全文获取类型
收费全文 | 107篇 |
免费 | 2篇 |
国内免费 | 1篇 |
专业分类
化学工业 | 13篇 |
建筑科学 | 2篇 |
矿业工程 | 1篇 |
轻工业 | 1篇 |
石油天然气 | 3篇 |
无线电 | 7篇 |
一般工业技术 | 8篇 |
冶金工业 | 50篇 |
自动化技术 | 25篇 |
出版年
2022年 | 2篇 |
2020年 | 2篇 |
2018年 | 1篇 |
2017年 | 1篇 |
2016年 | 2篇 |
2015年 | 1篇 |
2014年 | 4篇 |
2013年 | 1篇 |
2012年 | 3篇 |
2011年 | 6篇 |
2010年 | 7篇 |
2009年 | 10篇 |
2008年 | 6篇 |
2007年 | 3篇 |
2006年 | 2篇 |
2005年 | 3篇 |
2004年 | 5篇 |
2003年 | 4篇 |
2002年 | 5篇 |
2001年 | 4篇 |
2000年 | 2篇 |
1999年 | 4篇 |
1998年 | 3篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1994年 | 3篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1990年 | 2篇 |
1989年 | 3篇 |
1988年 | 4篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1981年 | 1篇 |
排序方式: 共有110条查询结果,搜索用时 15 毫秒
1.
Predd Joel Pfleeger Shari Lawrence Hunker Jeffrey Bulford Carla 《Security & Privacy, IEEE》2008,6(4):66-70
This column goes beyond previous insider analyses to identify a framework for a taxonomy of insider threats including both malicious and inadvertent actions by insiders that put organizations or their resources at some risk. The framework includes factors reflecting the organization, the individual, the information technology system, and the environment. 相似文献
2.
3.
Assessing and managing the benefits of enterprise systems: the business manager's perspective 总被引:2,自引:0,他引:2
This paper focuses on the benefits that organizations may achieve from their investment in enterprise systems (ES). It proposes an ES benefit framework for summarizing benefits in the years after ES implementation. Based on an analysis of the features of enterprise systems, on the literature on information technology (IT) value, on data from 233 enterprise systems vendor‐reported stories published on the Web and on interviews with managers of 34 organizations using ES, the framework provides a detailed list of benefits that have reportedly been acquired through ES implementation. This list of benefits is consolidated into five benefits dimensions: operational, managerial, strategic, IT infrastructure and organizational, and illustrated using perceived net benefit flow (PNBF) graphs. In a detailed example, the paper shows how the framework has been applied to the identification of benefits in a longitudinal case study of four organizations. 相似文献
4.
This work‐in‐process literature review gives an overview of recent insight in the incorporation of social media in risk and crisis communication. By marrying literature and examples of social media use with best practices in risk and crisis communication, this study demonstrates how communicators can embrace social media tools to better manage a risk or crisis. Best practices in risk and crisis communication are summarized, examples of social media tools used to manage risks and crises are expounded, and recommendations for practitioners are provided to incorporate social media tools in risk and crisis communication. 相似文献
5.
Simeon Keates Ray Adams Cathy Bodine Sara Czaja Wayne Gordon Peter Gregor Emily Hacker Vicki Hanson John Kemp Mark Laff Clayton Lewis Michael Pieper John Richards David Rose Anthony Savidis Greg Schultz Paul Snayd Shari Trewin Philip Varker 《Universal Access in the Information Society》2007,5(4):329-339
In October 2005, the IBM Human Ability and Accessibility Center and T.J. Watson Research Center hosted a symposium on “cognitive
and learning difficulties and how they affect access to IT systems”. The central premise of the symposium was the recognition
that cognitive and learning difficulties have a profound impact on a person’s ability to interact with information technology
(IT) systems, but that little support is currently being offered by those systems. By bringing together internationally renowned
experts from a variety of different, but complementary, research fields, the symposium aimed to provide a complete overview
of the issues related to this topic. This paper summarises the discussions and findings of the symposium. 相似文献
6.
