首页 > 最新文献

European Journal of Information Systems最新文献

英文 中文
Data curation as anticipatory generification in data infrastructure 数据管理是数据基础设施的预期泛化
IF 9.5 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-05 DOI: 10.1080/0960085x.2023.2232333
Elena Parmiggiani, N. K. Amagyei, Steinar Kornelius Selebø Kollerud
{"title":"Data curation as anticipatory generification in data infrastructure","authors":"Elena Parmiggiani, N. K. Amagyei, Steinar Kornelius Selebø Kollerud","doi":"10.1080/0960085x.2023.2232333","DOIUrl":"https://doi.org/10.1080/0960085x.2023.2232333","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":" ","pages":""},"PeriodicalIF":9.5,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47456984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Synergistic Impacts of online and offline social participation on older adults’ subjective well-being: evidence from the Canadian longitudinal study on ageing 线上和线下社会参与对老年人主观幸福感的协同影响:来自加拿大老龄化纵向研究的证据
IF 9.5 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-26 DOI: 10.1080/0960085x.2023.2229283
Xuecong Lu, Jinglu Jiang, Milena M. Head, S. Kahai, Junyi Yang
{"title":"Synergistic Impacts of online and offline social participation on older adults’ subjective well-being: evidence from the Canadian longitudinal study on ageing","authors":"Xuecong Lu, Jinglu Jiang, Milena M. Head, S. Kahai, Junyi Yang","doi":"10.1080/0960085x.2023.2229283","DOIUrl":"https://doi.org/10.1080/0960085x.2023.2229283","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":" ","pages":""},"PeriodicalIF":9.5,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44136842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding variation in subunit adoption of electronic health records: facilitating and constraining configurations of critical dependencies 了解亚单位采用电子健康记录的变化:促进和限制关键依赖项的配置
IF 9.5 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-25 DOI: 10.1080/0960085x.2023.2225786
Marjolein A. G. van Offenbeek, Janita F. J. Vos, A. Boonstra
{"title":"Understanding variation in subunit adoption of electronic health records: facilitating and constraining configurations of critical dependencies","authors":"Marjolein A. G. van Offenbeek, Janita F. J. Vos, A. Boonstra","doi":"10.1080/0960085x.2023.2225786","DOIUrl":"https://doi.org/10.1080/0960085x.2023.2225786","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":" ","pages":""},"PeriodicalIF":9.5,"publicationDate":"2023-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41942542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Affective Information Processing of Fake News: Evidence from NeuroIS 假新闻的情感信息加工:来自NeuroIS的证据
IF 9.5 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-19 DOI: 10.1080/0960085x.2023.2224973
Bernhard Lutz, M. Adam, S. Feuerriegel, Nicolas Pröllochs, Dirk Neumann
{"title":"Affective Information Processing of Fake News: Evidence from NeuroIS","authors":"Bernhard Lutz, M. Adam, S. Feuerriegel, Nicolas Pröllochs, Dirk Neumann","doi":"10.1080/0960085x.2023.2224973","DOIUrl":"https://doi.org/10.1080/0960085x.2023.2224973","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"116 10","pages":""},"PeriodicalIF":9.5,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41308859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation 四大会计师事务所的网络安全漏洞:对审计师声誉的影响
IF 9.5 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-006
B. Litt, Paul N. Tanyi, M. Watson
Public company investors rely on the Big 4 audit firms to provide assurance over internal controls and financial reporting. What, then, would happen if one of these very assurance providers suffered its own cybersecurity breach? We examine such an event in the major data breach of Deloitte in 2017. Using U.S. data from 2014 to 2019, we find Deloitte suffered significant reputational damage postbreach. Specifically, audit clients and existing shareholders became less likely to approve of Deloitte as the company’s auditor. Deloitte also charged lower audit fees after the incident. Furthermore, Deloitte’s audit clients suffered significant negative market reactions postbreach. Our results suggest pervasive implications of cyberattacks on auditor reputation and support recent congressional efforts to expand regulation in this area.
