首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   88篇
  免费   1篇
  国内免费   1篇
财政金融   9篇
计划管理   29篇
经济学   13篇
综合类   9篇
运输经济   2篇
旅游经济   2篇
贸易经济   21篇
农业经济   2篇
经济概况   3篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   2篇
  2019年   3篇
  2018年   4篇
  2017年   3篇
  2016年   2篇
  2014年   5篇
  2013年   11篇
  2012年   3篇
  2011年   8篇
  2010年   3篇
  2009年   8篇
  2008年   4篇
  2007年   5篇
  2006年   7篇
  2005年   4篇
  2004年   4篇
  2003年   4篇
  2002年   3篇
  2001年   1篇
  2000年   1篇
  1995年   1篇
排序方式: 共有90条查询结果,搜索用时 162 毫秒
71.
The present study analyzes the elements that differentiate violators from non-violators of information security measures. Various elements are derived from established theories and models such as general deterrence theory, theory of planned behavior, theory of reasoned action, protection motivation theory, and social cognitive theory. To examine these factors, the data are gathered through an online study conducted in a Midwestern University, USA. The data are collected using questionnaires, and after scrutiny, 195 questionnaires are selected for final analysis. This data are analyzed using second-level statistical techniques, such as chi-square analysis and ANOVA. Results reveal that violators and non-violators of information security measures differ significantly with respect to many factors. These factors include perceived privacy, subjective norms, perceived information security policy (ISP) scope, perceived severity of penalty, perceived celerity of penalty, management support, organizational security culture, and perceived organizational IT capability. The non-significant factors are trust and work load. Implications for practitioners and researchers are provided.  相似文献   
72.
A New Keynesian model estimated for India yields valuable insights. Aggregate demand reacts to interest rate changes with a lag of three quarters, while inflation takes four quarters to respond to demand conditions. Inflation thus responds to monetary policy actions with a lag of seven quarters. Inflation is inertial and persistent when it sets in, irrespective of the source. Exchange rate pass-through to domestic inflation is low. Inflation turns out to be the dominant focus of monetary policy, accompanied by a strong commitment to the stabilization of output.  相似文献   
73.
Information technology has become heavily embedded in business operations. As business needs change over time, IT applications are expected to continue providing required support. Whether the existing IT applications are still fit for the business purpose they were intended or new IT applications should be introduced is a strategic decision for business, IT and business-aligned IT. In this article, we present a method that aims to analyse business functions and IT roles and to evaluate business-aligned IT from both social and technical perspectives. The method introduces a set of techniques that systematically supports the evaluation of the existing IT applications in relation to their technical capabilities for maximising business value. Furthermore, we discuss the evaluation process and results that are illustrated and validated through a real-life case study of a UK borough council and followed by discussion on implications for researchers and practitioners.  相似文献   
74.
Although virtual reality (VR) has received growing attention and been adopted as customer engagement and marketing tools in the hospitality and tourism industry, little research has been conducted in quality assessment of VR and its impact on customers’ psychological acceptance. Building upon the DeLone and McLean’s IS success model, this study identifies the quality factors of VR and examines their impacts on customers’ behavioral intention. This study develops a quality-driven VR framework and tests the proposed hypotheses assessing customers’ behavioral intentions. For the empirical analysis, this study recruits potential U.S. customers and asks them to browse a VR-based destination website and then to answer the online survey related to VR applications. The collected responses are analyzed by PLS-SEM. Findings suggest that content quality, system quality, and vividness positively influence customers’ attitude and telepresence, leading to their positive behavioral intention to visit the destination.  相似文献   
75.
文章以实现科研项目管理的系统化、条理化、清晰化为目的,论述了科研机构项目管理系统部署中工作流模块与ISO 9001管理控制程序结合的具体实现方法。  相似文献   
76.
论高校建立ISO9001质量管理体系的有效性   总被引:1,自引:0,他引:1  
文章针对高校建立IS09001质量管理体系的认识误区及其产生原因进行了探讨,阐述了如何正确认识高等院校IS09001质量管理体系的有效性,认为全员参与是实现其有效性的根本保障。  相似文献   
77.
加入金融创新的IS-LM模型   总被引:11,自引:0,他引:11  
金融创新与衍生工具的大发展是自 2 0世纪 70年代以来全球经济 (特别是发达经济体 )最显著变化之一 ,但这一变化在传统的IS LM模型中却得不到反映。本文通过金融创新对于交易效率、实际投资的利率弹性、金融投资的利率弹性这三条渠道的影响 ,将金融创新纳入IS LM模型。这一方面是弥补传统IS LM模型对现实经济变动反映的不足 ,另一方面也是对金融全球化时代符号经济与实体经济关联“形式化”的一种努力。新模型的分析结果表明 :长期而言 ,金融创新对产出有促进作用 ;但短期来说 ,金融创新的作用不确定 ,可能对产出产生负面影响。从而一味鼓吹金融创新会有误导作用  相似文献   
78.
Although training is one of the most cited critical success factors in Enterprise Resource Planning (ERP) systems implementations, few empirical studies have attempted to examine the characteristics of management of the training process within ERP implementation projects. Based on the data gathered from a sample of 158 respondents across four stakeholder groups involved in ERP implementation projects, and using a mixed method design, we have assembled a derived set of training best practices. Results suggest that the categorised list of ERP training best practices can be used to better understand training activities in ERP implementation projects. Furthermore, the results reveal that the company size and location have an impact on the relevance of training best practices. This empirical study also highlights the need to investigate the role of informal workplace trainers in ERP training activities.  相似文献   
79.
80.
信息系统审计与控制框架初探   总被引:5,自引:0,他引:5  
本文主要对信息系统审计与控制的框架进行了初步的探讨,论述了信息系统审计的必要性,分析了信息系统审计的涵义与内容,基本审计业务,提出了相关的控制模型,并介绍了审计的实施。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号