全文获取类型
收费全文 | 126篇 |
免费 | 8篇 |
专业分类
财政金融 | 12篇 |
工业经济 | 17篇 |
计划管理 | 12篇 |
经济学 | 10篇 |
综合类 | 10篇 |
运输经济 | 2篇 |
旅游经济 | 6篇 |
贸易经济 | 61篇 |
经济概况 | 4篇 |
出版年
2023年 | 19篇 |
2022年 | 9篇 |
2021年 | 5篇 |
2020年 | 7篇 |
2019年 | 10篇 |
2018年 | 8篇 |
2017年 | 5篇 |
2016年 | 7篇 |
2015年 | 7篇 |
2014年 | 3篇 |
2013年 | 17篇 |
2012年 | 3篇 |
2011年 | 7篇 |
2010年 | 3篇 |
2009年 | 2篇 |
2008年 | 6篇 |
2007年 | 3篇 |
2006年 | 5篇 |
2005年 | 2篇 |
2004年 | 1篇 |
2003年 | 1篇 |
2002年 | 2篇 |
2001年 | 1篇 |
1983年 | 1篇 |
排序方式: 共有134条查询结果,搜索用时 359 毫秒
1.
《Journal of Retailing》2021,97(1):28-41
Artificial intelligence (AI) will substantially impact retailing. Building on past research and from interviews with senior managers, we examine how senior retailing managers should think about adopting AI, involving factors such as the extent to which an AI application is customer-facing, the amount of value creation, whether the AI application is online, and extent of ethics concerns. In addition, we highlight that the near-term impact of AI on retailing may not be as pronounced as the popular press might suggest, and also that AI is likely to be more effective if it focuses on augmenting (rather than replacing) managers’ judgments. Finally, while press coverage typically involves customer-facing AI applications, we highlight that a lot of value can be obtained by adopting non-customer-facing applications. Overall, we remain very optimistic as regards the impact of AI on retailing. Finally, we lay out a research agenda and also outline implications for practice. 相似文献
2.
《Business Horizons》2016,59(3):257-266
Data breaches are becoming more frequent and more damaging to the bottom line of many businesses. The Target data breach marked the beginning of increased scrutiny of cybersecurity practices. In the past, data breaches were seen as a cost of doing business, but Target's negligence and the scale of the data loss forced businesses and the courts to reevaluate current practices and regulatory frameworks. Businesses must make strategic use of their chief information officers, adopt cybersecurity best practices, and effectively train their employees to respond to growing security threats. They must also shape the cybersecurity narrative to influence regulatory responses to these threats. 相似文献
3.
A study on factors affecting privacy risk tolerance to prevent the spread of COVID-19 in South Korea
《Business Horizons》2021,64(6):735-741
South Korea has been evaluated as a country that is responding well to COVID-19. The Government of the Republic of Korea discloses where, when, and by which means of transportation people confirmed to have the virus have visited. Although disclosure of movement has contributed to flattening the curve and providing timely medical service, concerns about privacy infringement have also been raised. This article determines what factors influence privacy risk tolerance, looking specifically at threat severity, vulnerability, response efficacy, and response cost. We also provide implications for the preparation of better countermeasures for the government to implement. 相似文献
4.
Thanks to the expansion of network technologies and the coupling of smartphone hardware, younger generations have unparalleled access to a diverse range of information and interactive communication opportunities. Despite voluminous research on the causes of social network exhaustion and privacy invasion, limited academic attention has been devoted to understanding the driving forces and contributing factors for discontinuing usage of smartphone app. Drawing on the cognition-affect-conation paradigm, the present research proposes a conceptual research model to examine how information overload and communication overload effect social network exhaustion, privacy invasion, and ultimately, smartphone app users' intentions to discontinue usage. The study evaluates data from 442 smartphone app users, employing statistical analyses to demonstrate that both information overload and communication overload significantly impact users' exhaustion and privacy invasion. Additionally, social network exhaustion and privacy invasion are two major predictors of smartphone app discontinuance intention. By identifying the influential factors and causes of younger generations' discontinuous usage intention of smartphone app, this study meets the need for a thorough assessment of the social network exhaustion and privacy invasion phenomena. The findings may potentially enhance comprehension of the discontinuation intention phenomenon in the context of cognitive overload. Furthermore, they may provide novel insights for practitioners regarding effective strategies conducive to managing mobile social network adoption behavior, as well as the preservation of engagement levels among young users in mobile-saturated societies. 相似文献
5.