上市公司投资者依赖四大会计师事务所为内部控制和财务报告提供保证。那么,如果这些保障提供商中的某一家遭遇了网络安全漏洞,会发生什么呢?我们在2017年德勤的重大数据泄露事件中考察了这一事件。利用2014年至2019年的美国数据,我们发现德勤在数据泄露后遭受了严重的声誉损害。具体而言,审计客户和现有股东不太可能认可德勤作为该公司的审计机构。事件发生后,德勤也降低了审计费用。此外,德勤的审计客户在违规后遭受了显著的负面市场反应。我们的研究结果表明,网络攻击对审计师声誉的普遍影响,并支持最近国会在这一领域扩大监管的努力。
{"title":"Cybersecurity Breach at a Big 4 Accounting Firm: Effects on Auditor Reputation","authors":"B. Litt, Paul N. Tanyi, M. Watson","doi":"10.2308/isys-2022-006","DOIUrl":"https://doi.org/10.2308/isys-2022-006","url":null,"abstract":"\u0000 Public company investors rely on the Big 4 audit firms to provide assurance over internal controls and financial reporting. What, then, would happen if one of these very assurance providers suffered its own cybersecurity breach? We examine such an event in the major data breach of Deloitte in 2017. Using U.S. data from 2014 to 2019, we find Deloitte suffered significant reputational damage postbreach. Specifically, audit clients and existing shareholders became less likely to approve of Deloitte as the company’s auditor. Deloitte also charged lower audit fees after the incident. Furthermore, Deloitte’s audit clients suffered significant negative market reactions postbreach. Our results suggest pervasive implications of cyberattacks on auditor reputation and support recent congressional efforts to expand regulation in this area.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"29 1","pages":"77-100"},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87155127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Strategy and Cybersecurity Breaches 业务战略和网络安全漏洞
IF 9.5 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-033
Tianpei Li, S. Walton
This study examines whether a firm’s business strategy is an underlying determinant of cybersecurity breach likelihood. Based on organizational theory, firm strategy can focus on innovation or efficiency, with innovative strategy firms being more likely to have weaker, decentralized control systems, multiple technologies, and greater risk than firms with an efficiency-focused strategy. Following the Miles and Snow (1978) strategy topology, we predict and find that the prospector business strategy is associated with greater breach likelihood. We further explore IT awareness within the firm. Ex ante, it is unclear whether strategic IT policy formation is impounded into a firm’s strategy or can be impacted by individual executives and nonstrategy firm characteristics. We find that IT understanding at the executive or firm level can affect the relationship between strategy and breach likelihood. Collectively, our results indicate that business strategy is a useful indicator in evaluating firms’ cybersecurity activities.
本研究考察了公司的商业战略是否是网络安全漏洞可能性的潜在决定因素。根据组织理论,企业战略可以关注创新或效率,与注重效率的企业相比,创新战略企业更有可能拥有较弱、分散的控制系统、多种技术和更大的风险。根据Miles和Snow(1978)的战略拓扑,我们预测并发现勘探者的商业战略与更大的违约可能性相关。我们进一步探索公司内部的信息技术意识。在此之前,还不清楚战略it政策的形成是否包含在公司的战略中,或者是否会受到个别高管和非战略公司特征的影响。我们发现,高管或公司层面的信息技术理解可以影响战略与违约可能性之间的关系。总体而言,我们的研究结果表明,企业战略是评估企业网络安全活动的有用指标。
{"title":"Business Strategy and Cybersecurity Breaches","authors":"Tianpei Li, S. Walton","doi":"10.2308/isys-2022-033","DOIUrl":"https://doi.org/10.2308/isys-2022-033","url":null,"abstract":"\u0000 This study examines whether a firm’s business strategy is an underlying determinant of cybersecurity breach likelihood. Based on organizational theory, firm strategy can focus on innovation or efficiency, with innovative strategy firms being more likely to have weaker, decentralized control systems, multiple technologies, and greater risk than firms with an efficiency-focused strategy. Following the Miles and Snow (1978) strategy topology, we predict and find that the prospector business strategy is associated with greater breach likelihood. We further explore IT awareness within the firm. Ex ante, it is unclear whether strategic IT policy formation is impounded into a firm’s strategy or can be impacted by individual executives and nonstrategy firm characteristics. We find that IT understanding at the executive or firm level can affect the relationship between strategy and breach likelihood. Collectively, our results indicate that business strategy is a useful indicator in evaluating firms’ cybersecurity activities.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"73 1","pages":"51-76"},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83963264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial Policy 编辑政策
