首页 > 最新文献

Inf. Polity最新文献

英文 中文
Erratum to papers published in Information Polity - Volume 27, issue 2 《信息政策》第27卷第2期发表的论文的勘误
Pub Date : 2022-07-26 DOI: 10.3233/ip-229012
{"title":"Erratum to papers published in Information Polity - Volume 27, issue 2","authors":"","doi":"10.3233/ip-229012","DOIUrl":"https://doi.org/10.3233/ip-229012","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123926162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Editorial: Are they now finally listening to us? 社论:他们现在终于听我们的了吗?
Pub Date : 2022-07-21 DOI: 10.3233/ip-229011
{"title":"Editorial: Are they now finally listening to us?","authors":"","doi":"10.3233/ip-229011","DOIUrl":"https://doi.org/10.3233/ip-229011","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114788277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Citizens first: A data regulator's perspective on surveillance in three cases1 公民至上:三个案例中数据监管者对监控的看法1
Pub Date : 2022-07-21 DOI: 10.3233/ip-229010
E. Denham
{"title":"Citizens first: A data regulator's perspective on surveillance in three cases1","authors":"E. Denham","doi":"10.3233/ip-229010","DOIUrl":"https://doi.org/10.3233/ip-229010","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124132506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of trust in the adoption of cooperative arrangement types in e-credentials markets 信任在电子证书市场采用合作安排类型中的作用
Pub Date : 2022-06-23 DOI: 10.3233/ip-211508
A. Guenduez, Tobias Mettler, K. Schedler
The interest in digital identities has increased considerably in academia and practice in recent years. This can be seen by the many electronic identity projects worldwide and the numerous published studies that provide insightful narratives and descriptive case findings about success factors and barriers to the adoption of national authentication infrastructures. In this paper, we take a closer look to the role of trust on the design and implementation of a nation-wide e-credential market. We argue that trust in political and economic institutions can be an important factor to explain differences in the chosen cooperative arrangement which can range from monopolistic, purely state-controlled e-credential markets, to polypolistic, decentralized e-credential markets where also private vendors offer state recognized e-ID on their own or in partnership with the government. Following an inductive reasoning process, we develop three testable propositions which may inspire further empirical research and offer practitioners a new angle to rethink e-credential markets in the light of citizen trust in political and economic institutions.
近年来,学术界和实践中对数字身份的兴趣大大增加。这可以从世界各地的许多电子身份项目和众多已发表的研究中看出,这些研究提供了关于采用国家身份验证基础设施的成功因素和障碍的深刻叙述和描述性案例发现。在本文中,我们仔细研究了信任在全国电子证书市场的设计和实施中的作用。我们认为,对政治和经济制度的信任可以是解释所选择的合作安排差异的一个重要因素,这种合作安排可以是垄断的、纯粹由国家控制的电子证书市场,也可以是多元的、分散的电子证书市场,在这种市场中,私人供应商自己或与政府合作提供国家认可的电子身份证。在归纳推理过程中,我们提出了三个可检验的命题,这些命题可能会启发进一步的实证研究,并为从业者提供一个新的角度,根据公民对政治和经济机构的信任来重新思考电子证书市场。
{"title":"The role of trust in the adoption of cooperative arrangement types in e-credentials markets","authors":"A. Guenduez, Tobias Mettler, K. Schedler","doi":"10.3233/ip-211508","DOIUrl":"https://doi.org/10.3233/ip-211508","url":null,"abstract":"The interest in digital identities has increased considerably in academia and practice in recent years. This can be seen by the many electronic identity projects worldwide and the numerous published studies that provide insightful narratives and descriptive case findings about success factors and barriers to the adoption of national authentication infrastructures. In this paper, we take a closer look to the role of trust on the design and implementation of a nation-wide e-credential market. We argue that trust in political and economic institutions can be an important factor to explain differences in the chosen cooperative arrangement which can range from monopolistic, purely state-controlled e-credential markets, to polypolistic, decentralized e-credential markets where also private vendors offer state recognized e-ID on their own or in partnership with the government. Following an inductive reasoning process, we develop three testable propositions which may inspire further empirical research and offer practitioners a new angle to rethink e-credential markets in the light of citizen trust in political and economic institutions.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126988177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Foundations of information literacy, Taylor, Natalie Greene, and Paul T. Jaeger. ALA Neal-Schuman, 2022 《信息素养的基础》,Taylor, Natalie Greene和Paul T. Jaeger著。ALA Neal-Schuman, 2022
