標題: Titlebook: Information Technology for Management: Solving Social and Business Problems Through IT; ITBS 2023 Main Track Ewa Ziemba,Witold Chmielarz,Ja [打印本頁] 作者: Addiction 時間: 2025-3-21 19:40
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT影響因子(影響力)
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT影響因子(影響力)學(xué)科排名
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT網(wǎng)絡(luò)公開度
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT被引頻次
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT被引頻次學(xué)科排名
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT年度引用
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT年度引用學(xué)科排名
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT讀者反饋
書目名稱Information Technology for Management: Solving Social and Business Problems Through IT讀者反饋學(xué)科排名
作者: 打包 時間: 2025-3-21 20:44
Conference proceedings 2024ns.?From the 6 submissions to DSH 2023, no paper passed the extended reviews. The accepted papers are grouped in sections on IT in Improving of Management Systems, Approaches to Improving of Social Problems, and Methods of Solving Business..作者: Morbid 時間: 2025-3-22 01:16
1865-1348 submissions.?From the 6 submissions to DSH 2023, no paper passed the extended reviews. The accepted papers are grouped in sections on IT in Improving of Management Systems, Approaches to Improving of Social Problems, and Methods of Solving Business..978-3-031-61656-3978-3-031-61657-0Series ISSN 1865-1348 Series E-ISSN 1865-1356 作者: 斗爭 時間: 2025-3-22 06:20 作者: frozen-shoulder 時間: 2025-3-22 10:39
Effective Communication of IT Costs and IT Business Valueommunication of IT costs and IT business value. Hence, this paper enables a better understanding of the perception and the operationalization of effective communication mainly between business and IT executives regarding IT costs and IT business value.作者: LIKEN 時間: 2025-3-22 15:13
Sign Language Interpreting - Assessment of?the?Efficiency of?the?Translation Modelorrect model operation, illogical outputs, and issues with translations beyond the training set. Low data volume and quality, along with nonrepresentative examples, contributed to subpar performance. This research offers valuable insights for future Polish Sign Language translation model enhancements within a concise framework.作者: 出生 時間: 2025-3-22 20:02
A Literature Review Based Insight into Agile Mindset Through a Lens of Six C’s Grounded Theory Modelature and modeled the obtained results by using Glaser’s Six C’s Grounded Theory coding family. Therefore, we aimed to provide a comprehensive insight into the Agile Mindset construct, which is new yet essential, required but hard to acquire, challenging to observe but important to notice, and cheap to disregard but at an excessive cost.作者: 執(zhí) 時間: 2025-3-22 22:20
Experimenting Emotion-Based Book Recommender Systems with?Social Datad from . website - a popular book social network, using our customized web scraper. Lastly, we propose and use two evaluation metrics: Coverage and Average Recommendations Similarity, and discuss our results.作者: Cpr951 時間: 2025-3-23 03:54
1865-1348 for Business and Society, ITBS 2023, and two Thematic Tracks: Information System Management, ISM 2023, and Knowledge Acquisition and Management, KAM 2023, held in Poland, Warsaw, during September 17- 20, 2023...ITBS 2023 received 26 submissions, from which 6 full papers and 2 short papers have been作者: QUAIL 時間: 2025-3-23 08:28 作者: Ophthalmoscope 時間: 2025-3-23 13:12
Information Technology for Management: Solving Social and Business Problems Through IT978-3-031-61657-0Series ISSN 1865-1348 Series E-ISSN 1865-1356 作者: Enteropathic 時間: 2025-3-23 15:53 作者: 協(xié)奏曲 時間: 2025-3-23 21:07
https://doi.org/10.1007/978-3-031-61657-0business information systems; project management; computer applications; artificial intelligence; busine作者: ERUPT 時間: 2025-3-23 22:38 作者: GEON 時間: 2025-3-24 06:10 作者: Anticonvulsants 時間: 2025-3-24 10:04 作者: BARK 時間: 2025-3-24 11:49 作者: GLOSS 時間: 2025-3-24 15:58 作者: cocoon 時間: 2025-3-24 20:12
A Quantitative and Qualitative Exploration of Critical Factors in the IAI-CGM Framework: The Perspecwithout the need for frequent fingerstick blood samples. This study aims to measure the adoption intention of individuals with type-1 diabetes in Saudi Arabia, with a specific focus on identifying the critical factors influencing their intention to adopt IoT-CGMs. The surge in the number of type-1 d作者: SIT 時間: 2025-3-25 02:17 作者: 拱形面包 時間: 2025-3-25 03:57 作者: esoteric 時間: 2025-3-25 09:43 作者: BILE 時間: 2025-3-25 14:12
Sustainable Smart Cities: A Comprehensive Framework for Sustainability Assessment of Intelligent Trant transport systems (ITS). Building on this research, this paper shows the practical application of the framework by assessing three exemplary ITS projects and discussing potential future use. Due to the increasing relevance of ITS to improve the efficiency of transport in highly congested areas, t作者: visual-cortex 時間: 2025-3-25 17:35 作者: 匯總 時間: 2025-3-25 23:46
Opportunities and Obstacles of Using Gamification in the Recruiting Processasingly embracing innovative strategies to attract and engage candidates effectively. A suitable tool for this purpose is the use of Gamification. Gamification focuses primarily on generation Y and Z, because they grew up in the age of digitalization. This study uses a qualitative empirical research作者: 官僚統(tǒng)治 時間: 2025-3-26 01:53 作者: 思考才皺眉 時間: 2025-3-26 04:50 作者: 執(zhí)拗 時間: 2025-3-26 09:34 作者: Compass 時間: 2025-3-26 16:27
