首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   27篇
  免费   1篇
教育   13篇
科学研究   8篇
各国文化   2篇
体育   1篇
信息传播   4篇
  2020年   1篇
  2019年   1篇
  2017年   2篇
  2016年   2篇
  2015年   1篇
  2014年   1篇
  2013年   4篇
  2012年   1篇
  2011年   3篇
  2010年   1篇
  2009年   1篇
  2008年   2篇
  2007年   4篇
  2006年   1篇
  2005年   1篇
  2003年   1篇
  1999年   1篇
排序方式: 共有28条查询结果,搜索用时 187 毫秒
21.
Guided by Communication Privacy Management (CPM), the goal of the current study was to examine parental infidelity and to learn what, if any, rules were enacted by participants to either provide access to or protect the information of their parent's infidelity. Rules used by participants to manage this information inside their family were labeled as internal, while rules used to manage this information outside their family were labeled as external. Participants included 13 adult children whose still married parents' relationship involved infidelity. Results indicated that participants created protection rules including two internal (maintenance and cultural) rules and one external (protecting the family from outside scrutiny) rule. Five access rules (context, sex, age, physical environment, and code terms), all internal, were also identified. The results of this study highlight the usefulness of CPM when examining how the knowledge of a parent's infidelity is managed by their children.  相似文献   
22.
在介绍国际工程项目管理定义的基础上,对项目进度计划的4种方法进行了分析,并以柏马公路项目为例,分析了CPM进度计划在大型国际工程项目中的应用.  相似文献   
23.
A growing number of Americans are living with chronic health conditions that require informal, ongoing care from family members who are also in the paid labor force. In this exploratory study, communication privacy management is used to make sense of chronic caregiving (N = 48–64) and noncaregiving (N = 174–178) employees’ disclosure preferences, intentions, and behaviors in the workplace. We find that workers in general anticipate that they would disclose to many individuals at work about their caregiving, but employees actually disclose much less information to far fewer people at work when they occupy the chronic caregiver role. For chronic caregivers, positive perceptions about coworker supportiveness predict increased disclosure behaviors. Finally, future research directions as employers, workers, and policy makers prepare for the complex challenges associated with negotiating paid work and unpaid chronic caregiving are provided.  相似文献   
24.
企业在项目运营中如何科学管理,取得更好效益,是管理者必须重视的问题,企业项目管理,运用CPM关键路径法进行系统分析研究,可以找出关键工作路线和管理的关键点,提高管理工作效率。  相似文献   
25.
基于改进CRITIC—CPM的科技奖励评价模型   总被引:1,自引:0,他引:1  
针对科技奖励评价问题的特点,运用变异系数改进了CRITIC法,并将专家信度系数、聚类分析法等融入突变级数法,设计出基于改进CRITIC—CPM的科技奖励评价模型。设计出的模型试图通过两次降维运算来实现对评审项目的科学评价,极大限度地排除人为因素的干扰,使得评价结果更趋科学合理。  相似文献   
26.
倪洁 《考试周刊》2010,(33):164-165
工期优化过程中主要问题是初始网络计划关键线路的判定及压缩过程中新关键路线的判定。本文针对现有方法计算量大、涉及概念多、理解不便的缺点,在借鉴Dijkstra算法的基础上提出了一种新方法,给出关键线路的判定和压缩过程中新关键路线判定的原理和步骤,最后结合算例加以说明。  相似文献   
27.
文章介绍了CPM1A型PLC在运输小车控制中的应用,对运输小车的控制功能及其实现的方法进行了较为详细的描述。  相似文献   
28.
Despite mobile applications being at the frontier of mobile computation technologies, security issues pose a threat to their adoption and diffusion. Recent studies suggest that security violations could be mitigated through improved security behaviors and attitudes, not just through better technologies. Existing literature on behavioral security suggests that one of the main predictors of users’ perceptions of security is their perceived privacy concerns. Using communication privacy management theory (CPM), this study examines the effects of privacy-related perceptions, such as privacy risk and the effectiveness of privacy policies, on the security perceptions of mobile app users. To empirically test the proposed theoretical model, two survey studies were conducted using mobile apps requesting less sensitive information (n = 487) and more sensitive information (n = 559). The findings show that the perceived privacy risk negatively influences the perceived security of the mobile apps; the perceived effectiveness of a privacy policy positively influences user perceptions of mobile app security; and perceived privacy awareness moderates the effect of perceived privacy risk on the perceived security of mobile apps. The results also suggest that users have different privacy-security perceptions based on the information sensitivity of the mobile apps. Theoretical and practical implications are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号