Pub Date : 2022-06-16 DOI: 10.3233/ip-229008
Jennifer Campbell-Meier
{"title":"Foundations of information literacy, Taylor, Natalie Greene, and Paul T. Jaeger. ALA Neal-Schuman, 2022","authors":"Jennifer Campbell-Meier","doi":"10.3233/ip-229008","DOIUrl":"https://doi.org/10.3233/ip-229008","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134400705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Issue: Questioning Modern Surveillance Technologies: Ethical and Legal Challenges of Emerging Information and Communication Technologies 特刊导论:质疑现代监控技术:新兴信息和通信技术的伦理和法律挑战
Pub Date : 2022-05-26 DOI: 10.3233/ip-229006
J. Cas, P. Hert, M. Porcedda, C. Raab
Security issues have always been and will always be high on the public policy agenda. Similarly, new technologies, particularly surveillance technologies, are developed and deployed to tackle security problems. Persistent, conventionally perceived security threats such as organised crime, terrorism and public safety, are complemented by new concerns, such as the social and individual effects of technological solutions to manage the threat posed by the COVID-19 pandemic or challenges to democratic processes posed by the use of social media. Information and Communication Technologies (ICTs) often appear to offer simple, technologically based solutions to multidimensional problems relating to the safeguarding of societies, people and nations. This impression is sustained both by the activities of commercial interests, who would like to see the ongoing procurement of security and surveillance technologies, and by the stance of policy-makers, who have to deal seriously with security problems but who also search for symbolic policies and tools as a way of demonstrating proactivity against crime, terrorism and radicalisation. Conversely, technological progress can also be seen as a factor reinforcing existing securitisation trends; emerging security concerns and technical capabilities mutually fortify each other.
安全问题一直是并将永远是公共政策议程上的重要议题。同样,开发和部署新技术,特别是监视技术,以解决安全问题。有组织犯罪、恐怖主义和公共安全等持续存在的传统安全威胁,还伴随着新的关切,例如管理COVID-19大流行威胁的技术解决方案的社会和个人影响,或使用社交媒体对民主进程构成的挑战。信息和通信技术(ict)似乎常常为与保护社会、人民和国家有关的多维问题提供简单的、基于技术的解决方案。这种印象是由商业利益集团的活动和政策制定者的立场维持的,商业利益集团希望看到安全与监控技术的持续采购,政策制定者必须认真处理安全问题,但他们也寻求象征性的政策和工具,作为一种展示积极打击犯罪、恐怖主义和激进化的方式。相反,技术进步也可以被视为加强现有证券化趋势的一个因素;新兴的安全问题和技术能力相互加强。
{"title":"Introduction to the Special Issue: Questioning Modern Surveillance Technologies: Ethical and Legal Challenges of Emerging Information and Communication Technologies","authors":"J. Cas, P. Hert, M. Porcedda, C. Raab","doi":"10.3233/ip-229006","DOIUrl":"https://doi.org/10.3233/ip-229006","url":null,"abstract":"Security issues have always been and will always be high on the public policy agenda. Similarly, new technologies, particularly surveillance technologies, are developed and deployed to tackle security problems. Persistent, conventionally perceived security threats such as organised crime, terrorism and public safety, are complemented by new concerns, such as the social and individual effects of technological solutions to manage the threat posed by the COVID-19 pandemic or challenges to democratic processes posed by the use of social media. Information and Communication Technologies (ICTs) often appear to offer simple, technologically based solutions to multidimensional problems relating to the safeguarding of societies, people and nations. This impression is sustained both by the activities of commercial interests, who would like to see the ongoing procurement of security and surveillance technologies, and by the stance of policy-makers, who have to deal seriously with security problems but who also search for symbolic policies and tools as a way of demonstrating proactivity against crime, terrorism and radicalisation. Conversely, technological progress can also be seen as a factor reinforcing existing securitisation trends; emerging security concerns and technical capabilities mutually fortify each other.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129752265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predatory journals and the use and abuse of special issues 掠夺性期刊和特刊的使用和滥用
Pub Date : 2022-05-26 DOI: 10.3233/ip-229005
{"title":"Predatory journals and the use and abuse of special issues","authors":"","doi":"10.3233/ip-229005","DOIUrl":"https://doi.org/10.3233/ip-229005","url":null,"abstract":"","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual and biometric surveillance in the EU. Saying 'no' to mass surveillance practices? 欧盟的视觉和生物识别监控。对大规模监控行为说“不”?