Bart?omiej Kizielewicz,Jakub Wi?ckowski,Jaros?aw Jankowskitrol theory, and subcultural theories have garnered much empirical attention and support. Lack of moral qualms, association with deviant peers and neutralizations have consistently been associated with a wide range of cyber-offending. From routine activities theory, increased visibility is associate作者: initiate 時間: 2025-3-26 19:39
Christophe Feltus,Peter Klein,Natalia Konchakova,Damien Nicolas,Carlos Kavka,Martin T. Horsch,Heinz urisdiction as they can operate from anywhere in the world. The complexity of investigation of such crimes will make it difficult if the police are not adequately trained or educated on the subject matter in being able to identify the offenders and bring them to justices. This chapter aims to highli作者: defile 時間: 2025-3-26 21:29
Christian Leyh,Marcel Lange,Alisa Lorenz,Yvonne Engelhardturisdiction as they can operate from anywhere in the world. The complexity of investigation of such crimes will make it difficult if the police are not adequately trained or educated on the subject matter in being able to identify the offenders and bring them to justices. This chapter aims to highli作者: uveitis 時間: 2025-3-27 01:50 作者: Neolithic 時間: 2025-3-27 05:29 作者: handle 時間: 2025-3-27 12:52 作者: Etymology 時間: 2025-3-27 17:03 作者: Common-Migraine 時間: 2025-3-27 21:07 作者: Junction 時間: 2025-3-28 00:20 作者: 小隔間 時間: 2025-3-28 02:14 作者: Anticonvulsants 時間: 2025-3-28 09:31 作者: 軍火 時間: 2025-3-28 13:12
Alisa Lorenz,Nils Madeja,Christian Leyhm include cyber intruders, advanced persistent threats, and malicious insiders. Once such users gain unobstructed access to, and use of, the protected information system, it is difficult to distinguish between legitimate and illegitimate users..We view cyber deception as comprised of two broad categ作者: Arbitrary 時間: 2025-3-28 14:38 作者: ARIA 時間: 2025-3-28 21:40
Jasmin Zerrer,Ralf Christian H?rting,Maren Gerstse resources in security situations is modeled through Stackelberg Security Games, where defenders allocate the security resources using the schedule from a Strong Stackelberg Equilibrium (SSE) before attackers exploit the network. To further strengthen the security allocation and reduce the costs o作者: 哄騙 時間: 2025-3-29 01:53
Necmettin Ozkan,Karen Eilers,Mehmet ?ahin G?ke operations. It has been involved for homes, companies, industries and now it is present in healthcare. However, due to lack of standardisation and accelerated competition, providers are deploying devices focused on innovation without having the proper balance between security, performance and ease作者: Initial 時間: 2025-3-29 04:15 作者: progestogen 時間: 2025-3-29 09:28
Information Technology for Management: Solving Social and Business Problems Through ITITBS 2023 Main Track作者: 抗體 時間: 2025-3-29 12:30
officers (CEOs) were in the mid twenties and had basically no clue as to what real business is and how much a dollar counts. Now, as this convergence is happening, the painful reality and the business rules of the old economy get us back down to earth. The CEOs become more senior, business plans are作者: 可耕種 時間: 2025-3-29 17:00
Bart?omiej Kizielewicz,Jakub Wi?ckowski,Jaros?aw Jankowski hackers, and regular participants in the online illicit sex trade. Limited research has examined deterrence theory, general strain theory, or differential reinforcements in social learning theory. Future research is needed to integrate the perceived characteristics of cyberspace with the formation 作者: 違反 時間: 2025-3-29 21:13
Christophe Feltus,Peter Klein,Natalia Konchakova,Damien Nicolas,Carlos Kavka,Martin T. Horsch,Heinz nal values. Therefore, it is extremely important that the right level of training and education be provided to police officers to be able to protect and safeguard the information on their Information Communications and Technology (ICT) systems. This chapter will review the current policing practices作者: 不出名 時間: 2025-3-30 02:53 作者: atopic-rhinitis 時間: 2025-3-30 08:04 作者: VOK 時間: 2025-3-30 09:42
Constanze Riedinger,Melanie Huber,Niculin Prinz,Robin Kaufmannaudiences. However, this characterisation cannot be carried over to cybercrime, because the environment in which such crime is committed cannot be pinpointed to a geographical location, or distinctive social or cultural groups...Due to the rapid changes in technology, cyber criminals’ behaviour has 作者: epicardium 時間: 2025-3-30 16:04 作者: Bridle 時間: 2025-3-30 18:36 作者: 使高興 時間: 2025-3-31 00:47
Shelley Dowrie,Marita Turpin,Jean-Paul Van Bellerepare the members of the emergency and crisis organization for their tasks in crisis management. Other aspects of preparation for cyber crises are the identification of critical resources. We should prepare plans for their failure and restart. We should verify the effectiveness of the plans as well作者: BAIL 時間: 2025-3-31 03:14
Barbara Probierz,Maciej Kuchcik,Grzegorz Adamiec,Adam Piasecki,Jan Kozakorbereitungsma?nahmen sollten wir durch geeignete Testformate und Audits überprüfen. Auch und insbesondere für die Krisenkommunikation sollten wir Vorkehrungen treffen. Elementar ist, dass wir die Mitglieder der NuK angemessen auf ihre Aufgaben bei der Krisenbew?ltigung vorbereiten. Dies schlie?t da作者: Infiltrate 時間: 2025-3-31 07:20