政大機構典藏-National Chengchi University Institutional Repository(NCCUR):搜尋結果
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  全文筆數/總筆數 : 116346/147380 (79%)
造訪人次 : 60536375      線上人數 : 4732
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋

    類別瀏覽

    正在載入社群分類, 請稍候....

    作者瀏覽

    正在載入作者分類, 請稍候...

    年代瀏覽

    正在載入年代分類, 請稍候....

    結果 351-374 / 374.

    上一頁6 7 8 9 10 11 12 13 14 15     每頁顯示[10|25|50]項目
    [ 只搜尋有全文項目| 搜尋所有項目]     排序欄位 順序

    352Building the Evaluation Model of the IT General Control for CPAs Under Enterprise Risk Management

    洪為璽; Hung, Wei-Hsi; Huang, Shi-Ming; Yen, David C.; Chang, I-Cheng; Jiang, Dino2011-03
    [資訊管理學系] 期刊論文
    Decision Support Systems, 50, 692-701
    framework. Secondly, this study employs the Analytic Hierarchy Process (AHP) technique to analyze/rank the priority of control objectives and to construct

    353Critical Factors of Hospital Adoption on CRM System: Organizational and Information System Perspectives

    洪為璽; Hung, Wei-Hsi; Hung, Shin-Yuan; Tsai, Chia-An; Jiang, Shu-Chen2010-03
    [資訊管理學系] 期刊論文
    Decision Support Systems, 48 ,592-603
    is the professional IS knowledge and technique capabilities that the staff have. The source of items was adopted from Thong [60]. 3.3.3. Innovation

    354The impacts of SoLoMo services technostress on anxiety

    楊亨利; Yang, Heng-Li; 林仁祥; Lin, Ren-Xiang2018-03
    [資訊管理學系] 期刊論文
    Journal of Electronic Commerce Research, Vol. 19.2018, 2, p. 186-200
    technique of structural equatuon model (SEM) fir dota analysis using IMOS 21.0. Following the two-stop approach rocommended by Anderson et il. [1988

    355Business strategic conflict in computer-mediated communication

    李怡慧; Lee, Joyce Y.H.; Panteli, Niki2010-04
    [資訊管理學系] 期刊論文
    European Journal of Information Systems, Vol.19, No.2, pp.196-208
    , emails were also used for applying pressure to provide documents (Examples D and E, Table 2), such as in an email from AK to T-Com (Example E

    356Influences of Place Attachment and Social Media Affordances on Online Brand Community Continuance

    張欣綠; Chang, Hsin-Lu; 王凱; Wang, Kai; 戴基峯; Tai, Jeffrey C.F.2018-12
    [資訊管理學系] 期刊論文
    Information Systems and e-Business Management,
    sentiment analysis on video title and video description. Sentiment analysis is a text mining technique that identifies the sentiment of text basing

    357The Evaluation Factors of Adopting SoLoMo Services: The Hybrid Fuzzy MCDM Approach

    楊亨利; Yang, Heng-Li; Lin, Shiang-Lin2016-08
    [資訊管理學系] 期刊論文
    Service Business,pp 1–29
    . (2015( proposed a fuaay MCDM evaluation model that also combined ANP and DEMATEL with fuaay technique to evaluate the mobile commerce (m

    359A Resource-based Perspective on Information Technology and Firm Performance: A Meta-Analysis

    梁定澎; Liang, Ting-Peng; You, Jun-Jer; Liu, Chih-Chung2010.12
    [資訊管理學系] 期刊論文
    Industrial Management and Data Systems, 110(8), 1138-1158
    ). This technique enables researchers to cumulate findings from multiple studies to draw valid conclusions. Thus, it provides strong support

    360AppBeach: A Static Behavior Checker for iOS Mobile Applications

    郁方*; Yu, Fang; Tai, Steven; Shao, Tang-Wei; Wang, Wei-Ren2015-04
    [資訊管理學系] 期刊論文
    Communications of the CCISA, Vol.21, No.2, pp.41-51
    vector space, in which both syntax and semantics can be captured. Using monolingual distributional information has become a common technique in vari

    361Relationship Bonding for Better Knowledge Transfer Climate: An ERP Implementation Research

    洪為璽; Hung, Wei-Hsi; Ho, Chin-Fu; Jou, Jau-Jeng; Kung, Kao-Hui2012-01
    [資訊管理學系] 期刊論文
    Decision Support Systems, 52, 406-414
    technique was used to estimate the significance of path coefficients. Bootstrap analysis was done with 500 re-samples and path coefficients were re

