全文获取类型
收费全文 | 88篇 |
免费 | 1篇 |
国内免费 | 1篇 |
专业分类
财政金融 | 9篇 |
计划管理 | 29篇 |
经济学 | 13篇 |
综合类 | 9篇 |
运输经济 | 2篇 |
旅游经济 | 2篇 |
贸易经济 | 21篇 |
农业经济 | 2篇 |
经济概况 | 3篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 2篇 |
2020年 | 2篇 |
2019年 | 3篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 2篇 |
2014年 | 5篇 |
2013年 | 11篇 |
2012年 | 3篇 |
2011年 | 8篇 |
2010年 | 3篇 |
2009年 | 8篇 |
2008年 | 4篇 |
2007年 | 5篇 |
2006年 | 7篇 |
2005年 | 4篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 3篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1995年 | 1篇 |
排序方式: 共有90条查询结果,搜索用时 162 毫秒
71.
Habib Ullah Khan Khalid A. AlShare 《Journal of Organizational Computing & Electronic Commerce》2019,29(1):4-23
The present study analyzes the elements that differentiate violators from non-violators of information security measures. Various elements are derived from established theories and models such as general deterrence theory, theory of planned behavior, theory of reasoned action, protection motivation theory, and social cognitive theory. To examine these factors, the data are gathered through an online study conducted in a Midwestern University, USA. The data are collected using questionnaires, and after scrutiny, 195 questionnaires are selected for final analysis. This data are analyzed using second-level statistical techniques, such as chi-square analysis and ANOVA. Results reveal that violators and non-violators of information security measures differ significantly with respect to many factors. These factors include perceived privacy, subjective norms, perceived information security policy (ISP) scope, perceived severity of penalty, perceived celerity of penalty, management support, organizational security culture, and perceived organizational IT capability. The non-significant factors are trust and work load. Implications for practitioners and researchers are provided. 相似文献
72.
《Macroeconomics and Finance in Emerging Market Economies》2013,6(1):18-41
A New Keynesian model estimated for India yields valuable insights. Aggregate demand reacts to interest rate changes with a lag of three quarters, while inflation takes four quarters to respond to demand conditions. Inflation thus responds to monetary policy actions with a lag of seven quarters. Inflation is inertial and persistent when it sets in, irrespective of the source. Exchange rate pass-through to domestic inflation is low. Inflation turns out to be the dominant focus of monetary policy, accompanied by a strong commitment to the stabilization of output. 相似文献
73.
Lily Sun Kecheng Liu Dian Indrayani Jambari Vaughan Michell 《Enterprise Information Systems》2016,10(4):378-399
Information technology has become heavily embedded in business operations. As business needs change over time, IT applications are expected to continue providing required support. Whether the existing IT applications are still fit for the business purpose they were intended or new IT applications should be introduced is a strategic decision for business, IT and business-aligned IT. In this article, we present a method that aims to analyse business functions and IT roles and to evaluate business-aligned IT from both social and technical perspectives. The method introduces a set of techniques that systematically supports the evaluation of the existing IT applications in relation to their technical capabilities for maximising business value. Furthermore, we discuss the evaluation process and results that are illustrated and validated through a real-life case study of a UK borough council and followed by discussion on implications for researchers and practitioners. 相似文献
74.
Although virtual reality (VR) has received growing attention and been adopted as customer engagement and marketing tools in the hospitality and tourism industry, little research has been conducted in quality assessment of VR and its impact on customers’ psychological acceptance. Building upon the DeLone and McLean’s IS success model, this study identifies the quality factors of VR and examines their impacts on customers’ behavioral intention. This study develops a quality-driven VR framework and tests the proposed hypotheses assessing customers’ behavioral intentions. For the empirical analysis, this study recruits potential U.S. customers and asks them to browse a VR-based destination website and then to answer the online survey related to VR applications. The collected responses are analyzed by PLS-SEM. Findings suggest that content quality, system quality, and vividness positively influence customers’ attitude and telepresence, leading to their positive behavioral intention to visit the destination. 相似文献
75.
76.
论高校建立ISO9001质量管理体系的有效性 总被引:1,自引:0,他引:1
文章针对高校建立IS09001质量管理体系的认识误区及其产生原因进行了探讨,阐述了如何正确认识高等院校IS09001质量管理体系的有效性,认为全员参与是实现其有效性的根本保障。 相似文献
77.
加入金融创新的IS-LM模型 总被引:11,自引:0,他引:11
金融创新与衍生工具的大发展是自 2 0世纪 70年代以来全球经济 (特别是发达经济体 )最显著变化之一 ,但这一变化在传统的IS LM模型中却得不到反映。本文通过金融创新对于交易效率、实际投资的利率弹性、金融投资的利率弹性这三条渠道的影响 ,将金融创新纳入IS LM模型。这一方面是弥补传统IS LM模型对现实经济变动反映的不足 ,另一方面也是对金融全球化时代符号经济与实体经济关联“形式化”的一种努力。新模型的分析结果表明 :长期而言 ,金融创新对产出有促进作用 ;但短期来说 ,金融创新的作用不确定 ,可能对产出产生负面影响。从而一味鼓吹金融创新会有误导作用 相似文献
78.
《Enterprise Information Systems》2013,7(6):665-683
Although training is one of the most cited critical success factors in Enterprise Resource Planning (ERP) systems implementations, few empirical studies have attempted to examine the characteristics of management of the training process within ERP implementation projects. Based on the data gathered from a sample of 158 respondents across four stakeholder groups involved in ERP implementation projects, and using a mixed method design, we have assembled a derived set of training best practices. Results suggest that the categorised list of ERP training best practices can be used to better understand training activities in ERP implementation projects. Furthermore, the results reveal that the company size and location have an impact on the relevance of training best practices. This empirical study also highlights the need to investigate the role of informal workplace trainers in ERP training activities. 相似文献
79.
80.
信息系统审计与控制框架初探 总被引:5,自引:0,他引:5
本文主要对信息系统审计与控制的框架进行了初步的探讨,论述了信息系统审计的必要性,分析了信息系统审计的涵义与内容,基本审计业务,提出了相关的控制模型,并介绍了审计的实施。 相似文献