郑启福 《湖北经济学院学报》2011,9(2):19-23,76
合会是一种古老的民间信用互助形式,在我国有着悠久的历史,然而合会究竟起源于何时至今尚无定论。关于合会的起源,民间有庞公创始说、竹林七贤遗传说、青苗法演变说,学者认为起源于唐宋或隋朝等。从目前有据可考的史料记载看,我国合会雏形于汉代,成型于唐代,初步发展于宋代。 相似文献
6.
Personalisation refers to individualizing products, services, and contents according to customer interests and preferences. In order to deliver appropriate personalised offerings, firms inevitably need to collect rich customer data profiles. Prior research suggests that personalised services lead to positive customer responses such as increased willingness to disclose personal information and make purchases. However, another stream of research emphasizes negative outcomes of personalisation – namely, privacy concerns surrounding the use of personal information and associated negative effects on behaviour. The objectives of this study are twofold: (1) to examine how privacy assurance affects proximal outcomes of personalisation, such as perceived usefulness and privacy concerns; and (2) to identify the role such outcomes play in predicting customer behavioural responses, such as willingness to disclose personal information and make purchases. Our findings show that enhancing privacy assurance increases the perceived usefulness of services and decreases customer privacy concerns. Moreover, customer behavioural responses are positively related to the perceived usefulness of services and negatively associated with privacy concerns. However, despite the positive effects on perceived usefulness and purchase intentions, personalisation has no effect on privacy concerns and intentions to disclose personal information. 相似文献
7.
《Journal of Promotion Management》2013,19(1-2):199-215
Abstract With the growth of e-commerce has come the need for businesses to provide protection of personal, private data collected from internet users and consumers. The United States has favored a policy of industry self-regulation, while the European Union (EU) has responded to its consumer demands for privacy protection regulations and enforcement. Faced with the critical need for a middle ground, the US has proposed “Safe Harbor Privacy Principles” as a means of compromise with the EU. This article explores the market context of the Safe Harbor Principles, the European reaction, and the probable impact on businesses. 相似文献
8.
Comparisons between different randomized response strategies have already been performed by several workers but all have
concentrated solely on comparing the variances of the appropriate estimators. A very little attention has been paid by these
workers to the degree of privacy protection offered to the interviewees. In the present paper, an attempt has been made in
this direction and some important randomized response strategies have been compared with the Warner's model, taking into account
the aspect of privacy protection.
Received February 2000 相似文献
9.
10.
大数据监控措施即通过大规模、系统化地收集、存储、处理和控制数据而对社会进行的监控,目前已经在侦查中被运用。因此有必要在研究大数据监控对公民权利的影响的基础上,研究如何规制大数据监控的运用。大数据监控可能会侵害公民的隐私权、个人数据权、通信自由权、表达自由权、财产权等权利,其中最有可能被侵害的是隐私权,所以也是我国刑事诉讼中最需要关注的一项权利。大数据监控虽然针对不特定对象,且通常仅监控非内容性信息,但由于对不特定公民的个人信息数据构成现实的威胁,所以仍可能会侵害隐私权。在现代社会,公民将个人信息数据提交给第三方不意味着就放弃了对个人信息数据的权利,要根据侦查机关获取公民个人信息数据的不同情形而判断是否构成对隐私权的侵害。即便公民身处公共场所,或在网络公共领域进行表达、交流,也仍对其中部分信息享有隐私权;而且对于公民在公共场所或网络公共领域所从事的那些不具有合理隐私期待的活动,如果进行长期、密集的监控,也可能会侵害公民隐私权。大数据监控具有侵权的长期性、秘密性、技术性、面广但度轻等特征。对大数据监控进行规制应以《刑事诉讼法》为主体,并辅以其他法律的规制;应当对目前《刑事诉讼法》中的技术侦查制度和立案制度进行改革;对各类大数据监控的法律规制应遵循比例原则,根据其在侦查中的具体作用、监控的对象、内容而进行宽严有别的规制。 相似文献