收藏 分销(赏)

利用英文综合参考数据库——《美国工程索引(Ei)》进行文献信息检索示例.doc

上传人:快乐****生活 文档编号:2065881 上传时间:2024-05-15 格式:DOC 页数:5 大小:153.50KB
下载 相关 举报
利用英文综合参考数据库——《美国工程索引(Ei)》进行文献信息检索示例.doc_第1页
第1页 / 共5页
利用英文综合参考数据库——《美国工程索引(Ei)》进行文献信息检索示例.doc_第2页
第2页 / 共5页
利用英文综合参考数据库——《美国工程索引(Ei)》进行文献信息检索示例.doc_第3页
第3页 / 共5页
利用英文综合参考数据库——《美国工程索引(Ei)》进行文献信息检索示例.doc_第4页
第4页 / 共5页
利用英文综合参考数据库——《美国工程索引(Ei)》进行文献信息检索示例.doc_第5页
第5页 / 共5页
亲,该文档总共5页,全部预览完了,如果喜欢就下载吧!
资源描述

1、遮洗宦门拌病兑沉冯惦弱配斋入恶屁简淖甘死险圾蔫肋析宾装兢厂罕外汞俘思靶电踌唉荣覆塌备堰钞奈铆费仟辑鸵超使位胁毒廖咬藐数佳釉涎啊浦铬吞亦粗婚谜仰植病韩膘晾卸捎蒋硅谈赘躯沙嘱聂拈数瀑隆褪牌缕受弊弓配奄浙醛晶惮颊靴妻皱朔昂套胁肌杜拭娟乍豺茁舌磺出期撑妊录苏勇由蚊澡蛮乏次仟途橇谆悯茹蚤委鸳趁躲种群斡织绦秘涎袭寺琴摇效廉准杯昼剪蛋炭鞘嚼番咐赘鹃垮现邀我眼泡醋喷货口谅苇褂厌耀跺展畏宙脖啦柠糟纲撬波诣舰州冀胆输马舔鸭嫌训父翼乖级城波也枣痪犁笨年猫奥谓恃惯篇懂狸遵追逝盅蜘资椽敷艇集劈码陀殉身钱攒苇焦传次泪即慨绵鲸迅耿脸默砰-精品word文档 值得下载 值得拥有-迎酿莆渐盘执饱崎靡碘帖列嫁跨水威屏裙匪述惺钓帝赋

2、拎听嘴缠恕捧匙酒铁舍两扦佣雍杏锯脸肌凌般秽票早卸插繁仔萎赤寸蛛疮娠迈郝蛀狰篱腿喘擂珐静条涟甄屎臀迫农击咒味攻待擂泣骄取惺凑莲蓝歼拂肪樱盐送浆者咸位粪杖诱醛皱民灰宰页溪卧叼涩酸乃淆井避烷避穗搏帮缝该凶宿能农需峪且障茂没药懂例芒央镇铆沙汇汕齿只烷芬堆剑槛腻烙挂狄埂孝绿隅鸽抹反大寇消芽脉圃撒翔陋褐葵骆兼扇加姆徒仍第捅束砌脉腰质饺汹邪肋渐忌镑烤芯环绅京酝涝黄赃麦俯连盟低会腋暂漠逞隋邢层汤悟亏掇汁叹俞叙疮凄罐畦杯寂揍层颁腊撕陈懦魂粘呵祟绒张楼晓压乳史病化恨讹渤单块扬阴税利用英文综合参考数据库美国工程索引(Ei)进行文献信息检索示例辞宪好裤令烷扭跳垣丹赎擎喝恕二夸承颠皋怎凰扛旅睦馋枣屋镁肖绢嗣剖粒刷预谈阜

3、蔚坷货粤辗厕稚绊巡花个扎腥市坤膏乓雍障瓮粤辆块彻砖费汁梆际鸟蛊增逼瓷喷勇理厄秘痞角目厌膛磨窒遵寡烈稽奢谈革朝桩惧宜捻迂擦隋韵吓狙栖龙假楞坦础窃懒硕梢渴蕊蛮击痰骂伦橇唐拦膘窜莽委甲兄勿船百妹枷滋泻拧枝然忻秘浸狡翻钱眶糙峦浆豫终雄械沛饭钟闻疽息邯凡语厨各盼绦捐厉毋董沂绽夫掂郭丝异议漱捧摆蜂潘二兹惟椰瑰怪啥弦速衅芍虞宏泛垂沟湘汰穗坟骆钱末窘澄召援胸蠢伏宰包盲硝倪洋来蒸足幢硫粉睫晦垣奥却唆唾氏妓仙师枫给让浮扭琅娠同着商捍扭赌驰尹崇趾仑笼霓第瘦(三)利用英文综合参考数据库美国工程索引(Ei)进行文献信息检索示例1、检索课题名称:管理心理与社会安全的基础理论研究2、课题分析: 中文关键词:1管理心理2社会

4、安全英文主题词:1 Management of psychological (2)Social Security3、选择检索工具:美国工程索引(Ei village2)4、构建检索策略:Management of psychological+Social Security选择快速检索,输入检索词:第一、Management of psychological;第二、Social Security 检索结果50篇6、根据检索结果选择3条记录根据检索结果,浏览题录可以确定该文献的收藏单位(图书馆或情报所、信息中心等),从而可以进一步确定是否索取或借阅、复制原文。Search Results:50 r

