首页 > 最新文献

Privacy by Design for the Internet of Things: Building accountability and security最新文献

英文 中文
Data protection by design and default: IoT app development 设计和默认的数据保护:物联网应用程序开发
Andy Crabtree, T. Lodge
{"title":"Data protection by design and default: IoT app development","authors":"Andy Crabtree, T. Lodge","doi":"10.1049/pbse014e_ch7","DOIUrl":"https://doi.org/10.1049/pbse014e_ch7","url":null,"abstract":"","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123289912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The socially negotiated management of personal data in everyday life 日常生活中个人数据的社会协商管理
D. Kilic, Lewis. Cameron, Glenn McGarry, M. Goulden, Andy Crabtree
{"title":"The socially negotiated management of personal data in everyday life","authors":"D. Kilic, Lewis. Cameron, Glenn McGarry, M. Goulden, Andy Crabtree","doi":"10.1049/pbse014e_ch4","DOIUrl":"https://doi.org/10.1049/pbse014e_ch4","url":null,"abstract":"","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129778953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accountability in ordinary action 日常行动中的问责
P. Tolmie, Andy Crabtree
ly, various concepts of privacy posit axioms that essentially revolve around the disclosure of personal information or ‘data’. Often cited definitions thus inform us that privacy is the ability to control the disclosure of personal information [27], to create and manage interpersonal boundaries [28] and to employ contextual norms to regulate the ad hoc flow of personal information between people [29]. Concretely, the studies make it visible that privacy ordinarily and accountably revolves around managing a polymorphous array of mundane activities in which the digital is embedded in the ongoing conduct of manifold human relationships. Within this lively context, the disclosure or sharing of personal data is accountably organised in terms of managing members’ access to devices, applications and content through situated practices, procedures or methods that exploit the local ecology, device visibility and recipient design. The studies make it perspicuous that members’ concern with privacy is a concern to manage their accountability in the digital world and that manifest in data sharing practices is an evolving calculus of accountability employed to manage the potential attack surface the digital creates in everyday life. That the digital poses a threat to privacy and therefore undermines societal trust in the digital is broadly acknowledged. Much less wellknown and understood is how and why this happens and what kinds of steps beyond demonstrable compliance with the law might need to be taken to remedy the situation. 4 Privacy by design for the internet of things 3.2 The naturally accountable organisation of digital privacy in the home Managing digital privacy is intimately bound up with the observability and reportability of one’s digital activities and how other people might be able to see them in the first place. Developers and security analysts alike recommend passwords as the first line of defense to protect oneself from prying eyes. Yet there is a more fundamental naturally accountable organisation to privacy in the real world, as one of our participants, Paul (not his real name), tells us: Paul: I’m not particularly fussed about setting up passwords and things. I mean there’s no threat of network hijacking here. We live in the middle of the countryside, miles away from another house, it’s just not an issue. So as Paul makes accountable, one of the simplest and most ubiquitous ways to constrain access and protect privacy is by controlling access to the environments in which our digital activities occur, i.e., controlling access to the places in which digital devices are kept. Paul’s was not the only example of password suspension for devices considered inaccessible that we encountered in our studies. It was commonplace for devices that always stayed in the home, such as desktop PCs, tablets and media servers. The reasoning generally bound up with this is that the people who have rights of access to the network and the devices on it are the peo
