標(biāo)題: Titlebook: Information Technology for Management: Towards Business Excellence; 15th Conference, ISM Ewa Ziemba,Witold Chmielarz Conference proceedings [打印本頁(yè)] 作者: hypothyroidism 時(shí)間: 2025-3-21 16:04
書(shū)目名稱Information Technology for Management: Towards Business Excellence影響因子(影響力)
書(shū)目名稱Information Technology for Management: Towards Business Excellence影響因子(影響力)學(xué)科排名
書(shū)目名稱Information Technology for Management: Towards Business Excellence網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Information Technology for Management: Towards Business Excellence網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Information Technology for Management: Towards Business Excellence被引頻次
書(shū)目名稱Information Technology for Management: Towards Business Excellence被引頻次學(xué)科排名
書(shū)目名稱Information Technology for Management: Towards Business Excellence年度引用
書(shū)目名稱Information Technology for Management: Towards Business Excellence年度引用學(xué)科排名
書(shū)目名稱Information Technology for Management: Towards Business Excellence讀者反饋
書(shū)目名稱Information Technology for Management: Towards Business Excellence讀者反饋學(xué)科排名
作者: backdrop 時(shí)間: 2025-3-21 21:58 作者: 可卡 時(shí)間: 2025-3-22 02:28
Dmitriy Gakh local, national, and global level in the detection and prevention of cybercrime, .CyberEconomic Crime in India. will also be of interest to researchers and practitioners working in financial crimes and white collar crime..978-3-030-44657-4978-3-030-44655-0Series ISSN 2522-5545 Series E-ISSN 2522-5553 作者: 聯(lián)想記憶 時(shí)間: 2025-3-22 05:22
Alexander Oppermann,Samuel Eickelberg,John Exner local, national, and global level in the detection and prevention of cybercrime, .CyberEconomic Crime in India. will also be of interest to researchers and practitioners working in financial crimes and white collar crime..978-3-030-44657-4978-3-030-44655-0Series ISSN 2522-5545 Series E-ISSN 2522-5553 作者: jumble 時(shí)間: 2025-3-22 12:33 作者: ungainly 時(shí)間: 2025-3-22 14:44 作者: Hirsutism 時(shí)間: 2025-3-22 20:03
grid. Or perhaps the sophisticated attack a year later in Kiev that although causing a brief power blackout, had the manifestations of more concerns in how that attack was built and delivered. Or the WannaCry ransomware attack in 2017 that caused widespread chaos with healthcare institutions unable 作者: 使長(zhǎng)胖 時(shí)間: 2025-3-23 00:42
Gloria J. Millergrid. Or perhaps the sophisticated attack a year later in Kiev that although causing a brief power blackout, had the manifestations of more concerns in how that attack was built and delivered. Or the WannaCry ransomware attack in 2017 that caused widespread chaos with healthcare institutions unable 作者: esculent 時(shí)間: 2025-3-23 05:07
Anastasija Nikiforova,Janis Bicevskis,Zane Bicevska,Ivo Oditisat least parallel in several important ways. With respect to similarities, in both kinetic and cyber worlds, SA strongly impacts the outcome of the mission. Also similarly, cognitive biases are found in both KSA and CSA. As an example of differences, KSA often relies on commonly accepted, widely use作者: 虛構(gòu)的東西 時(shí)間: 2025-3-23 08:22 作者: 成份 時(shí)間: 2025-3-23 11:38
e common obstacles. Both revealing and concealing fact and fiction have a critical role insecuring private information. Detailed case studies are included...Cyber Denial, Deception and Counter Deception. is designed as a reference for professionals, researchers and government employees working in cy作者: Comprise 時(shí)間: 2025-3-23 16:42 作者: hermetic 時(shí)間: 2025-3-23 21:04
Information Technology for Management: Towards Business Excellence15th Conference, ISM作者: 撤退 時(shí)間: 2025-3-24 00:43 作者: 感染 時(shí)間: 2025-3-24 06:14 作者: Exclaim 時(shí)間: 2025-3-24 09:16 作者: 小丑 時(shí)間: 2025-3-24 14:22 作者: Comprise 時(shí)間: 2025-3-24 17:03 作者: TRACE 時(shí)間: 2025-3-24 21:40 作者: MILK 時(shí)間: 2025-3-25 00:57
Street Addressing System as an Essential Component in Sustainable Development and Realization of Smand SD. Uniqueness of this research is concluded in analysis of SA as a urban infrastructure component through the prism of Software Quality that enables building quality SC services. This approach can be considered as a contribution to science because it shows a possibility to synthesize the ICT and作者: botany 時(shí)間: 2025-3-25 04:41 作者: nonchalance 時(shí)間: 2025-3-25 08:36
