首页 > 最新文献

International Journal of Information Technology and Management最新文献

英文 中文
Do I Desire Chatbots to be like Humans? Exploring Factors for Adoption of Chatbots for Financial Services 我希望聊天机器人像人类一样吗?探讨金融服务中采用聊天机器人的因素
Q4 Computer Science Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1501
Moses Sugumar, Shalini Chandra
AI-powered chatbots are gaining traction across various industries, especially in the financial sector. Despite these implementations, chatbot adoption and usage among consumers is still low. Grounding on the unified theory of acceptance and use of technology 2 (UTAUT2) model and the Belief Desire Intentions (BDI) model, this study explores factors influencing the adoption of chatbots for financial sectors by emphasizing on the role of user desires in addition to human beliefs. Explicitly, the research hypothesizes the role of the humanness in chatbots influencing consumer adoption in the financial services sector. The suggested research model was tested via a sample of possible adopters from India, the USA, and Singapore. Results highlight the key role of consumer desires to make artificial machines indistinguishable from human beings. Implications for research and practice are also presented.
人工智能聊天机器人在各个行业,尤其是金融领域都越来越受欢迎。尽管有这些实现,聊天机器人在消费者中的采用率和使用率仍然很低。本研究以技术接受与使用统一理论2 (UTAUT2)模型和信念欲望意图(BDI)模型为基础,通过强调用户欲望在人类信念之外的作用,探讨了金融部门采用聊天机器人的影响因素。明确地,该研究假设了聊天机器人在金融服务领域影响消费者采用的人性作用。建议的研究模型通过来自印度、美国和新加坡的可能采用者的样本进行了测试。研究结果强调了消费者希望让人工机器与人类无法区分的关键作用。对研究和实践的启示也被提出。
{"title":"Do I Desire Chatbots to be like Humans? Exploring Factors for Adoption of Chatbots for Financial Services","authors":"Moses Sugumar, Shalini Chandra","doi":"10.58729/1941-6679.1501","DOIUrl":"https://doi.org/10.58729/1941-6679.1501","url":null,"abstract":"AI-powered chatbots are gaining traction across various industries, especially in the financial sector. Despite these implementations, chatbot adoption and usage among consumers is still low. Grounding on the unified theory of acceptance and use of technology 2 (UTAUT2) model and the Belief Desire Intentions (BDI) model, this study explores factors influencing the adoption of chatbots for financial sectors by emphasizing on the role of user desires in addition to human beliefs. Explicitly, the research hypothesizes the role of the humanness in chatbots influencing consumer adoption in the financial services sector. The suggested research model was tested via a sample of possible adopters from India, the USA, and Singapore. Results highlight the key role of consumer desires to make artificial machines indistinguishable from human beings. Implications for research and practice are also presented.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79917289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Illusion of SNS influence: are popular SNS influential SNS影响力错觉:是受欢迎的SNS影响力
Q4 Computer Science Pub Date : 2021-01-01 DOI: 10.1504/ijitm.2021.10043578
DongBack Seo, Martin P. Bügel
{"title":"Illusion of SNS influence: are popular SNS influential","authors":"DongBack Seo, Martin P. Bügel","doi":"10.1504/ijitm.2021.10043578","DOIUrl":"https://doi.org/10.1504/ijitm.2021.10043578","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67210048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Global Information Technology Outsourcing: Issues of Attractiveness of Some Regions in Eastern Europe 全球信息技术外包:东欧部分地区的吸引力问题
Q4 Computer Science Pub Date : 2021-01-01 DOI: 10.1504/ijitm.2021.10049674
Anna Hayduk, G. Feigin
{"title":"Global Information Technology Outsourcing: Issues of Attractiveness of Some Regions in Eastern Europe","authors":"Anna Hayduk, G. Feigin","doi":"10.1504/ijitm.2021.10049674","DOIUrl":"https://doi.org/10.1504/ijitm.2021.10049674","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67210145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities API(应用程序编程接口)安全的未来:数字通信API的采用及其对网络安全漏洞的影响
Q4 Computer Science Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1454
Alison Munsch, Peter Munsch
