首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   94篇
  免费   3篇
财政金融   9篇
计划管理   32篇
经济学   13篇
综合类   10篇
运输经济   2篇
旅游经济   2篇
贸易经济   24篇
农业经济   2篇
经济概况   3篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   2篇
  2019年   3篇
  2018年   4篇
  2017年   3篇
  2016年   2篇
  2014年   6篇
  2013年   12篇
  2012年   7篇
  2011年   8篇
  2010年   3篇
  2009年   9篇
  2008年   4篇
  2007年   5篇
  2006年   7篇
  2005年   4篇
  2004年   4篇
  2003年   4篇
  2002年   3篇
  2001年   1篇
  2000年   1篇
  1995年   1篇
排序方式: 共有97条查询结果,搜索用时 15 毫秒
1.
ERP系统的使用者满意研究   总被引:1,自引:0,他引:1       下载免费PDF全文
ERP系统越来越成为企业获取竞争优势的必备基础,但国内外ERP系统的实施效果往往不尽如人意。ERP系统实施是个复杂的系统工程,涉及到企业的各个层面,如何测度其实施效果一直是业内热点话题。ERP系统就其本质是将管理思想固化其内的信息系统。因此本文在回顾国外对复杂信息系统实施测度研究的基础上,提出可借鉴使用者满意来测度ERP系统实施效果,并为今后实证研究奠定基础。  相似文献   
2.
IS026000社会责任国际标准的制定工作已开展近三年,文章就IS026000的进展情况、工作特点作了介绍和分析,内容包括:与众不同的五项ISO之最、体现全球化特点的IS026000(工作草案稿)、充满利益博弈的制定过程、复杂的工作组织结构及已有成果和未来计划等。  相似文献   
3.
    
While hackers and viruses fuel the IS security concerns for organisations, the problems posed by employee computer crime should not be underestimated. Indeed, a number of IS security researchers have turned their attention to the ‘insider’ threat. Of this group, several focus on the offender, either in terms of a series of attributes required for perpetration, or with reference to forms of safeguards aimed at negating such behaviour. These studies are complemented by those texts which examine the organisational context in which rogue employees commit computer crime. Currently, however, there has been a lack of insight into the relationship between the offender and the context, during the commission process. To address this deficiency, two criminological theories are advanced. This paper illustrates how the theories, entitled the Rational Choice Perspective and Situational Crime Prevention, can be applied to the IS domain, thereby offering a theoretical basis by which to analyse the offender/context relationship during perpetration. By so doing, practitioners may use these insights to inform and enhance the selection of safeguards in a bid to improve prevention programmes. Furthermore, the importation of the Rational Choice Perspective and Situational Crime Prevention into the IS field opens up potentially new areas for future research.  相似文献   
4.
文章阐述了宏观经济学中几个重要的基本概念,指出了厉以宁先生主编的《西方经济学》一书中的几处基本概念表述的错误,并进一步作了纠正,欲与作者商榷。  相似文献   
5.
IT治理研究进展   总被引:2,自引:0,他引:2  
本文介绍了IT治理产生的背景,阐述了IT治理的概念、内涵及目标,对国际、国内IT治理研究的现状进行了综述,对IT治理研究的代表性成果――COBIT、CISR、ITIL、IS017799:2000等IT治理模型、规范和标准进行了分析介绍。  相似文献   
6.
本文详细介绍了新凯恩斯经济学下IS曲线和Phillips曲线的理论渊源和两种主要货币政策规则的思想,并针对我国的经济数据进行实证检验。研究发现:我国的经济运行符合新凯恩斯经济下的前瞻性IS曲线和Phillips曲线,在此基础上模拟最优利率规则结果较理想。  相似文献   
7.
    
Scientific research on employees during pre‐implementation phases of human resource information systems (HRIS) is difficult for a number of reasons. First, the constraints of practitioner research in terms of sample sizes, compliance factors and difficulties with obtaining control or comparison groups discourage research initiatives. Second, project management methods that emphasize cost and time compliance often prohibit the types of delays that research can impose. This study attempts to use psychological research methods combined with project management techniques to inform HRIS implementation methodology. It provides a model of key determinants of successful information systems implementation that should be considered in future projects implementing information systems or other new technologies. This is a first attempt to discover effective implementation methodologies associated with HRIS in the pre‐implementation phase. The research showed that a critical component for the success of the implementation of new HRIS systems is to understand the staff groups' particular needs, concerns and opinions. This study identified important factors associated with the implementation of new human resource information systems. From these findings we can see that the conditions that support successful implementation for HR staff differ from those for line managers. This information is important when designing implementation methodologies and change management strategies.  相似文献   
8.
    
Japan has suffered from sluggish economic growth and recession since the early 1990s. In this paper, we analyze the causes of the prolonged slowdown of the Japanese economy (the lost decade). Economics Nobel laureate Paul Krugman has argued that Japan's lost decade is an example of a liquidity trap. However, our empirical analysis shows that stagnation of the Japanese economy comes from its vertical IS curve rather than a horizontal LM curve, so the Japanese economy has been facing structural problems rather than a temporary downturn. The vertical IS curve is caused by an insensitivity of investment to a lower interest rate partly because of the decline of sales due to the aging population and firms not wanting to invest. The structural problems come from the aging demographic, which is often neglected by scholars and policy‐makers, and also from the allocation of transfers from the central government to local governments, and the unwillingness of Japanese banks to lend money to startup businesses and small and medium enterprises (SMEs), mainly because of Basel capital requirements. Many countries, like China, are expected to face similar issues, particularly given the aging population. The present paper will address why the Japanese economy has been trapped in a prolonged slowdown and provide some remedies for revitalizing the economy.  相似文献   
9.
本文分析了Web GIS的理论基础及实现方法。结合旅游地需要,基于面向对象的分析设计思想,通过UML进行了系统需求分析,设计了该系统的总体设计框架和具体功能模块,选用SuperMap IS.NET进行了系统的实现。从GIS系统的角度,设计旅游信息系统,为旅游地旅游信息系统的建立提供了优化选择。  相似文献   
10.
In global competition, the Internet turned out to be the single and hegemonial infrastructure for communication. It has become the “nervous system” of today’s networked economy. While the first phase provided communication services, like e-mail, the WWW has established an interactive platform to allow easy access to advanced services. Now, in its “third” or cooperative phase, the Internet will finally lead to a ubiquitous informatization where business processes and applications become interleaved beyond the boundaries of enterprises. For this phase, many analogies to the emergence of the Internet can be observed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号