Vincenza Carchiolo,Alessandro Longheu,Michele Malgeri,Giuseppe Mangioni,Natalia Trapanisecuring private information. Detailed case studies are included...Cyber Denial, Deception and Counter Deception. is designed as a reference for professionals, researchers and government employees working in cy978-3-319-37082-8978-3-319-25133-2Series ISSN 1568-2633 Series E-ISSN 2512-2193 作者: athlete’s-foot 時(shí)間: 2025-3-25 14:14
https://doi.org/10.1007/978-3-030-71846-6business information systems; project management; optimization algorithms; computer applications; social作者: 衍生 時(shí)間: 2025-3-25 18:57
Lecture Notes in Business Information Processinghttp://image.papertrans.cn/i/image/465696.jpg作者: cluster 時(shí)間: 2025-3-25 22:49 作者: Meditative 時(shí)間: 2025-3-26 01:10
Information Technology for Management: Towards Business Excellence978-3-030-71846-6Series ISSN 1865-1348 Series E-ISSN 1865-1356 作者: 吊胃口 時(shí)間: 2025-3-26 05:11
1865-1348 ems, FedCSIS 2020, which took place in Sofia, Bulgaria, during?September 6–9, 2020...The FedCSIS Information Systems and Technologies Track included AIST 2020, DSH 2020, ISM 2020, and KAM 2020. For this track, a total of 29 submissions was received from which a total of 5 full and 3 short papers was作者: 柏樹(shù) 時(shí)間: 2025-3-26 09:58
Conference proceedings 2021IS 2020, which took place in Sofia, Bulgaria, during?September 6–9, 2020...The FedCSIS Information Systems and Technologies Track included AIST 2020, DSH 2020, ISM 2020, and KAM 2020. For this track, a total of 29 submissions was received from which a total of 5 full and 3 short papers was accepted 作者: 創(chuàng)新 時(shí)間: 2025-3-26 15:59 作者: 安撫 時(shí)間: 2025-3-26 19:43
1865-1348 accepted for publication in this volume...The papers were organized in topical sections named: improving project management methods; numerical methods of solving management problems; and technological infrastructure for business excellence...?.978-3-030-71845-9978-3-030-71846-6Series ISSN 1865-1348 Series E-ISSN 1865-1356 作者: disciplined 時(shí)間: 2025-3-26 23:11
them, to ensure their appropriate, safe and permissive use. It is not suggested that the development of these technologies and integrations are thwarted or inhibited, but more that there is a holistic review and understanding of the complex integrations between the moral, ethical, technological and作者: 遺忘 時(shí)間: 2025-3-27 01:39
a range of these attack vectors resulting in some devastating outcomes. These have manifested in the shape of ransomware, malware, manipulation methods, phishing and spear-phishing. Bearing the brunt of many of these attacks has fallen in the area of critical national infrastructure (CNI) and for a 作者: 灌溉 時(shí)間: 2025-3-27 08:33
Gloria J. Millera range of these attack vectors resulting in some devastating outcomes. These have manifested in the shape of ransomware, malware, manipulation methods, phishing and spear-phishing. Bearing the brunt of many of these attacks has fallen in the area of critical national infrastructure (CNI) and for a 作者: 脆弱么 時(shí)間: 2025-3-27 11:09
Anastasija Nikiforova,Janis Bicevskis,Zane Bicevska,Ivo Oditiss as control of complex enterprises and in conventional warfare. Far more is known about the SA in conventional military conflicts, or adversarial engagements, than in cyber ones. By exploring what is known about SA in conventional—also commonly referred to as kinetic—battles, we may gain insights a作者: Brain-Waves 時(shí)間: 2025-3-27 17:08 作者: MOCK 時(shí)間: 2025-3-27 21:10 作者: 創(chuàng)新 時(shí)間: 2025-3-28 01:05 作者: 滑動(dòng) 時(shí)間: 2025-3-28 03:36
Alexander Yumaganov,Anton Agafonov,Vladislav Myasnikoverational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed 作者: 手工藝品 時(shí)間: 2025-3-28 07:53 作者: 槍支 時(shí)間: 2025-3-28 10:52
ective legal, technical & procedural interventions & models.This volume provides an overview of cyber economic crime in India, analyzing fifteen years of data and specific case studies from Mumbai to add to the limited research in cyber economic crime detection. Centering around an integrated victim作者: 指派 時(shí)間: 2025-3-28 17:23 作者: 饒舌的人 時(shí)間: 2025-3-28 22:40 作者: 廢止 時(shí)間: 2025-3-29 02:33
ective legal, technical & procedural interventions & models.This volume provides an overview of cyber economic crime in India, analyzing fifteen years of data and specific case studies from Mumbai to add to the limited research in cyber economic crime detection. Centering around an integrated victim作者: nonradioactive 時(shí)間: 2025-3-29 06:18