IF 9.5 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.2308/0888-7985-37.2.137
{"title":"Editorial Policy","authors":"","doi":"10.2308/0888-7985-37.2.137","DOIUrl":"https://doi.org/10.2308/0888-7985-37.2.137","url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"14 1","pages":"137-141"},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90299924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Cash Is King - An Accounts Receivables App Accommodating Different Use Situations 当现金为王-一个应收账款应用程序适应不同的使用情况
IF 9.5 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-022
Jörg H. Mayer, Linus Lischke, R. Quick, Friedrich Kalden
Today’s economic environment has accelerated an already changing working context for accounting. Collecting accounts receivables (AR) stands out, as it enables companies to turn invoices into cash. The objective of this article is to elaborate on both the most important use situations for an AR collection management and a subsequent app design accommodating these use situations. We take a healthcare product provider as our reference company and come up with nine use situations prioritized by an analytic hierarchy process as follows: (1) drive operational governance, (2) switch to a more proactive collection management, (3) increase order-to-cash process effectiveness, (4) set targets and monitor them, (5) automate AR process actions by an agent, (6) predict process errors in advance, (7) exchange information across departments, (8) set up a predictive liquidity management, and (9) automate workload tracking of AR process activities.
今天的经济环境加速了已经在变化的会计工作环境。收取应收账款(AR)很突出,因为它使公司能够将发票转化为现金。本文的目的是详细说明AR收集管理的最重要的使用情况以及适应这些使用情况的后续应用设计。我们以某医疗保健产品供应商为参考公司,通过层次分析法,得出以下九种使用情况的优先级:(1)推动运营治理,(2)转向更主动的收款管理,(3)提高订单到现金流程的有效性,(4)设定目标并监控它们,(5)代理自动化AR流程操作,(6)提前预测流程错误,(7)跨部门交换信息,(8)建立预测性流动性管理,(9)自动化AR流程活动的工作量跟踪。
{"title":"When Cash Is King - An Accounts Receivables App Accommodating Different Use Situations","authors":"Jörg H. Mayer, Linus Lischke, R. Quick, Friedrich Kalden","doi":"10.2308/isys-2022-022","DOIUrl":"https://doi.org/10.2308/isys-2022-022","url":null,"abstract":"\u0000 Today’s economic environment has accelerated an already changing working context for accounting. Collecting accounts receivables (AR) stands out, as it enables companies to turn invoices into cash. The objective of this article is to elaborate on both the most important use situations for an AR collection management and a subsequent app design accommodating these use situations. We take a healthcare product provider as our reference company and come up with nine use situations prioritized by an analytic hierarchy process as follows: (1) drive operational governance, (2) switch to a more proactive collection management, (3) increase order-to-cash process effectiveness, (4) set targets and monitor them, (5) automate AR process actions by an agent, (6) predict process errors in advance, (7) exchange information across departments, (8) set up a predictive liquidity management, and (9) automate workload tracking of AR process activities.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"14 1","pages":"101-122"},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83476258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Publishing the Data from "The Effects of Communication Mode and Culture on Deception Detection Accuracy" 发表“传播方式和文化对欺骗检测准确性的影响”数据
IF 9.5 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.2308/isys-2022-025
J. George, Manjul Gupta, Gabriel A. Giordano, Annette M. Mills, Vanesa M. Tennant, Carmen C. Lewis
With the publication of this article, we are making available the dataset collected for and analyzed in our 2018 MIS Quarterly article “The Effects of Communication Mode and Culture on Deception Detection Accuracy.” Our article examined the relationships between computer-based modes of communication and national culture on deception detection success. We provide additional information about the dataset and how it was collected, as well as suggestions for future research. This additional information should help any scholar interested in further analysis of the dataset or extending our study.