Businesses and consumers need to have a robust Application Programming Interface (API) management and security program in place to ensure they are using the most updated policies to certify that these transactions are adequately secure. Technology vendors do provide API Management tools for Customers, and there are established API security standards for securing API transactions. Given the effort to keep APIs open and easy to implement for Business to Business (B2B) and Business to Consumer (B2C) communications, security standards must be part of API management. This research gathered data to investigate why APIs are vulnerable. The research explored the different perspectives among Customers with regards to their own professional experiences with developing private APIs for their organizations and compared it to the Cyber Security Vendor/Supplier segment that offer products and services to assist their Customers with API development, security, and management. The research found that API exploits are usually not detected while they are occurring and perspectives about security readiness are different by IT role. Some basic blocking and tackling fundamentals that can help any organization improve API security management are identified by this research
企业和消费者需要有一个健壮的应用程序编程接口(API)管理和安全程序,以确保他们使用最新的策略来证明这些事务是足够安全的。技术供应商确实为客户提供API管理工具,并且已经建立了用于保护API事务的API安全标准。考虑到为企业对企业(B2B)和企业对消费者(B2C)通信保持API开放和易于实现的努力,安全标准必须成为API管理的一部分。这项研究收集了数据来调查api易受攻击的原因。该研究探讨了客户在为其组织开发私有API方面的不同专业经验,并将其与提供产品和服务以帮助其客户进行API开发,安全和管理的网络安全供应商/供应商部分进行了比较。研究发现,API漏洞在发生时通常不会被检测到,并且IT角色对安全准备情况的看法也不同。本研究确定了一些可以帮助任何组织改进API安全管理的基本阻塞和处理基础
{"title":"The Future of API (Application Programming Interface) Security: The Adoption of APIs for Digital Communications and the Implications for Cyber Security Vulnerabilities","authors":"Alison Munsch, Peter Munsch","doi":"10.58729/1941-6679.1454","DOIUrl":"https://doi.org/10.58729/1941-6679.1454","url":null,"abstract":"Businesses and consumers need to have a robust Application Programming Interface (API) management and security program in place to ensure they are using the most updated policies to certify that these transactions are adequately secure. Technology vendors do provide API Management tools for Customers, and there are established API security standards for securing API transactions. Given the effort to keep APIs open and easy to implement for Business to Business (B2B) and Business to Consumer (B2C) communications, security standards must be part of API management. This research gathered data to investigate why APIs are vulnerable. The research explored the different perspectives among Customers with regards to their own professional experiences with developing private APIs for their organizations and compared it to the Cyber Security Vendor/Supplier segment that offer products and services to assist their Customers with API development, security, and management. The research found that API exploits are usually not detected while they are occurring and perspectives about security readiness are different by IT role. Some basic blocking and tackling fundamentals that can help any organization improve API security management are identified by this research","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"256 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73108595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overcoming the Downsides of Personal Internet and Cell Phone Use in the Workplace: An Exploratory Empirical Analysis 克服个人互联网和手机在工作场所使用的缺点:一项探索性实证分析
Q4 Computer Science Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1481
Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, G. Berry
{"title":"Overcoming the Downsides of Personal Internet and Cell Phone Use in the Workplace: An Exploratory Empirical Analysis","authors":"Kaustav Misra, Michael D. Stackhouse, Arundhati Bagchi Misra, G. Berry","doi":"10.58729/1941-6679.1481","DOIUrl":"https://doi.org/10.58729/1941-6679.1481","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"412 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75004174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Determining Critical Success Factors for realizing innovative IT solutions in Higher Education 确定在高等教育实现创新资讯科技解决方案的关键成功因素
Q4 Computer Science Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1496
A. Meijer
{"title":"Determining Critical Success Factors for realizing innovative IT solutions in Higher Education","authors":"A. Meijer","doi":"10.58729/1941-6679.1496","DOIUrl":"https://doi.org/10.58729/1941-6679.1496","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77480840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Table of Contents JITIM vol 29 issue 4 目录JITIM第29卷第4期