实际上,各种隐私概念都假定公理,本质上是围绕个人信息或“数据”的披露。因此,经常被引用的定义告诉我们,隐私是控制个人信息披露的能力[27],创建和管理人际界限的能力[28],以及使用情境规范来规范人与人之间的个人信息流动的能力[29]。具体地说,这些研究表明,隐私通常和负责地围绕着管理各种各样的世俗活动,其中数字嵌入到多种人类关系的持续行为中。在这种生动的背景下,个人数据的披露或共享是通过利用当地生态、设备可见性和收件人设计的定位实践、程序或方法,在管理成员对设备、应用程序和内容的访问方面进行负责任的组织。这些研究清楚地表明,成员对隐私的关注是对他们在数字世界中管理责任的关注,而在数据共享实践中表现出来的是一种不断发展的责任演算,用于管理数字在日常生活中创造的潜在攻击面。数字技术对隐私构成威胁,从而破坏了社会对数字技术的信任,这一点已得到广泛承认。人们不太了解和理解的是,这种情况是如何发生的,为什么会发生,以及除了明显遵守法律之外,可能需要采取哪些措施来纠正这种情况。管理数字隐私与一个人的数字活动的可观察性和可报告性以及其他人如何能够首先看到它们密切相关。开发人员和安全分析师都建议将密码作为保护自己免受窥探的第一道防线。然而,在现实世界中,有一种更基本的自然负责的隐私组织,正如我们的一位参与者保罗(化名)告诉我们的那样:保罗:我对设置密码和其他东西并不特别在意。我的意思是这里没有网络劫持的威胁。我们住在乡村中心,离另一所房子几英里远,这不是问题。因此,正如保罗所说,限制访问和保护隐私的最简单、最普遍的方法之一是控制对我们进行数字活动的环境的访问,也就是说,控制对保存数字设备的地方的访问。Paul的并不是我们在研究中遇到的唯一一个被认为无法访问的设备密码暂停的例子。对于台式机、平板电脑和媒体服务器等一直呆在家里的设备来说,这是司空见惯的事情。与此相关的一般推理是有权访问网络和网络上的设备的人是有权访问这些设备所在环境的人。这一点得到了63岁的反射治疗师克里斯汀(Christine)的强调,她在家里经营自己的诊所。克里斯汀:我非常希望确保整个房子都不会对他们的视线敞开。我总是关上门,把一切都关起来。我确保所有我认为敏感的东西都很清楚。尤其是当我在那个小房间的时候,我不希望我的笔记本电脑在我即将开始治疗的时候打开。现场工作者:所以你更愿意对客户关闭进入数字世界的窗口?克里斯汀:关闭。绝对的。绝对的。很明显,我必须确保我没有把以前客户的信息放在那里让客户看到。实地工作者:所以这是职业和个人原因交织在一起的吗?克里斯汀:当然,因为你知道,如果人们认为我违反了数据保护,我可能会被起诉。所以我必须意识到这一点。我身边没有任何东西能让我了解任何事情。我也不会把钱包和手机放在房间里。现场工作者:好的,关于网络,如果你有客户端备份,一个客户端在等待另一个客户端,你会给他们访问网络的权限吗?克莉丝汀:不。绝对不是。不,不。我甚至不会让他们看电视,除非布莱恩(她的丈夫)在房间里看!这个小插图详细阐述了一个相当全面的隐私实践,旨在最大限度地降低偶然分享任何类型的个人信息的风险,无论是模拟的还是数字的,与来访者的关系仅限于业务。尽管该账户被指向违反数据保护,但克里斯汀也关闭了大门,并普遍限制了客户的行动。 她隐瞒的不仅是与其他客户有关的数据,还有她自己的个人生活。然而,这特别清楚地表明,诸如门(以及窗帘和树篱等)之类的物理屏障是控制个人信息访问的主要门户。隐私也通过设备可见性来管理,这不仅通过物理屏障来控制,还通过成员靠近屏幕来控制。对于想要共享非常具体的内容的参与者来说,这种情况是显而易见的,并且这些内容是被描述为私有的活动和存储库的一个特征。21岁的学生Evelyn正在谈论她如何偶尔在Tumblr上与周围的人分享内容:Evelyn:我不喜欢任何人看到Tumblr上发生的事情。偶尔我会给苏珊(她妹妹)看一张猫的照片或动图。但我没有。田野工作者:你给她看了?伊芙琳:是啊。田野工作者:而不是你让她看着你发帖?伊芙琳:是啊。手机屏幕更小,所以监管更少。反正我总是把它放在身边。所以当我坐在楼下的椅子上有人走来走去的时候,或者当我们要看什么东西的时候,我可以浏览Tumblr。伊芙琳可以并且确实通过依赖屏幕的大小来保持她正在做的私事。然而,她放置屏幕的方式与自己和他人的关系并不是偶然的。事实上,只要屏幕的位置不显示内容,那么就存在一个共同的方向,即该内容不是供一般消费的。这当然是常见的做法,在各种情况下都可以找到。例如,Dourish等人[30]发现,电脑屏幕通常被放置在办公室访客看不到的位置,Klasnja等人[31]发现,人们在公共场所使用设备时,会通过“找一个靠墙的座位”或“倾斜或调暗屏幕”来保护自己的隐私。会员有一种相互理解的权利,让他们日常交易的东西不被看到,这样,乍一看可能被视为谨慎的行为并不是那种行为,而是一种日常方法,表明特定类型的个人数据的状态是“不共享”。因此,作为一种方法,隐私可以通过控制一个人如何让环境中的其他人看到自己的设备来管理。物联网的隐私设计有多种排列方式,可以实现这一点。这可能是因为接收人在一个相邻的位置,这只是一个问题,找到要分享的东西,然后调整设备,以便他们可以看到它。也可能设备不是移动设备,在这种情况下,共享可能需要将接收方呼叫到设备。定位数据也可能是在共享数据之前完成的工作,也可能是在接收方实际在场时完成的工作。但是,无论发生什么,隐私和数据泄露通常都是通过设备和内容在交互中的社会定位来管理的。这并不是说密码不被使用。只是要认识到我们都认为理所当然的事情:隐私主要是通过有条不紊地使用物理屏障来管理的,以控制成员进入设备所在的地方;通过控制对设备本身的访问,通过它们的社会定位,并通过允许他们以各种方式看到屏幕,有选择地向其他人提供内容。也就是说,我们的参与者确实有使用密码的“机会”,正如Mike和Alice详细阐述的那样:Mike:楼上的电脑偶尔会有密码。通常不会。在后面的房间里。上次我给房间装上暗号是我们请了一个装修师来装修房间的时候。有客人住的时候我就这么做过一两次。爱丽丝:是的,当我侄子来的时候,因为他会登录所有的东西。实地工作者:这取决于客人?迈克:是的。实地工作者:因为你认为这是一个潜在的风险?迈克:是的。现场工作者:潜在的风险是什么?迈克:基本上,嗯,上面有成人内容。所以我想这是潜在的尴尬。迈克:对那个装饰师来说,更多的是一般原则。上面有个人信息。银行信息之类的,我们不想要。迈克:对,不过如果是家人住在那里,那就更像是他们用电脑做事情,然后偶然发现了一个文件夹,我希望他们不要偶然发现。很容易将Mike在这里所说的解释为他和Alice使用密码来确保数据隐私。当然,他们确实希望保护自己的“银行详细信息和资料”,但事情远不止于此。就它们使用密码来确保数据隐私而言,它们是在选择性的基础上这样做的,而不是作为一种全面的策略。
{"title":"Accountability in ordinary action","authors":"P. Tolmie, Andy Crabtree","doi":"10.1049/pbse014e_ch3","DOIUrl":"https://doi.org/10.1049/pbse014e_ch3","url":null,"abstract":"ly, various concepts of privacy posit axioms that essentially revolve around the disclosure of personal information or ‘data’. Often cited definitions thus inform us that privacy is the ability to control the disclosure of personal information [27], to create and manage interpersonal boundaries [28] and to employ contextual norms to regulate the ad hoc flow of personal information between people [29]. Concretely, the studies make it visible that privacy ordinarily and accountably revolves around managing a polymorphous array of mundane activities in which the digital is embedded in the ongoing conduct of manifold human relationships. Within this lively context, the disclosure or sharing of personal data is accountably organised in terms of managing members’ access to devices, applications and content through