派博傳思國際中心

標題: Titlebook: Information Technology for Management: Solving Social and Business Problems Through IT; ITBS 2023 Main Track Ewa Ziemba,Witold Chmielarz,Ja [打印本頁]

作者: Addiction    時間: 2025-3-21 19:40
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT影響因子(影響力)




書目名稱Information Technology for Management: Solving Social and Business Problems Through IT影響因子(影響力)學(xué)科排名




書目名稱Information Technology for Management: Solving Social and Business Problems Through IT網(wǎng)絡(luò)公開度




書目名稱Information Technology for Management: Solving Social and Business Problems Through IT網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Technology for Management: Solving Social and Business Problems Through IT被引頻次




書目名稱Information Technology for Management: Solving Social and Business Problems Through IT被引頻次學(xué)科排名




書目名稱Information Technology for Management: Solving Social and Business Problems Through IT年度引用




書目名稱Information Technology for Management: Solving Social and Business Problems Through IT年度引用學(xué)科排名




書目名稱Information Technology for Management: Solving Social and Business Problems Through IT讀者反饋




書目名稱Information Technology for Management: Solving Social and Business Problems Through IT讀者反饋學(xué)科排名





作者: 打包    時間: 2025-3-21 20:44
Conference proceedings 2024ns.?From the 6 submissions to DSH 2023, no paper passed the extended reviews. The accepted papers are grouped in sections on IT in Improving of Management Systems, Approaches to Improving of Social Problems, and Methods of Solving Business..
作者: Morbid    時間: 2025-3-22 01:16
1865-1348 submissions.?From the 6 submissions to DSH 2023, no paper passed the extended reviews. The accepted papers are grouped in sections on IT in Improving of Management Systems, Approaches to Improving of Social Problems, and Methods of Solving Business..978-3-031-61656-3978-3-031-61657-0Series ISSN 1865-1348 Series E-ISSN 1865-1356
作者: 斗爭    時間: 2025-3-22 06:20

作者: frozen-shoulder    時間: 2025-3-22 10:39
Effective Communication of IT Costs and IT Business Valueommunication of IT costs and IT business value. Hence, this paper enables a better understanding of the perception and the operationalization of effective communication mainly between business and IT executives regarding IT costs and IT business value.
作者: LIKEN    時間: 2025-3-22 15:13
Sign Language Interpreting - Assessment of?the?Efficiency of?the?Translation Modelorrect model operation, illogical outputs, and issues with translations beyond the training set. Low data volume and quality, along with nonrepresentative examples, contributed to subpar performance. This research offers valuable insights for future Polish Sign Language translation model enhancements within a concise framework.
作者: 出生    時間: 2025-3-22 20:02
A Literature Review Based Insight into Agile Mindset Through a Lens of Six C’s Grounded Theory Modelature and modeled the obtained results by using Glaser’s Six C’s Grounded Theory coding family. Therefore, we aimed to provide a comprehensive insight into the Agile Mindset construct, which is new yet essential, required but hard to acquire, challenging to observe but important to notice, and cheap to disregard but at an excessive cost.
作者: 執(zhí)    時間: 2025-3-22 22:20
Experimenting Emotion-Based Book Recommender Systems with?Social Datad from . website - a popular book social network, using our customized web scraper. Lastly, we propose and use two evaluation metrics: Coverage and Average Recommendations Similarity, and discuss our results.
作者: Cpr951    時間: 2025-3-23 03:54
1865-1348 for Business and Society, ITBS 2023, and two Thematic Tracks: Information System Management, ISM 2023, and Knowledge Acquisition and Management, KAM 2023, held in Poland, Warsaw, during September 17- 20, 2023...ITBS 2023 received 26 submissions, from which 6 full papers and 2 short papers have been
作者: QUAIL    時間: 2025-3-23 08:28

作者: Ophthalmoscope    時間: 2025-3-23 13:12
Information Technology for Management: Solving Social and Business Problems Through IT978-3-031-61657-0Series ISSN 1865-1348 Series E-ISSN 1865-1356
作者: Enteropathic    時間: 2025-3-23 15:53