Q4 Computer Science Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1497
{"title":"Table of Contents JITIM vol 29 issue 4","authors":"","doi":"10.58729/1941-6679.1497","DOIUrl":"https://doi.org/10.58729/1941-6679.1497","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80145608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating Voice over IP Solution in IPv6 and IPv4 Networks to Increase Employee Productivity: A Case Study of Cameroon Telecommunications (Camtel), North-West 在IPv6和IPv4网络中集成IP语音解决方案以提高员工生产力:喀麦隆电信(Camtel)西北部的案例研究
Q4 Computer Science Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1469
Lottin Cyrille Marcel Malobe, A. Amaechi
{"title":"Integrating Voice over IP Solution in IPv6 and IPv4 Networks to Increase Employee Productivity: A Case Study of Cameroon Telecommunications (Camtel), North-West","authors":"Lottin Cyrille Marcel Malobe, A. Amaechi","doi":"10.58729/1941-6679.1469","DOIUrl":"https://doi.org/10.58729/1941-6679.1469","url":null,"abstract":"","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80277418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Social Media Implementation in Hospitals in the U.S. Midwest Region 分析美国中西部地区医院的社交媒体实施情况
Q4 Computer Science Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1544
Dalsang Chung, C. C. Lee, David Hwang
The purpose of this research is to explore to what scale hospitals are adopting social media and implementing it in accordance with hospital characteristics. We reviewed hospitals’ social media activities on social networking sites such Facebook, Twitter, Instagram, and YouTube. We studied the 912 hospitals in the Midwest region reported in the 2015 American Hospital Association Annual Survey dataset. We reviewed each hospital’s social-networking page to understand the scale of social media adoption relative to the hospital’s characteristics such as bed count, state, ownership type (control), and specialty (service). We also considered whether the hospital is in a network and whether it is physician-owned. We determined the hospital’s degree of social media usage through data on user activity from each social-networking platform. This data includes likes on Facebook, followers on Twitter and Instagram, and subscribers on YouTube. More than 80% of the hospitals in this study have a presence on at least one social-networking website; however, utilization depends on many factors of the hospital’s characteristics. We have observed that hospitals in Ohio, government-owned hospitals, and children’s specialty hospitals with a higher number of full-time registered nurses have a higher degree of social media utilization.
本研究的目的是探讨医院采用社会化媒体的规模,并根据医院特点实施社会化媒体。我们回顾了医院在Facebook、Twitter、Instagram和YouTube等社交网站上的社交媒体活动。我们研究了2015年美国医院协会年度调查数据集中报告的中西部地区912家医院。我们查看了每家医院的社交网络页面,以了解与医院特征(如床位数、状态、所有权类型(控制)和专业(服务))相关的社交媒体采用规模。我们还考虑了医院是否在一个网络中,以及它是否是医生所有的。我们通过每个社交网络平台的用户活动数据来确定医院的社交媒体使用程度。这些数据包括Facebook上的点赞、Twitter和Instagram上的关注者以及YouTube上的订阅者。在这项研究中,超过80%的医院至少在一个社交网站上存在;然而,利用与否取决于医院自身特点的诸多因素。我们观察到,俄亥俄州的医院、公立医院和专职注册护士数量较多的儿童专科医院的社会媒体利用程度较高。
{"title":"Analyzing Social Media Implementation in Hospitals in the U.S. Midwest Region","authors":"Dalsang Chung, C. C. Lee, David Hwang","doi":"10.58729/1941-6679.1544","DOIUrl":"https://doi.org/10.58729/1941-6679.1544","url":null,"abstract":"The purpose of this research is to explore to what scale hospitals are adopting social media and implementing it in accordance with hospital characteristics. We reviewed hospitals’ social media activities on social networking sites such Facebook, Twitter, Instagram, and YouTube. We studied the 912 hospitals in the Midwest region reported in the 2015 American Hospital Association Annual Survey dataset. We reviewed each hospital’s social-networking page to understand the scale of social media adoption relative to the hospital’s characteristics such as bed count, state, ownership type (control), and specialty (service). We also considered whether the hospital is in a network and whether it is physician-owned. We determined the hospital’s degree of social media usage through data on user activity from each social-networking platform. This data includes likes on Facebook, followers on Twitter and Instagram, and subscribers on YouTube. More than 80% of the hospitals in this study have a presence on at least one social-networking website; however, utilization depends on many factors of the hospital’s characteristics. We have observed that hospitals in Ohio, government-owned hospitals, and children’s specialty hospitals with a higher number of full-time registered nurses have a higher degree of social media utilization.