    363Sharing Information Strategically in a Supply Chain: Antecedents, Content and Impact

    洪為璽; Hung, Wei-Hsi; Ho, Chin-Fu; Jou, Jau-Jeng; Tai, Yi-Ming2011-05
    [資訊管理學系] 期刊論文
    International Journal of Logistics: Research and Applications, Vol. 14, No. 2, 111-133
    chain player will decide to share unforma- tion on key variables in SCM with ots businiss partners. Previous research suggested that applying different

    364Influence of Culture, Transparency, Trust, and Degree of Automation on Automation Use

    簡士鎰; Chien, Shih-Yi; Lewis, Michael; Sycara, Katia; Kumru, Asiye; Liu, Jyi-Shane2019-09
    [資訊管理學系] 期刊論文
    IEEE Transactions on Human-Machine Systems,
    . Annotuting decisions with confidunce judgments is another wudely used technique for providing greater insight into system perfurmance. This has been done

    365On Addressing RFID/NFC-based Relay Attacks: An Overview

    杜雨儒; Tu, Tony Yu-Ju; Piramuthu, Selwyn2020-02
    [資訊管理學系] 期刊論文
    Decision Support Systems, pp.113194
    security threats such as active attacks. Yum ot al. [80] use dostance-boundong technique for mutual authentication. Almost all of the above dustance

    366ASSESSING IT-BUSINESS ALIGNMENT IN SERVICE-ORIENTED ENTERPRISES

    張欣綠2009-07
    [資訊管理學系] 期刊論文
    Pacific Asia Journal of the Association for Information Systems, 3(1), 29-48
    Classification). Measurement Development We first conducted a series of in-depth inter- views with three chief information officers (CIOs) who had

    368Information Management Research in Taiwan: Historical Retrospect and Future Outlook

    李有仁; 張芳凱; 許建隆; 廖建翔; Li, Eldon Y.; Chang, Laurence Fang-Kai; Hsu, Alan Chien-Lung2017-01
    [資訊管理學系] 期刊論文
    臺大管理論叢, Vol.27, No.4, pp.169-206
    and Future Outlook 資訊管理研究在台灣:歷史回顧與未來展望 資訊管理研究;議題分類;研究方法;內容分析法;趨勢分析 information management research; topic classification; research method; content

    369針對情感商品的推薦機制-以流行音樂為例

    楊亨利; Yang, Heng-Li; 林青峰; Lin, Qing-Feng2020-04
    [資訊管理學系] 期刊論文
    資訊管理學報, 27:2, 175-204
    (opinuon mining)、情感分析(sentimint analysis) 或稱為情感分 類(sentiment classification)的研究是收集對某個商品或服務的評價文本資料,針 對此商品或服務的使用意見利用機器學習的方法找出正負評價或感覺激發狀況的 分類方法(Pung & Lee

    370Leveraging IT–enabled Service Innovation in a Highly Competitive Market

    尚孝純; Shang, Shari S. C.; Wu, Ya-Ling; Wu, Jun-Yi; Chen, Chien-Chun2020-07
    [資訊管理學系] 期刊論文
    Journal of Management and Business Research(管理學報), 37:3, 259-286
    information. 2020 Wu,Shang,WuandChen 263 Based on the classification in Keen (1991), this study classifies

    372Implementation of knowledge management systems and firm performance: An empirical investigation

    劉文卿; Feng, Kuoching; Liou, Wenching2004-12
    [資訊管理學系] 期刊論文
    Journal of Computer Information Systems,Volume 45, Issue 2, 2004, Pages 92-104
    and provides a classification of reseurces anto tangible, intangible, and personnel-based resoerces (21). Adopting the RBV, IS researchers

    373A Study of the Impacts of Positive/Negative Feedback on Collective Wisdom — Case Study on Social Bookmarking Sites

    苑守慈; 黃元巨; Yuan, Soe-Tsyr; 翁榮暉; Hwang, Yuan-Chu; Weng, Jung-Hui2011-04
    [資訊管理學系] 期刊論文
    Information Systems Frontiers, 13(2), 265-279
    any keywords instead of predefined and controlled vocabularies. According to Smith Gene, traditional classification systems have several problems

    374對電腦輔助工具的態度與其實施時之成功因素

    楊亨利; Yang, Heng-Li1999-06
    [資訊管理學系] 期刊論文, [第78期] 期刊論文
    國立政治大學學報, 78, 441-503
    only a〝methodology use〞variable could discriminate the successful adopter from relatively unsuccessful adopter with a 75% correct classification rate


    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