作者: 協(xié)奏曲    時間: 2025-3-23 21:07
https://doi.org/10.1007/978-3-031-61657-0business information systems; project management; computer applications; artificial intelligence; busine
作者: ERUPT    時間: 2025-3-23 22:38

作者: GEON    時間: 2025-3-24 06:10

作者: Anticonvulsants    時間: 2025-3-24 10:04

作者: BARK    時間: 2025-3-24 11:49

作者: GLOSS    時間: 2025-3-24 15:58

作者: cocoon    時間: 2025-3-24 20:12
A Quantitative and Qualitative Exploration of Critical Factors in the IAI-CGM Framework: The Perspecwithout the need for frequent fingerstick blood samples. This study aims to measure the adoption intention of individuals with type-1 diabetes in Saudi Arabia, with a specific focus on identifying the critical factors influencing their intention to adopt IoT-CGMs. The surge in the number of type-1 d
作者: SIT    時間: 2025-3-25 02:17

作者: 拱形面包    時間: 2025-3-25 03:57

作者: esoteric    時間: 2025-3-25 09:43

作者: BILE    時間: 2025-3-25 14:12
Sustainable Smart Cities: A Comprehensive Framework for Sustainability Assessment of Intelligent Trant transport systems (ITS). Building on this research, this paper shows the practical application of the framework by assessing three exemplary ITS projects and discussing potential future use. Due to the increasing relevance of ITS to improve the efficiency of transport in highly congested areas, t
作者: visual-cortex    時間: 2025-3-25 17:35

作者: 匯總    時間: 2025-3-25 23:46
Opportunities and Obstacles of Using Gamification in the Recruiting Processasingly embracing innovative strategies to attract and engage candidates effectively. A suitable tool for this purpose is the use of Gamification. Gamification focuses primarily on generation Y and Z, because they grew up in the age of digitalization. This study uses a qualitative empirical research
作者: 官僚統(tǒng)治    時間: 2025-3-26 01:53

作者: 思考才皺眉    時間: 2025-3-26 04:50

作者: 執(zhí)拗    時間: 2025-3-26 09:34

作者: Compass    時間: 2025-3-26 16:27
Bart?omiej Kizielewicz,Jakub Wi?ckowski,Jaros?aw Jankowskitrol theory, and subcultural theories have garnered much empirical attention and support. Lack of moral qualms, association with deviant peers and neutralizations have consistently been associated with a wide range of cyber-offending. From routine activities theory, increased visibility is associate
作者: initiate    時間: 2025-3-26 19:39
Christophe Feltus,Peter Klein,Natalia Konchakova,Damien Nicolas,Carlos Kavka,Martin T. Horsch,Heinz urisdiction as they can operate from anywhere in the world. The complexity of investigation of such crimes will make it difficult if the police are not adequately trained or educated on the subject matter in being able to identify the offenders and bring them to justices. This chapter aims to highli
作者: defile    時間: 2025-3-26 21:29
Christian Leyh,Marcel Lange,Alisa Lorenz,Yvonne Engelhardturisdiction as they can operate from anywhere in the world. The complexity of investigation of such crimes will make it difficult if the police are not adequately trained or educated on the subject matter in being able to identify the offenders and bring them to justices. This chapter aims to highli
作者: uveitis    時間: 2025-3-27 01:50

作者: Neolithic    時間: 2025-3-27 05:29

作者: handle    時間: 2025-3-27 12:52

作者: Etymology    時間: 2025-3-27 17:03

作者: Common-Migraine    時間: 2025-3-27 21:07

作者: Junction    時間: 2025-3-28 00:20

作者: 小隔間    時間: 2025-3-28 02:14

作者: Anticonvulsants    時間: 2025-3-28 09:31

作者: 軍火    時間: 2025-3-28 13:12
Alisa Lorenz,Nils Madeja,Christian Leyhm include cyber intruders, advanced persistent threats, and malicious insiders. Once such users gain unobstructed access to, and use of, the protected information system, it is difficult to distinguish between legitimate and illegitimate users..We view cyber deception as comprised of two broad categ
作者: Arbitrary    時間: 2025-3-28 14:38