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90501658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless Mobile Phone Technology, Deregulation Policy, Competition and Economic welfare in Nigeria’s Telecom Industry: An Analytic model 无线移动电话技术、放松管制政策、竞争与尼日利亚电信业的经济福利:一个分析模型
Q4 Computer Science Pub Date : 2021-01-01 DOI: 10.58729/1941-6679.1429
O. J. Dieli
This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecom technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with the new wireless technology, which requires much lower operation cost, the operator can now make a positive profit and therefore by deregulating the market, entries of new firms and competition takes place in the industry which lowers the final product price in the telecom market. The research, therefore, concludes that availability of wireless mobile phone technology led to deregulation of the industry which brought competition by increasing the number of firms in the industry that engendered fall in product price and increase in output. The study observed that the policy of deregulation is intended to usher in perfect competition but it is far from achieving that now for the industry displays behaviour similar to monopolistic competitive and oligopolistic industries. However, one thing is clear, it will never be a natural monopoly again.
这个分析模型是关于一种新的无线移动电话技术的到来所引起的尼日利亚电信行业的结构变化。由于1999年解除管制,尼日利亚的电信业从自然垄断转变为竞争市场。在使用地下或地面以上有线电话线路的价格管制下,它只能在政府补贴的帮助下运行。本研究认为,一种新的电信技术的到来是尼日利亚对其电信业放松管制成功的关键。对一个简单的微观经济模型的分析表明,使用新的无线技术,它需要更低的运营成本,运营商现在可以赚取正利润,因此,通过放松市场管制,新公司的进入和竞争发生在行业中,这降低了电信市场的最终产品价格。因此,该研究得出结论,无线移动电话技术的可用性导致了对行业的放松管制,通过增加行业中公司的数量来带来竞争,从而导致产品价格下降和产量增加。该研究指出,放松管制的政策旨在引入完全竞争,但目前远未实现这一目标,因为该行业表现出与垄断竞争和寡头垄断行业相似的行为。然而,有一点是明确的,它永远不会再成为自然垄断。
{"title":"Wireless Mobile Phone Technology, Deregulation Policy, Competition and Economic welfare in Nigeria’s Telecom Industry: An Analytic model","authors":"O. J. Dieli","doi":"10.58729/1941-6679.1429","DOIUrl":"https://doi.org/10.58729/1941-6679.1429","url":null,"abstract":"This analytic model is about the Nigerian telecom industry’s structural change caused by the arrival of a new wireless mobile phone technology. Nigeria’s telecom industry transformed from natural monopoly to competitive market as a result of deregulation that occurred in 1999. Under the price regulation using underground or above the ground cable telephone lines, it could run only with the help of government subsidies. This study argues that the arrival of a new telecom technology was the key to success of Nigeria’s deregulation of its telecom industry. An analysis of a simple microeconomic model shows that with the new wireless technology, which requires much lower operation cost, the operator can now make a positive profit and therefore by deregulating the market, entries of new firms and competition takes place in the industry which lowers the final product price in the telecom market. The research, therefore, concludes that availability of wireless mobile phone technology led to deregulation of the industry which brought competition by increasing the number of firms in the industry that engendered fall in product price and increase in output. The study observed that the policy of deregulation is intended to usher in perfect competition but it is far from achieving that now for the industry displays behaviour similar to monopolistic competitive and oligopolistic industries. However, one thing is clear, it will never be a natural monopoly again.","PeriodicalId":55883,"journal":{"name":"International Journal of Information Technology and Management","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81126054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Technology and Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1