首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1496篇
  免费   41篇
  国内免费   24篇
教育   721篇
科学研究   455篇
各国文化   3篇
体育   120篇
综合类   56篇
文化理论   3篇
信息传播   203篇
  2023年   14篇
  2022年   29篇
  2021年   63篇
  2020年   62篇
  2019年   59篇
  2018年   60篇
  2017年   59篇
  2016年   53篇
  2015年   67篇
  2014年   89篇
  2013年   179篇
  2012年   87篇
  2011年   97篇
  2010年   76篇
  2009年   61篇
  2008年   77篇
  2007年   114篇
  2006年   78篇
  2005年   78篇
  2004年   53篇
  2003年   37篇
  2002年   33篇
  2001年   17篇
  2000年   12篇
  1999年   2篇
  1997年   1篇
  1993年   1篇
  1992年   2篇
  1957年   1篇
排序方式: 共有1561条查询结果,搜索用时 15 毫秒
81.
信用衍生品交易的博弈分析   总被引:4,自引:0,他引:4  
褚俊虹  陈金贤  胡喆华 《预测》2002,21(4):40-43,55
信用衍生品将信用风险从风险债券或贷款的持有者转移到第三方的金融合同,能有效地帮助银行化解信用风险。本文通过对信用衍生品交易基本模型博弈进行分析,发现信用衍生品能扩大交易双方得益,使双方处于交易的均衡状态。但是在引入交易成本和信息不对称因素后,可以看到这些因素会影响交易的效率,严重时甚至会导致交易失败。  相似文献   
82.
随着社会经济结构形式的不断演变,企业间分工越来越明确,各类企业出于对自身效率和成本的考虑,将非核心的各类业务实行外包。在部分企业研发外包成功的同时,也有诸多企业由于研发外包不当导致失败,如错误选择研发供应商而导致研发失败或者技术泄密等,或由于核心业务界定错误导致自身相对技术创新能力下降等,因此企业恰当地实施研发外包的首要任务就是正确地评价企业正在或即将外包的研发业务风险水平,并以其作为管理层对研发外包决策的参考依据。从企业研发外包风险的特点出发,选用模糊群决策理论的相关研究成果建立起由专家权重确立、风险因素和事件权重确立、评价意见集结公式等部分组成的,多专家共同对企业研发外包风险实施评价的模型,并通过案例运用,对所提出的评价模型的可靠性和简易型进行验证。  相似文献   
83.
吴继红 《软科学》2006,20(5):63-66
根据组织支持认知(Perce ived O rgan izational Support)和领导—成员交换(LeaderM ember Exchange)的研究,员工既与组织也与主管建立了社会交换关系。在借鉴国内外的相关理论的基础上,通过100对主管和员工的问卷调查验证了企业员工的组织支持认知对他们的任务绩效、组织公民行为和组织承诺有正向的影响;而企业员工的领导—成员交换认知对他们的组织公民行为有正向的影响。  相似文献   
84.
中国金融风险的制度性分析   总被引:2,自引:0,他引:2  
原波 《软科学》2003,17(1):14-17
我国的金融风险分为市场经济条件下产生的风险及制度转化、摩擦、错位风险。规避风险必须分析金融风险产生的原因。中国当前的金融风险有很深刻的制度性。  相似文献   
85.
Recently, there has been a heavy debate in the US about the government’s use of data mining in its fight against terrorism. Privacy concerns in fact led the Congress to terminate the funding of TIA, a program for advanced information technology to be used in the combat of terrorism. The arguments put forward in this debate, more specifically those found in the main report and minority report by the TAPAC established by the Secretary of Defense to examine the TIA issue, will be analysed to trace the deeper roots of this controversy. This analysis will in turn be used as a test case to examine the adequacy of the usual theoretical frameworks for these kinds of issues, in particular the notion of privacy. Whereas the dominant theoretical framing of the notion of privacy turns around access to information, most of the core arguments in the debate do not fit in this kind of framework. The basic disagreements in the controversy are not about mere access, they involve both access and use. Furthermore, whereas the issue of access by itself refers to a more or less static situation, the real disagreements much more concern the organisational dynamics of the use of information, the mechanisms in the organisation that control these dynamics, and the awareness present within the organisation of the ‘social risks’ these dynamics represent. The bottom line question is whether the assessment of these gives sufficient reason for trust.  相似文献   
86.
专利风险评价已经成为战略性新兴企业风险管理和提升核心竞争力的关键。通过对我国战略性新兴企业专利风险影响因素分析和系统归纳,基于专利形成和运用过程设计战略性新兴企业专利风险评价指标体系,并结合典型实例进行企业专利风险评价应用研究。旨在为我国战略性新兴企业专利评价和管理提供借鉴和参考。  相似文献   
87.
Recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other. As the technical standards and communication protocols for VSC technologies are still being developed, certain ethical implications of these new information technologies emerge: Coupled with the predicted safety benefits of VSC applications is a potential rise in the ability to surveil a driver engaging in her everyday activities on the public roads. This paper will explore how the introduction of VSC technologies might disrupt the “contextual integrity” of personal information flows in the context of highway travel and threaten one’s “privacy in public.” Since VSC technologies and their related protocols and standards are still in the developmental stage, the paper will conclude by revealing how close attention to the ethical implications of the remaining design decisions can inform and guide designers of VSC technologies to create innovate safety applications that increase public safety, but without compromising the value of one’s privacy in public. This work was supported by the National Science Foundation PORTIA Grant No. CNS-0331542, and could not have been completed without the valuable guidance of Prof. Helen Nissenbaum (New York University) and Prof. Dan Boneh (Stanford University). I am grateful to many other colleagues who generously contributed to this work with excellent comments and suggestions, including Emily Clark and Steve Tengler at the VSCC, and Sam Howard-Spink, Joseph Reagle and Tim Weber at New York University. Drafts were further sharpened through opportunities to present at colloquia and conferences sponsored by New York University’s Department of Culture & Communication, the American Association for the Advancement of Science, the Society for Philosophy and Technology, and Computer Ethics: Philosophical Enquiry.  相似文献   
88.
Radio Frequency Identification (RFID) systems identify and track objects, animals and, in principle, people. The ability to gather information obtained by tracking consumer goods, government documents, monetary transactions and human beings raises a number of interesting and important privacy issues. Moreover, RFID systems pose an ensemble of other ethical challenges related to appropriate uses and users of such systems. This paper reviews a number of RFID applications with the intention of identifying the technology’s benefits and possible misuses. We offer an overview and discussion of the most important ethical issues concerning RFID, and describes and examine some methods of protecting privacy. Norman G. Einspruch serves as a consultant to several high-technology companies, one of which is in the RFID components and systems business.  相似文献   
89.
中国、日本、美国的图书馆均对读者隐私权进行了保护,但在保护的程度和方法上差异明显。中国图书馆有必要在学习日本、美国先进管理经验的基础上,根据本国实际情况,依据宪法和法律制定出完善的行业管理规则,建立恰当的服务体系,充分培育隐私权保护意识,让读者隐私权的保护能够真正得以实现。参考文献7。  相似文献   
90.
在当前的数字参考咨询服务中,用户隐私权的保护El益得到重视。在概括隐私权内涵及其特点的基础上,对数字参考咨询服务中涉及用户隐私的几个方面进行了分析,探讨了加强用户隐私权保护的相应对策。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号