全文获取类型
收费全文 | 88篇 |
免费 | 1篇 |
国内免费 | 1篇 |
专业分类
财政金融 | 9篇 |
计划管理 | 29篇 |
经济学 | 13篇 |
综合类 | 9篇 |
运输经济 | 2篇 |
旅游经济 | 2篇 |
贸易经济 | 21篇 |
农业经济 | 2篇 |
经济概况 | 3篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 2篇 |
2020年 | 2篇 |
2019年 | 3篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 2篇 |
2014年 | 5篇 |
2013年 | 11篇 |
2012年 | 3篇 |
2011年 | 8篇 |
2010年 | 3篇 |
2009年 | 8篇 |
2008年 | 4篇 |
2007年 | 5篇 |
2006年 | 7篇 |
2005年 | 4篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1995年 | 1篇 |
排序方式: 共有90条查询结果,搜索用时 31 毫秒
61.
《Enterprise Information Systems》2013,7(8):861-877
Enterprises are daily facing pressures to demonstrate their ability to adapt quickly to the unpredictable changes of their dynamic in terms of technology, social, legislative, competitiveness and globalisation. Thus, to ensure its place in this hard context, enterprise must always be agile and must ensure its sustainability by a continuous improvement of its information system (IS). Therefore, the agility of enterprise information systems (EISs) can be considered today as a primary objective of any enterprise. One way of achieving this objective is by the urbanisation of the EIS in the context of continuous improvement to make it a real asset servicing enterprise strategy. This paper investigates the benefits of EISs urbanisation based on clustering techniques as a driver for agility production and/or improvement to help managers and IT management departments to improve continuously the performance of the enterprise and make appropriate decisions in the scope of the enterprise objectives and strategy. This approach is applied to the urbanisation of a tour operator EIS. 相似文献
62.
63.
This paper presents a case from Volvo that explores an innovative RFID solution that leverages the exiting infrastructures of mobile usage. ‘Smart goods’ is used to explain features applied through Radio Frequency IDentification, utilization of cellular networks (GSM/GPRS) and web technology together with collaboration among supply chain actors. This has reduced traditional barriers of entry. An empirical case provides the basis for evaluation from the perspectives of operational reliability, usability and productivity. 相似文献
64.
65.
信息系统审计--一种全新的审计模式的构建思路 总被引:1,自引:0,他引:1
随着信息技术在财务会计、管理领域应用程度的不断提高,信息系统审计业务也逐渐受到职业会计师行业的重视。但我国审计信息化建设在实际工作中,还存在一些不容忽视的问题,这些问题如不妥善解决将影响审计信息化建设和发展进程,因此构建完善的IS审计系统将成为当务之急。 相似文献
66.
稳定性财政政策有效性的边界条件:一个理论框架 总被引:1,自引:0,他引:1
李永友 《数量经济技术经济研究》2006,23(4):30-41
本文利用传统的IS—LM模型对开放经济下稳定性财政政策有效性的边界条件进行了分析,得出稳定性财政政策有效性的三个必要条件,一是利率上升的收入效应必须小于其替代效应,这是保证IS曲线斜率为负的必要条件;二是货币供给的利率弹性高于私人部门货币需求的利率敏感性,这是保证LM曲线斜率为正的必要条件;三是财政政策对私人部门需求的挤出效应要小于财政政策力度,这是保证财政政策对总需求的净效应大于零的必要条件。只要满足这三个条件,稳定性财政政策总是有效的,其有效程度取决于乘数的规模和政策力度净强度。 相似文献
67.
Nita G. Brooks Timothy H. Greer Steven A. Morris 《Journal of Education for Business》2018,93(5):213-221
The authors' focus was the assessment of skill requirements for information systems security positions to understand expectations for security jobs and to highlight issues relevant to curriculum management. The analysis of 798 job advertisements involved the exploration of domain-related and soft skills as well as degree and certification requirements. Domain-related skills comprised the largest part of the results (16 of the top 20 skills) with the top three related to networks, standards, and policies. The most often found soft skill related to teams or teamwork. Implications for information systems curriculum are discussed, and suggestions for future research are provided. 相似文献
68.
Samuel C. Yang 《Journal of Education for Business》2018,93(7):303-313
As information technology infrastructure becomes strategic to organizations, the author examines business-school programs that educate future infrastructure analysts. Information systems (IS) 2010 and information technology (IT) 2008 curriculum models are used to survey courses required by telecommunications and IT infrastructure programs in business schools. Of 525 Association to Advance Collegiate Schools of Business–accredited schools, 259 have IS/IT programs and 18 have telecommunications and infrastructure-related programs. IT Infrastructure, Networking-Advanced, and IT Security are the top three infrastructure-related courses. Programs also require courses including IS Project Management; Social and Professional Issues; and IS Strategy, Management and Acquisition. Data collected are used to develop a new curriculum model of IT infrastructure management program that can be offered by business schools. 相似文献
69.
《Canadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l\u0027Administration》2018,35(3):403-418
Enterprise information systems (IS) implementation is often part of an organization's strategic IT initiatives and requires a large investment of organizational resources, yet may fail due to inadequate management of critical success factors (CSF). Using a revelatory case study of a multi‐partner COTS implementation process by a large Canadian government organization, this research investigates successful management of CSF through optimal stakeholder engagement and a balancing of control configurations. This research identifies four distinct project orientations related to stakeholder engagements—strategic, responsibility, harmony, and persuasion—that can be of significant value in managing CSF and other challenges during implementation and post‐implementation phases. In addition to the identification of a need for control balancing in a multi‐partner IS implementation, three key drivers responsible for triggering control balancing are identified: (a) shared understanding, (b) negative anticipation, and (c) deviation of expectations. Copyright © 2017 ASAC. Published by John Wiley & Sons, Ltd. 相似文献
70.
Habib Ullah Khan Khalid A. AlShare 《Journal of Organizational Computing & Electronic Commerce》2019,29(1):4-23
The present study analyzes the elements that differentiate violators from non-violators of information security measures. Various elements are derived from established theories and models such as general deterrence theory, theory of planned behavior, theory of reasoned action, protection motivation theory, and social cognitive theory. To examine these factors, the data are gathered through an online study conducted in a Midwestern University, USA. The data are collected using questionnaires, and after scrutiny, 195 questionnaires are selected for final analysis. This data are analyzed using second-level statistical techniques, such as chi-square analysis and ANOVA. Results reveal that violators and non-violators of information security measures differ significantly with respect to many factors. These factors include perceived privacy, subjective norms, perceived information security policy (ISP) scope, perceived severity of penalty, perceived celerity of penalty, management support, organizational security culture, and perceived organizational IT capability. The non-significant factors are trust and work load. Implications for practitioners and researchers are provided. 相似文献