to what extent). A qualitatiAmbulatory 发表于 2025-3-27 10:44:54
http://reply.papertrans.cn/71/7045/704473/704473_34.pngLimited 发表于 2025-3-27 15:35:31
Information Security Policies in Organizations,s guide information security policy implementation, but the challenge of ensuring compliance is still a major issue, despite extensive information security research. The lack of versatility in theoretical approaches spurred calls for sociological approaches to contribute to the literature, but they极大的痛苦 发表于 2025-3-27 19:22:47
http://reply.papertrans.cn/71/7045/704473/704473_36.pngpus840 发表于 2025-3-27 22:01:34
http://reply.papertrans.cn/71/7045/704473/704473_37.pngCulpable 发表于 2025-3-28 03:43:58
AIS and MCS for Port Community Systems: An Empirical Analysis from Italy,ports when an information technology platform has been adopted, such as the Port Community Systems (PCSs). We conducted a literature review on PCSs and on how AIS and MCS could contribute to the platform in order to support the decision-making processes of port players, like forwarder and shipping aAcclaim 发表于 2025-3-28 10:20:08
Securing National e-ID Infrastructures: Tor Networks as a Source of Threats, artefacts in the darknet facilitates illegal activities such as identity theft in both physical and virtual worlds. This paper reports the findings of an exploratory analysis of identity trading in the darknet. We capture the key features of three major markets of fake IDs in Tor networks, and applMacronutrients 发表于 2025-3-28 13:57:55
http://reply.papertrans.cn/71/7045/704473/704473_40.png