This book warns readers about the proliferation of data capture and the degree to which we're tracked and traced on the Web. In ten heavily illustrated chapters, the author explains how our data are captured, retained, and shared (often for a price) with third parties. The author dedicates a chapter to ways of addressing the threat. He suggests methods for controlling cookies, diffusing or eliminating disclosures, encrypting important data, protecting a network address, and using policy as well as technical devices to minimize data capture and retention. 相似文献
7.
Wade Shari L.; Taylor H. Gerry; Walz Nicolay Chertkoff; Salisbury Shelia; Stancin Terry; Bernard Lori A.; Oberjohn Karen; Yeates Keith Owen 《Canadian Metallurgical Quarterly》2008,53(2):180
Objective: To understand how traumatic brain injury (TBI) affects parent-child interactions acutely following injury. Participants: Young children hospitalized for TBI (n = 80) and orthopedic injuries (OI; n = 113). Method: Raters coded videotaped interactions during free play and structured tasks for parental warmth/responsiveness and negativity and child warmth, behavior regulation, and cooperation. Raters also counted parental directives, critical/restricting statements, and scaffolds. Results: Parents of children with TBI exhibited less warm responsiveness and made more directive statements during a structured task than parents in the OI group. Children with TBI displayed less behavior regulation than children with OI. Parental warm responsiveness was more strongly related to child cooperativeness in the OI group than in the TBI group. Child behavior also mediated group differences in parental responsiveness and directiveness. TBI accounted for as much variance in parental behaviors as or more than did sociodemographic factors. Conclusion: TBI-related changes in child behavior may negatively influence parent-child interactions and disrupt the reciprocity between parent and child. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
8.
Greenberg Jeff; Pyszczynski Tom; Solomon Sheldon; Rosenblatt Abram; Veeder Mitchell; Kirkland Shari; Lyon Deborah 《Canadian Metallurgical Quarterly》1990,58(2):308
Three experiments were conducted to test the hypothesis, derived from terror management theory, that reminding people of their mortality increases attraction to those who consensually validate their beliefs and decreases attraction to those who threaten their beliefs. In Study 1, subjects with a Christian religious background were asked to form impressions of Christian and Jewish target persons. Before doing so, mortality was made salient to half of the subjects. In support of predictions, mortality salience led to more positive evaluations of the in-group member (the Christian) and more negative evaluations of the out-group member (the Jew). In Study 2, mortality salience led to especially negative evaluations of an attitudinally dissimilar other, but only among subjects high in authoritarianism. In Study 3, mortality salience led to especially positive reactions to someone who directly praised subjects' cultural worldviews and especially negative reactions to someone who criticized them. The implications of these findings for understanding in-group favoritism, prejudice, and intolerance of deviance are discussed. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
9.
Yeates Keith Owen; Taylor H. Gerry; Wade Shari L.; Drotar Dennis; Stancin Terry; Minich Nori 《Canadian Metallurgical Quarterly》2002,16(4):514
Longitudinal neuropsychological outcomes of traumatic brain injury (TBI) were investigated in 53 children with severe TBI, 56 children with moderate TBI, and 80 children with orthopedic injuries only. Neuropsychological functioning was assessed at baseline, at 6- and 12-month follow-ups, and at an extended follow-up (a mean of 4 years postinjury). Mixed model analyses revealed persistent neuropsychological sequelae of TBI that generally did not vary as a function of time postinjury. Some recovery occurred during the first year postinjury, but recovery reached a plateau after that time, and deficits were still apparent at the extended follow-up. Further recovery was uncommon after the first year postinjury. Family factors did not moderate neuropsychological outcomes, despite their demonstrated influence on behavior and academic achievement after childhood TBI. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献
10.
In the past half century, expert testimony has played an increasingly important role in American litigation. As the volume of expert testimony has grown, so have issues surrounding its admissibility into evidence. In the past decade, a trilogy of U.S. Supreme Court cases redefined the rules governing admissibility. This article reviews these cases and examines some of the assumptions about expert knowledge implicit in the opinions. It argues that the opinions ask judges to assume the role of scientific methodologists. Together, the 3 opinions reflect what Steven Cole calls a realist-constructivist view of science. Science is socially constructed both in the laboratory and in the wider community, but the construction is constrained by input from the empirical world. (PsycINFO Database Record (c) 2010 APA, all rights reserved) 相似文献