首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   232篇
  免费   6篇
  国内免费   3篇
财政金融   12篇
工业经济   7篇
计划管理   43篇
经济学   14篇
综合类   35篇
旅游经济   6篇
贸易经济   105篇
农业经济   2篇
经济概况   17篇
  2024年   1篇
  2023年   8篇
  2022年   4篇
  2021年   12篇
  2020年   15篇
  2019年   12篇
  2018年   12篇
  2017年   9篇
  2016年   3篇
  2015年   5篇
  2014年   9篇
  2013年   24篇
  2012年   6篇
  2011年   15篇
  2010年   13篇
  2009年   15篇
  2008年   11篇
  2007年   10篇
  2006年   9篇
  2005年   9篇
  2004年   2篇
  2003年   7篇
  2002年   6篇
  2001年   6篇
  2000年   2篇
  1999年   2篇
  1998年   1篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1992年   3篇
  1990年   1篇
  1989年   3篇
  1987年   1篇
  1984年   1篇
排序方式: 共有241条查询结果,搜索用时 15 毫秒
1.
《Business Horizons》2021,64(6):799-807
Internet of Medical Things (IoMT) technology remains in early stages of adoption, but advancements and breakthroughs are quickly moving this process forward. There is a critical need for cybersecurity to be a priority in the development of these new tools, alongside design and utility. Given the rapid pace and potential magnitude of the coming advancements in IoMT, if privacy and security risks are neglected, a significant crisis could emerge in the form of more frequent cybersecurity breaches. This article examines the market opportunities and risks associated with IoMT and outlines a plan for proactively mitigating concerns and providing a platform to foster growth, to modify attitudes and behaviors, and to continue to build consumer confidence in the overall health system without sacrificing security.  相似文献   
2.
Artificial intelligence (AI) has captured substantial interest from a wide array of marketing scholars in recent years. Our research contributes to this emerging domain by examining AI technologies in marketing via a global lens. Specifically, our lens focuses on three levels of analysis: country, company, and consumer. Our country-level analysis emphasizes the heterogeneity in economic inequality across countries due to the considerable economic resources necessary for AI adoption. Our company-level analysis focuses on glocalization because while the hardware that underlies these technologies may be global in nature, their application necessitates adaptation to local cultures. Our consumer-level analysis examines consumer ethics and privacy concerns, as AI technologies often collect, store and process a cornucopia of personal data across our globe. Through the prism of these three lenses, we focus on two important dimensions of AI technologies in marketing: (1) human–machine interaction and (2) automated analysis of text, audio, images, and video. We then explore the interaction between these two key dimensions of AI across our three-part global lens to develop a set of research questions for future marketing scholarship in this increasingly important domain.  相似文献   
3.
ABSTRACT

The co-option of consumers as unwilling agents in their own surveillance has enabled significant abuses of consumer privacy. Previous studies have largely used privacy concern as a proxy for overall privacy attitudes. In this study, we implement a choice experiment in combination with measures adapted from Communication Privacy Management theory to enable a broader exploration of the influences of privacy attitudes by contextualising privacy as a negotiation about accessibility over contextual boundaries. Key findings suggest individuals’ social media disclosure decisions are influenced at least in part by their privacy attitudes, particularly with respect to information categories which may cue other personal information. Findings are also presented on consumers’ willingness to pay for privacy, with implications for alternative revenue streams not built on consumer surveillance.  相似文献   
4.
The opaque use of data collection methods on the WWW has given rise to privacy concerns among Internet users. Privacy policies on websites may ease these concerns, if they communicate clearly and unequivocally when, how and for what purpose data are collected, used or shared. This paper examines privacy policies from a linguistic angle to determine whether the language of these documents is adequate for communicating data-handling practices in a manner that enables informed consent on the part of the user. The findings highlight that corporate privacy policies obfuscate, enhance and mitigate unethical data handling practices and use persuasive appeals to increase companies’ trustworthiness. The communicative strategies identified provide starting points for redesigning existing privacy statements with a view to communicating data handling practices in a more transparent and responsible manner, laying the groundwork for informed consent.  相似文献   
5.