作者: ARIA    時間: 2025-3-28 21:40
Jasmin Zerrer,Ralf Christian H?rting,Maren Gerstse resources in security situations is modeled through Stackelberg Security Games, where defenders allocate the security resources using the schedule from a Strong Stackelberg Equilibrium (SSE) before attackers exploit the network. To further strengthen the security allocation and reduce the costs o
作者: 哄騙    時間: 2025-3-29 01:53
Necmettin Ozkan,Karen Eilers,Mehmet ?ahin G?ke operations. It has been involved for homes, companies, industries and now it is present in healthcare. However, due to lack of standardisation and accelerated competition, providers are deploying devices focused on innovation without having the proper balance between security, performance and ease
作者: Initial    時間: 2025-3-29 04:15

作者: progestogen    時間: 2025-3-29 09:28
Information Technology for Management: Solving Social and Business Problems Through ITITBS 2023 Main Track
作者: 抗體    時間: 2025-3-29 12:30
officers (CEOs) were in the mid twenties and had basically no clue as to what real business is and how much a dollar counts. Now, as this convergence is happening, the painful reality and the business rules of the old economy get us back down to earth. The CEOs become more senior, business plans are
作者: 可耕種    時間: 2025-3-29 17:00
Bart?omiej Kizielewicz,Jakub Wi?ckowski,Jaros?aw Jankowski hackers, and regular participants in the online illicit sex trade. Limited research has examined deterrence theory, general strain theory, or differential reinforcements in social learning theory. Future research is needed to integrate the perceived characteristics of cyberspace with the formation
作者: 違反    時間: 2025-3-29 21:13
Christophe Feltus,Peter Klein,Natalia Konchakova,Damien Nicolas,Carlos Kavka,Martin T. Horsch,Heinz nal values. Therefore, it is extremely important that the right level of training and education be provided to police officers to be able to protect and safeguard the information on their Information Communications and Technology (ICT) systems. This chapter will review the current policing practices
作者: 不出名    時間: 2025-3-30 02:53

作者: atopic-rhinitis    時間: 2025-3-30 08:04

作者: VOK    時間: 2025-3-30 09:42
Constanze Riedinger,Melanie Huber,Niculin Prinz,Robin Kaufmannaudiences. However, this characterisation cannot be carried over to cybercrime, because the environment in which such crime is committed cannot be pinpointed to a geographical location, or distinctive social or cultural groups...Due to the rapid changes in technology, cyber criminals’ behaviour has
作者: epicardium    時間: 2025-3-30 16:04

作者: Bridle    時間: 2025-3-30 18:36

作者: 使高興    時間: 2025-3-31 00:47
Shelley Dowrie,Marita Turpin,Jean-Paul Van Bellerepare the members of the emergency and crisis organization for their tasks in crisis management. Other aspects of preparation for cyber crises are the identification of critical resources. We should prepare plans for their failure and restart. We should verify the effectiveness of the plans as well
作者: BAIL    時間: 2025-3-31 03:14
Barbara Probierz,Maciej Kuchcik,Grzegorz Adamiec,Adam Piasecki,Jan Kozakorbereitungsma?nahmen sollten wir durch geeignete Testformate und Audits überprüfen. Auch und insbesondere für die Krisenkommunikation sollten wir Vorkehrungen treffen. Elementar ist, dass wir die Mitglieder der NuK angemessen auf ihre Aufgaben bei der Krisenbew?ltigung vorbereiten. Dies schlie?t da
作者: Infiltrate    時間: 2025-3-31 07:20





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
郴州市| 呼伦贝尔市| 肃宁县| 东乡族自治县| 陈巴尔虎旗| 荥阳市| 德州市| 平舆县| 景德镇市| 陇川县| 庆城县| 稻城县| 慈溪市| 宾川县| 林口县| 巧家县| 庐江县| 堆龙德庆县| 梅州市| 临洮县| 丹凤县| 远安县| 义乌市| 布拖县| 金秀| 建昌县| 鹤壁市| 宜宾县| 阿拉善右旗| 乡宁县| 郧西县| 乌拉特中旗| 卫辉市| 临猗县| 张家港市| 庆云县| 郯城县| 龙海市| 高碑店市| 安吉县| 靖远县|