随着本文的发表,我们正在提供为2018年MIS季刊文章“通信模式和文化对欺骗检测准确性的影响”收集和分析的数据集。我们的文章研究了以计算机为基础的交流模式和国家文化对欺骗检测成功的关系。我们提供了关于数据集及其收集方式的额外信息,以及对未来研究的建议。这些额外的信息应该有助于任何对进一步分析数据集或扩展我们的研究感兴趣的学者。
{"title":"Publishing the Data from \"The Effects of Communication Mode and Culture on Deception Detection Accuracy\"","authors":"J. George, Manjul Gupta, Gabriel A. Giordano, Annette M. Mills, Vanesa M. Tennant, Carmen C. Lewis","doi":"10.2308/isys-2022-025","DOIUrl":"https://doi.org/10.2308/isys-2022-025","url":null,"abstract":"\u0000 With the publication of this article, we are making available the dataset collected for and analyzed in our 2018 MIS Quarterly article “The Effects of Communication Mode and Culture on Deception Detection Accuracy.” Our article examined the relationships between computer-based modes of communication and national culture on deception detection success. We provide additional information about the dataset and how it was collected, as well as suggestions for future research. This additional information should help any scholar interested in further analysis of the dataset or extending our study.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"45 46","pages":"129-136"},"PeriodicalIF":9.5,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72390705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Customer-Reported Cybersecurity Breaches on Key Supplier Innovations and Relationship Disruption 客户报告的网络安全漏洞对关键供应商创新和关系中断的影响
IF 9.5 2区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-30 DOI: 10.2308/isys-2020-006
C. He, Jiangbo Huangfu, M. Kohlbeck, Lin Wang
Cybersecurity breaches (CBs) negatively influence the breached firms’ business functions, including their innovative investments. Recent research documents a spillover effect of CBs into supply chain firm performance. We extend this research and investigate the impact of customers’ CBs on suppliers’ innovative investments and the disruption of supplier-customer relationships. We find a significant negative association between customers’ reported CBs and suppliers’ innovative investments in the subsequent year. In addition, we find customer-reported CBs increase the likelihood of supplier-customer relationship disruption in the subsequent year. Our study contributes to the broader understanding of the negative impacts of CBs not only on the breached firm’s financial performance but also on key supplier innovation decisions. Data Availability: Data are available from the public sources cited in the text. JEL Classifications: L14; L29; M49; O30.
网络安全漏洞(CBs)对被入侵公司的业务功能产生负面影响,包括其创新投资。最近的研究证明了商业成本对供应链企业绩效的溢出效应。我们扩展了这一研究,并调查了客户对供应商创新投资的影响以及供应商-客户关系的中断。我们发现客户报告的成本成本与供应商在随后一年的创新投资之间存在显著的负相关关系。此外,我们发现客户报告的CBs增加了随后一年供应商-客户关系中断的可能性。我们的研究有助于更广泛地理解商业违约对违约公司财务绩效和关键供应商创新决策的负面影响。数据可用性:数据可从文本中引用的公共来源获得。JEL分类:L14;气密性好;M49;O30。
{"title":"The Impact of Customer-Reported Cybersecurity Breaches on Key Supplier Innovations and Relationship Disruption","authors":"C. He, Jiangbo Huangfu, M. Kohlbeck, Lin Wang","doi":"10.2308/isys-2020-006","DOIUrl":"https://doi.org/10.2308/isys-2020-006","url":null,"abstract":"\u0000 Cybersecurity breaches (CBs) negatively influence the breached firms’ business functions, including their innovative investments. Recent research documents a spillover effect of CBs into supply chain firm performance. We extend this research and investigate the impact of customers’ CBs on suppliers’ innovative investments and the disruption of supplier-customer relationships. We find a significant negative association between customers’ reported CBs and suppliers’ innovative investments in the subsequent year. In addition, we find customer-reported CBs increase the likelihood of supplier-customer relationship disruption in the subsequent year. Our study contributes to the broader understanding of the negative impacts of CBs not only on the breached firm’s financial performance but also on key supplier innovation decisions.\u0000 Data Availability: Data are available from the public sources cited in the text.\u0000 JEL Classifications: L14; L29; M49; O30.","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":"24 1","pages":"21-49"},"PeriodicalIF":9.5,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76863423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
European Journal of Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1