Pub Date : 2022-05-13 DOI: 10.3233/ip-211525
P. Hert, Georgios Bouchagiar
Earlier this year, the European Commission (EC) registered the ‘Civil society initiative for a ban on biometric mass surveillance practices’, a European Citizens’ Initiative. Citizens are thus given the opportunity to authorize the EC to suggest the adoption of legislative instruments to permanently ban biometric mass surveillance practices. This contribution finds the above initiative particularly promising, as part of a new development of bans in the European Union (EU). It analyses the EU’s approach to facial, visual and biometric surveillance,2 with the objective of submitting some ideas that the European legislator could consider when strictly regulating such practices.
今年早些时候,欧盟委员会(EC)注册了“禁止生物识别大规模监控行为的公民社会倡议”,这是一项欧洲公民倡议。因此,公民有机会授权欧盟委员会建议采取立法手段,永久禁止大规模生物识别监控行为。这一贡献认为上述倡议特别有希望,作为欧洲联盟(欧盟)禁令新发展的一部分。它分析了欧盟在面部、视觉和生物识别监控方面的做法,目的是提交一些想法,供欧洲立法者在严格监管此类做法时考虑。
{"title":"Visual and biometric surveillance in the EU. Saying 'no' to mass surveillance practices?","authors":"P. Hert, Georgios Bouchagiar","doi":"10.3233/ip-211525","DOIUrl":"https://doi.org/10.3233/ip-211525","url":null,"abstract":"Earlier this year, the European Commission (EC) registered the ‘Civil society initiative for a ban on biometric mass surveillance practices’, a European Citizens’ Initiative. Citizens are thus given the opportunity to authorize the EC to suggest the adoption of legislative instruments to permanently ban biometric mass surveillance practices. This contribution finds the above initiative particularly promising, as part of a new development of bans in the European Union (EU). It analyses the EU’s approach to facial, visual and biometric surveillance,2 with the objective of submitting some ideas that the European legislator could consider when strictly regulating such practices.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124450578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policing the smart home: The internet of things as 'invisible witnesses' 监管智能家居:物联网是“看不见的证人”
Pub Date : 2022-05-13 DOI: 10.3233/ip-211541
Lachlan D. Urquhart, Diana Miranda, Lena Podoletz
In this paper, we develop the concept of smart home devices as ‘invisible witnesses’ in everyday life. We explore contemporary examples that highlight how smart devices have been used by the police and unpack the socio-technical implications of using these devices in criminal investigations. We draw on several sociological, computing and forensics concepts to develop our argument. We consider the challenges of obtaining and interpreting trace evidence from smart devices; unpack the ways in which these devices are designed to be ‘invisible in use’; and consider the processes by which they become domesticated into everyday life. We also analyse the differentiated levels of control occupants have over home devices, and the surveillance impacts of making everyday life visible to third parties, particularly the police.