Concerns with improper collection and usage of personal information by businesses or governments have been seen as critical to the success of the emerging electronic commerce. In this regard, computer professionals have the oversight responsibility for information privacy because they have the most extensive knowledge of their organization’s systems and programs, as well as an intimate understanding of the data. Thus, the competence of these professionals in ensuring sound practice of information privacy is of great importance to both researchers and practitioners. This research addresses the question of whether male computer professionals differ from their female counterparts in their self-regulatory efficacy to protect personal information privacy. A total of 103 male and 65 female subjects surveyed in Taiwan responded to a 10-item questionnaire that includes three measures: protection (protecting privacy information), non-distribution (not distributing privacy information to others), and non-acquisition (not acquiring privacy information). The findings show (1) significant gender differences exist in the subjects’ overall self-regulatory efficacy for information privacy, and, in particular, (2) that female subjects in this study exhibited a higher level of self-regulatory efficacy than males for the protection and non-acquisition of personal privacy information. The identification of the factorial structure of the self-regulatory efficacy concerning information privacy may contribute to future research directed to examining the links between privacy efficacy and psychological variables, such as ethical attitude, ethical intention, and self-esteem. Studies can also be extended to investigate how different cultural practices of morality and computer use in men and women may shape the different development patterns of privacy self-efficacy. Understanding the different cultural practices may then shed light on the social sources of privacy competence and the appropriate remedies that can be provided to improve the situation. Feng-Yang Kuo holds a B.S. degree in Management Science from Chiao-Tung University, Taiwan and a Ph.D.degree in Information Systems from University of Arizona. He was a faculty of Information Systems at University of Colorado at Denver from 1985 to 1997 and is currently an associate professor of Information Management in Sun Yat-Sen University, Taiwan. He has published articles in Communications of ACM, MIS Quarterly, Communications of AIS, Journal of Business Ethics, Information & Management, Journal of Systems and Software, Decision Support Systems, and Sun Yat-Sen Management Review. Among his current interests are information ethics, managerial cognition, and human-computer interfaces. Cathy S.Lin Professor Cathy S.Lin is an assistant professor of Information Management at National University of Kaohsiung, Taiwan. Her Ph.D.is in Management Information Systems from National Sun Yat-Sen University. She has published articles in the Information & Management, Journal of Information Management, and Sun Yat-Sen Management Review. Among her current interests are information ethics, ethical decision making, electronic commerce, and information management. Meng-Hsiang Hsu Professor Meng-Hsiang Hsu is a professor of information management at National Kaohsiung of First University of Science and Technology. His Ph.D. is in Management Information Systems from National Sun Yat-Sen University. He has published articles in the J. of Business Ethics, Behavior & information Technology, Decision Support System, and Industrial Management and Data Systems. Among his current interests are knowledge management, information ethics, strategic information systems, and electronic commerce.  相似文献   
6.
随着计算机技术和网络技术的发展,出现了网络隐私权的概念,其内容主要包括知情权、选择权、控制权、安全请求权、利用限制权、请求赔偿权。互联网上侵犯隐私权的形式主要包括资料收集过程中的侵权行为,对个人资料的不当利用,擅自在网上公布、宣扬他人隐私等。应借鉴美国和欧盟国家对网络隐私权保护的方法,完善并健全我国的相关立法,制定一部内容全面、技术性和综合性较强的网络隐私权保护法,以加强对网上用户个人隐私的保护。  相似文献   
7.
《Business Horizons》2021,64(6):729-734
Cybercrime and cybersecurity are like two sides of the same coin: They are opposites but cannot exist without each other. Their mutual relation generates a myriad of ethical issues, ranging from minor to vital. The rapid development of technology will surely involve even more ethical concerns, like the infamous example of a fitness tracking company allegedly paying $10 million worth of ransom. Every cybersecurity solution, tool, or practice has to be ethical by design if it is to protect people and their rights. To identify the ethical issues that cybersecurity/cybercrime might bring about in the future, we conducted the first broad and comprehensive horizon-scanning study since the COVID-19 pandemic arose. As we began this project, nobody had the slightest idea that the coming months would bring the COVID-19 pandemic, and that the reality we had known was about to change dramatically. As it soon became apparent, the deadly coronavirus brought completely new cybersecurity/cybercrime ethical dilemmas to light, and some of the ones known before were transformed or shifted. This article presents the results of our horizon-scanning study concerning the ethical dilemmas that emerged amid the COVID-19 pandemic.  相似文献   
8.
ABSTRACT

Digital assistants (e.g., Apple’s Siri, Amazon’s Alexa, Google’s Google Assistant) are highly complex and advanced artificial intelligence (AI) based technologies. Individuals can use digital assistants to perform basic personal tasks as well as for more advanced capabilities. Yet, the functional and topical use of a digital assistant tends to vary by individual. This study reflects the contextual experiences of the respondents. At present, there is little empirical evidence of customer satisfaction with digital assistants. PLS-SEM was used to analyse 244 survey responses to examine this research gap. The results confirmed that expectations and confirmation of expectations have a positive and significant relationship on customer satisfaction with digital assistants. This study provides evidence that customer expectations are being satisfied through the digital assistant interaction experience. As firms integrate digital assistants into their operations, they must help customers properly define what to expect from the firm’s interactive experience.  相似文献   
9.
Profiling involves the collection and use of online information about prospective and current employees to evaluate their fitness for and in the job. Workplace and legal studies suggest an expanded use of profiling and significant legal/professional implications for HRM practitioners, yet scant attention has been afforded to the boundaries of such practices. In this study, profiling is framed as a terrain on which employees and employers assert asymmetrical interests. Using survey data from large samples in Australia and the UK, the study investigates the prevalence and outcomes of profiling; the extent to which employees assert a right to privacy versus employer rights to engage in profiling; the extent to which organisations codify profiling practices; and employee responses in protecting online information. The findings contribute to a small and emerging body of evidence addressing how social media conduct at work is reconstituting and reshaping the boundaries between public and private spheres.  相似文献   
10.
征信要求信息公开,金融隐私则要求数据保护。如何处理征信与金融隐私的关系、协调两者之间的冲突、寻找其平衡点,是各国理论和立法关注的焦点。从征信与金融隐私的概念切入,研究两者的主要冲突,分析协调两者之间冲突的关键因素,对我国的征信管理提出相关的意见和建议。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号