situated practices, procedures or methods that exploit the local ecology, device visibility and recipient design. The studies make it perspicuous that members’ concern with privacy is a concern to manage their accountability in the digital world and that manifest in data sharing practices is an evolving calculus of accountability employed to manage the potential attack surface the digital creates in everyday life. That the digital poses a threat to privacy and therefore undermines societal trust in the digital is broadly acknowledged. Much less wellknown and understood is how and why this happens and what kinds of steps beyond demonstrable compliance with the law might need to be taken to remedy the situation. 4 Privacy by design for the internet of things 3.2 The naturally accountable organisation of digital privacy in the home Managing digital privacy is intimately bound up with the observability and reportability of one’s digital activities and how other people might be able to see them in the first place. Developers and security analysts alike recommend passwords as the first line of defense to protect oneself from prying eyes. Yet there is a more fundamental naturally accountable organisation to privacy in the real world, as one of our participants, Paul (not his real name), tells us: Paul: I’m not particularly fussed about setting up passwords and things. I mean there’s no threat of network hijacking here. We live in the middle of the countryside, miles away from another house, it’s just not an issue. So as Paul makes accountable, one of the simplest and most ubiquitous ways to constrain access and protect privacy is by controlling access to the environments in which our digital activities occur, i.e., controlling access to the places in which digital devices are kept. Paul’s was not the only example of password suspension for devices considered inaccessible that we encountered in our studies. It was commonplace for devices that always stayed in the home, such as desktop PCs, tablets and media servers. The reasoning generally bound up with this is that the people who have rights of access to the network and the devices on it are the peo","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"561-565 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Building accountability into the Internet of Things 将问责制融入物联网
Andrew Crabtree, T. Lodge, Derek McAuley, Lachlan D. Urquhart, Hamed Haddadi, R. Mortier
{"title":"Building accountability into the Internet of Things","authors":"Andrew Crabtree, T. Lodge, Derek McAuley, Lachlan D. Urquhart, Hamed Haddadi, R. Mortier","doi":"10.1049/pbse014e_ch6","DOIUrl":"https://doi.org/10.1049/pbse014e_ch6","url":null,"abstract":"","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116566672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anticipating the adoption of IoT in everyday life 期待物联网在日常生活中的应用
P. Coulton, Adrian Ioan Gradinar, Joseph Lindley
. Realising the potential economic and societal benefits of emerging and future technologies such as the Internet of Things (IoT) is dependent on a critical mass of potential users adopting them, this is often driven by whether users consider them to be acceptable. However, the processes that drive adoption and acceptability are rarely taken into consideration when researching emerging and future technologies. More often than not, either adoption is regarded as something that will naturally occur once technology is made available to the market, or the process of adoption is considered to be someone else’s future work. The result is that the discovery of challenges and barriers to adoption and acceptability occur only after potentially problematic design patterns have become established and concretised at the core of devices and services. This, in turn, can result in even the most mundane designs having unintended consequences or compromised impact. In this chapter we focus on IoT connected products which are often referred to as ‘smart’ in our IoT-enabled ‘smart homes’. The espoused promise of the smart home is that it will make our lives easier by giving us more free time, improving our energy consumption, and saving money. However, one factor which is frequently absent from these discussions is the tsunami of data which is generated and collected as we add millions of IoT products and services to our home networks. While the nuance of the emergent Human-Data relationships may not be of immediate concern to the majority of their users, when this significant activity is unexpectedly brought to the fore it can challenge our expectations and perceptions of personal privacy in our homes. Such disruptions to notions of privacy then unbalance our perception of IoT devices’ acceptability, causing users to either resist the adoption of new devices or potentially reject devices which had previously been adopted. IoT futures before
. 实现物联网(IoT)等新兴和未来技术的潜在经济和社会效益取决于是否有大量潜在用户采用这些技术,而这通常取决于用户是否认为这些技术是可接受的。然而,在研究新兴和未来的技术时,很少考虑到驱动采用和可接受性的过程。通常情况下,要么采用被认为是一旦技术进入市场就会自然发生的事情,要么采用的过程被认为是其他人未来的工作。其结果是,只有在潜在问题的设计模式在设备和服务的核心得到建立和具体化之后,才会发现采用和可接受性方面的挑战和障碍。这反过来又会导致最平凡的设计产生意想不到的结果或影响。在本章中,我们将重点关注物联网连接的产品,这些产品在我们支持物联网的“智能家居”中通常被称为“智能”。人们对智能家居的承诺是,它将给我们更多的空闲时间,改善我们的能源消耗,节省金钱,使我们的生活更轻松。然而,这些讨论中经常缺少的一个因素是,当我们向家庭网络添加数百万个物联网产品和服务时,产生和收集的数据海啸。虽然新兴的人-数据关系的细微差别可能不会立即引起大多数用户的关注,但当这种重要的活动出乎意料地被带到前台时,它可能会挑战我们对家庭中个人隐私的期望和看法。这种对隐私概念的破坏破坏了我们对物联网设备可接受性的看法,导致用户要么抵制采用新设备,要么可能拒绝以前采用的设备。未来的物联网
{"title":"Anticipating the adoption of IoT in everyday life","authors":"P. Coulton, Adrian Ioan Gradinar, Joseph Lindley","doi":"10.1049/pbse014e_ch10","DOIUrl":"https://doi.org/10.1049/pbse014e_ch10","url":null,"abstract":". Realising the potential economic and societal benefits of emerging and future technologies such as the Internet of Things (IoT) is dependent on a critical mass of potential users adopting them, this is often driven by whether users consider them to be acceptable. However, the processes that drive adoption and acceptability are rarely taken into consideration when researching emerging and future technologies. More often than not, either adoption is regarded as something that will naturally occur once technology is made available to the market, or the process of adoption is considered to be someone else’s future work. The result is that the discovery of challenges and barriers to adoption and acceptability occur only after potentially problematic design patterns have become established and concretised at the core of devices and services. This, in turn, can result in even the most mundane designs having unintended consequences or compromised impact. In this chapter we focus on IoT connected products which are often referred to as ‘smart’ in our IoT-enabled ‘smart homes’. The espoused promise of the smart home is that it will make our lives easier by giving us more free time, improving our energy consumption, and saving money. However, one factor which is frequently absent from these discussions is the tsunami of data which is generated and collected as we add millions of IoT products and services to our home networks. While the nuance of the emergent Human-Data relationships may not be of immediate concern to the majority of their users, when this significant activity is unexpectedly brought to the fore it can challenge our expectations and perceptions of personal privacy in our homes. Such disruptions to notions of privacy then unbalance our perception of IoT devices’ acceptability, causing users to either resist the adoption of new devices or potentially reject devices which had previously been adopted. IoT futures before","PeriodicalId":179291,"journal":{"name":"Privacy by Design for the Internet of Things: Building accountability and security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128746717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Privacy by Design for the Internet of Things: Building accountability and security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1