在本文中,我们提出了智能家居设备作为日常生活中“看不见的证人”的概念。我们探索当代的例子,突出智能设备是如何被警察使用的,并解开在刑事调查中使用这些设备的社会技术影响。我们利用几个社会学、计算机和法医学的概念来发展我们的论点。我们考虑了从智能设备获取和解释痕量证据的挑战;解开这些设备被设计成“在使用中隐形”的方式;并考虑它们被日常生活所驯化的过程。我们还分析了居住者对家庭设备的不同控制水平,以及使第三方(特别是警察)可以看到日常生活的监视影响。
{"title":"Policing the smart home: The internet of things as 'invisible witnesses'","authors":"Lachlan D. Urquhart, Diana Miranda, Lena Podoletz","doi":"10.3233/ip-211541","DOIUrl":"https://doi.org/10.3233/ip-211541","url":null,"abstract":"In this paper, we develop the concept of smart home devices as ‘invisible witnesses’ in everyday life. We explore contemporary examples that highlight how smart devices have been used by the police and unpack the socio-technical implications of using these devices in criminal investigations. We draw on several sociological, computing and forensics concepts to develop our argument. We consider the challenges of obtaining and interpreting trace evidence from smart devices; unpack the ways in which these devices are designed to be ‘invisible in use’; and consider the processes by which they become domesticated into everyday life. We also analyse the differentiated levels of control occupants have over home devices, and the surveillance impacts of making everyday life visible to third parties, particularly the police.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127093773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The European PNR Directive as an instance of pre-emptive, risk-based algorithmic security and its implications for the regulatory framework 欧洲PNR指令作为先发制人、基于风险的算法安全的实例及其对监管框架的影响
Pub Date : 2022-04-28 DOI: 10.3233/ip-211531
Elisa Orrù
The Passenger Name Record (PNR) Directive has introduced a pre-emptive, risk-based approach in the landscape of European databases and information exchange for security purposes. The article contributes to ongoing debates on algorithmic security and data-driven decision-making by fleshing out the specific way in which the EU PNR-based approach to security substantiates core characteristics of algorithmic regulation. The EU PNR framework appropriates data produced in the commercial sector for generating security-related behavioural predictions and does so in a way that gives rise to a paradoxical normativity directly dependent on empirical states. Its ‘securitisation move’ is moreover characterised by an inherent tendence to expand. As a result, the PNR Directive poses challenges for existing check and balance mechanisms and for human autonomy. These challenges could be partially addressed by strengthening ex-post control procedures and independent auditing. Yet in the decision to adopt a risk-based security model, something more fundamental seems to be at stake, namely, the preservation of the idea of human beings as moral agents able to direct and modify their behaviour in accordance with an intelligible, reliable and predictable normative order.
旅客姓名记录(PNR)指令在欧洲数据库和信息交换领域引入了一种先发制人的、基于风险的方法,以实现安全目的。本文通过充实欧盟基于pnr的安全方法证实算法监管核心特征的具体方式,为正在进行的关于算法安全和数据驱动决策的辩论做出了贡献。欧盟PNR框架将商业部门产生的数据用于生成与安全相关的行为预测,并以一种直接依赖于经验状态的矛盾规范性的方式这样做。此外,其“证券化举措”的特点是一种固有的扩张趋势。因此,PNR指令对现有的制衡机制和人类自主权提出了挑战。这些挑战可以通过加强事后管制程序和独立审计来部分解决。然而,在决定采用一种基于风险的安全模式时,一些更根本的东西似乎受到了威胁,即,人类作为道德主体的观念,能够按照一种可理解、可靠和可预测的规范秩序来指导和修改自己的行为。
{"title":"The European PNR Directive as an instance of pre-emptive, risk-based algorithmic security and its implications for the regulatory framework","authors":"Elisa Orrù","doi":"10.3233/ip-211531","DOIUrl":"https://doi.org/10.3233/ip-211531","url":null,"abstract":"The Passenger Name Record (PNR) Directive has introduced a pre-emptive, risk-based approach in the landscape of European databases and information exchange for security purposes. The article contributes to ongoing debates on algorithmic security and data-driven decision-making by fleshing out the specific way in which the EU PNR-based approach to security substantiates core characteristics of algorithmic regulation. The EU PNR framework appropriates data produced in the commercial sector for generating security-related behavioural predictions and does so in a way that gives rise to a paradoxical normativity directly dependent on empirical states. Its ‘securitisation move’ is moreover characterised by an inherent tendence to expand. As a result, the PNR Directive poses challenges for existing check and balance mechanisms and for human autonomy. These challenges could be partially addressed by strengthening ex-post control procedures and independent auditing. Yet in the decision to adopt a risk-based security model, something more fundamental seems to be at stake, namely, the preservation of the idea of human beings as moral agents able to direct and modify their behaviour in accordance with an intelligible, reliable and predictable normative order.","PeriodicalId":418875,"journal":{"name":"Inf. Polity","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122511789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Inf. Polity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1