首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   88篇
  免费   1篇
  国内免费   1篇
财政金融   9篇
计划管理   29篇
经济学   13篇
综合类   9篇
运输经济   2篇
旅游经济   2篇
贸易经济   21篇
农业经济   2篇
经济概况   3篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   2篇
  2019年   3篇
  2018年   4篇
  2017年   3篇
  2016年   2篇
  2014年   5篇
  2013年   11篇
  2012年   3篇
  2011年   8篇
  2010年   3篇
  2009年   8篇
  2008年   4篇
  2007年   5篇
  2006年   7篇
  2005年   4篇
  2004年   4篇
  2003年   4篇
  2002年   3篇
  2001年   1篇
  2000年   1篇
  1995年   1篇
排序方式: 共有90条查询结果,搜索用时 31 毫秒
61.
Enterprises are daily facing pressures to demonstrate their ability to adapt quickly to the unpredictable changes of their dynamic in terms of technology, social, legislative, competitiveness and globalisation. Thus, to ensure its place in this hard context, enterprise must always be agile and must ensure its sustainability by a continuous improvement of its information system (IS). Therefore, the agility of enterprise information systems (EISs) can be considered today as a primary objective of any enterprise. One way of achieving this objective is by the urbanisation of the EIS in the context of continuous improvement to make it a real asset servicing enterprise strategy. This paper investigates the benefits of EISs urbanisation based on clustering techniques as a driver for agility production and/or improvement to help managers and IT management departments to improve continuously the performance of the enterprise and make appropriate decisions in the scope of the enterprise objectives and strategy. This approach is applied to the urbanisation of a tour operator EIS.  相似文献   
62.
商业银行操作风险管理的实践与探讨   总被引:1,自引:0,他引:1  
本文在分析巴塞尔新资本协议操作风险和实际工作的基础上,提出将信息资产作为商业银行一类特殊产品线,采用信息安全管理体系IS027001完善和细化操作风险管理,以此提升风险管理和内控能力.  相似文献   
63.
This paper presents a case from Volvo that explores an innovative RFID solution that leverages the exiting infrastructures of mobile usage. ‘Smart goods’ is used to explain features applied through Radio Frequency IDentification, utilization of cellular networks (GSM/GPRS) and web technology together with collaboration among supply chain actors. This has reduced traditional barriers of entry. An empirical case provides the basis for evaluation from the perspectives of operational reliability, usability and productivity.  相似文献   
64.
65.
信息系统审计--一种全新的审计模式的构建思路   总被引:1,自引:0,他引:1  
随着信息技术在财务会计、管理领域应用程度的不断提高,信息系统审计业务也逐渐受到职业会计师行业的重视。但我国审计信息化建设在实际工作中,还存在一些不容忽视的问题,这些问题如不妥善解决将影响审计信息化建设和发展进程,因此构建完善的IS审计系统将成为当务之急。  相似文献   
66.
稳定性财政政策有效性的边界条件:一个理论框架   总被引:1,自引:0,他引:1  
本文利用传统的IS—LM模型对开放经济下稳定性财政政策有效性的边界条件进行了分析,得出稳定性财政政策有效性的三个必要条件,一是利率上升的收入效应必须小于其替代效应,这是保证IS曲线斜率为负的必要条件;二是货币供给的利率弹性高于私人部门货币需求的利率敏感性,这是保证LM曲线斜率为正的必要条件;三是财政政策对私人部门需求的挤出效应要小于财政政策力度,这是保证财政政策对总需求的净效应大于零的必要条件。只要满足这三个条件,稳定性财政政策总是有效的,其有效程度取决于乘数的规模和政策力度净强度。  相似文献   
67.
The authors' focus was the assessment of skill requirements for information systems security positions to understand expectations for security jobs and to highlight issues relevant to curriculum management. The analysis of 798 job advertisements involved the exploration of domain-related and soft skills as well as degree and certification requirements. Domain-related skills comprised the largest part of the results (16 of the top 20 skills) with the top three related to networks, standards, and policies. The most often found soft skill related to teams or teamwork. Implications for information systems curriculum are discussed, and suggestions for future research are provided.  相似文献   
68.
As information technology infrastructure becomes strategic to organizations, the author examines business-school programs that educate future infrastructure analysts. Information systems (IS) 2010 and information technology (IT) 2008 curriculum models are used to survey courses required by telecommunications and IT infrastructure programs in business schools. Of 525 Association to Advance Collegiate Schools of Business–accredited schools, 259 have IS/IT programs and 18 have telecommunications and infrastructure-related programs. IT Infrastructure, Networking-Advanced, and IT Security are the top three infrastructure-related courses. Programs also require courses including IS Project Management; Social and Professional Issues; and IS Strategy, Management and Acquisition. Data collected are used to develop a new curriculum model of IT infrastructure management program that can be offered by business schools.  相似文献   
69.
Enterprise information systems (IS) implementation is often part of an organization's strategic IT initiatives and requires a large investment of organizational resources, yet may fail due to inadequate management of critical success factors (CSF). Using a revelatory case study of a multi‐partner COTS implementation process by a large Canadian government organization, this research investigates successful management of CSF through optimal stakeholder engagement and a balancing of control configurations. This research identifies four distinct project orientations related to stakeholder engagements—strategic, responsibility, harmony, and persuasion—that can be of significant value in managing CSF and other challenges during implementation and post‐implementation phases. In addition to the identification of a need for control balancing in a multi‐partner IS implementation, three key drivers responsible for triggering control balancing are identified: (a) shared understanding, (b) negative anticipation, and (c) deviation of expectations. Copyright © 2017 ASAC. Published by John Wiley & Sons, Ltd.  相似文献   
70.
The present study analyzes the elements that differentiate violators from non-violators of information security measures. Various elements are derived from established theories and models such as general deterrence theory, theory of planned behavior, theory of reasoned action, protection motivation theory, and social cognitive theory. To examine these factors, the data are gathered through an online study conducted in a Midwestern University, USA. The data are collected using questionnaires, and after scrutiny, 195 questionnaires are selected for final analysis. This data are analyzed using second-level statistical techniques, such as chi-square analysis and ANOVA. Results reveal that violators and non-violators of information security measures differ significantly with respect to many factors. These factors include perceived privacy, subjective norms, perceived information security policy (ISP) scope, perceived severity of penalty, perceived celerity of penalty, management support, organizational security culture, and perceived organizational IT capability. The non-significant factors are trust and work load. Implications for practitioners and researchers are provided.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号