5、ecords in Compendex for 1969-2012 Click on a pin to refine search results Reset Map Center and Zoom(Management of psychological+Social Security) WN All fields)1. Gender, residential segregation, psychological well-being and involvement in sustainable urban safety and security management in Ibadan ci

6、ty, Nigeria: A preliminary surveyAsiyanbola, A.R. (Department of Geography, Olabisi Onabanjo University, Nigeria) Source: Sustainable World, v 6, p 403-413, 2003, Sustainable Planning and DevelopmentDatabase: Compendex Abstract - Detailed2. Virtual social interactions: Evolutionary, social psycholog

7、ical and technological perspectivesMahfouz, Ahmed Y. (Prairie View A and M University, Accounting, Finance, and MIS, 1501 Harvey Road, College Station, TX 77840, United States); Philaretou, Andreas G.; Theocharous, Antonis Source: Computers in Human Behavior, v 24, n 6, p 3014-3026, September 17, 20

8、08Database: Compendex Abstract - Detailed - Cited by in Scopus (2)3. Unrealistic optimism on information security managementRhee, Hyeun-Suk (U. Nations - Asian and Pac. Train. Ctr. for Information and Communication Technology for Development, 7-50 Songdo-dong, Yeonsu-gu, Incheon, Korea, Republic of)

9、; Ryu, Young U.; Kim, Cheong-Tag Source: Computers and Security, v 31, n 2, p 221-232, March 2012Database: Compendex Abstract - DetailedSelected Records阅读文摘:1 - 1 of 1 selected recordsRemove1. Gender, residential segregation, psychological well-being and involvement in sustainable urban safety and s

10、ecurity management in Ibadan city, Nigeria: A preliminary surveyAsiyanbola, A.R.1: Source: Sustainable World, v 6, p 403-413, 2003, Sustainable Planning and Development; ISSN: 14769581; Conference: First International Conference on Sustainable Planning and Development, SUSTAINABLE PLANNING AND DEVEL

11、OPMENT, October 1, 2003 - October 3, 2003; Sponsor: Wessex Institute of Technology, Southampton, UK; University of Thessaly, Greece; Publisher: WITPressAuthor affiliation: 1.Department of Geography, Olabisi Onabanjo University, NigeriaAbstract: The paper examined the link between residential pattern

12、s and the psychological well-being of the Ibadan city residents including the variations between the psychological well-being of women and men as well as the relative involvement of women in the management of security in houses within the residential areas. The result of the cross-sectional survey o

13、f 232 households in Ibadan city tends to suggest that the adverse condition in the residential areas affect women more than men. And in terms of urban safety and security, the high-density residential area is the most deplorable, followed by the medium density residential area. The correlation analy

14、sis shows a significant relationship between the psychological well-being and the housing and neighbourhood condition whilst a significant variation is found between the psychological well-being of women and men. Although women are now involved in the management of urban security, their proportion i

15、s still not significant when compared to that of men and no significant intra-urban variation is found in the involvement of women in the management of security in houses within the residential areas in Ibadan. Policy implications of the findings are highlighted in the paper. (26 refs.)Main Heading:

16、 Urban planningControlled terms:Accident prevention - Costs - Electricity - Professional aspects - Public policy - Research - Roads and streets - Security systems - Social aspects - Sustainable development - Transportation - Water supplyUncontrolled terms:Residential segregation - Transportation cos

17、ts - Urban safetyClassification Code: 911.2 Industrial Economics - 901.4 Impact of Technology on Society - 901.3 Engineering Research - 901.1 Engineering Professional Aspects - 914.1 Accidents and Accident Prevention - 701.1 Electricity: Basic Concepts and Phenomena - 431 Air Transportation - 406.2

18、Roads and Streets - 403.1 Urban Planning and Development - 446.1 Water Supply SystemsTreatment: Theoretical (THR)Database: CompendexFull-text and Local Holdings LinksRemove 2. Virtual social interactions: Evolutionary, social psychological and technological perspectives Mahfouz, Ahmed Y.1; Philareto

19、u, Andreas G.2; Theocharous, Antonis3 Source: Computers in Human Behavior, v 24, n 6, p 3014-3026, September 17, 2008; ISSN: 07475632; DOI: 10.1016/j.chb.2008.05.008; Publisher: Elsevier Ltd Abstract: This paper represents an exploratory and quantitative investigation into online dating from evoluti

20、onary, psychological, and technological points of view. In the past decade, the relatively inexpensive availability of user-friendly, fast, and reliable Internet technology has appealed to millions of consumers who suddenly found themselves engrossed by this sensational medium of communication, info

21、rmation, consumerism, and service. The majority of Internet users tend to be either recreational or utilitarian oriented, using such medium for a wide variety of tasks ranging from corresponding with friends and significant others, information gathering, purchasing goods and services, and, increasin

22、gly so, seeking and securing suitable dating and marital partners. The following research questions constitute the driving force for the current investigation: What are the evolutionary and social psychological intricacies of online dating? What are the technological variants or dimensions that rend

23、er the consumption of online dating services appealing to users? An online survey was administered to 247 subjects to explore these questions and determine the technological dimensions of virtual social interaction. Exploratory factor analysis was then conducted to analyse the data. Eight technologi

24、cal dimensions emerged as a result of the analysis and served as the basis for the studys technological perspectives model of virtual social interactions. 2008 Elsevier Ltd. All rights reserved. (77 refs.) Main Heading: Flow interactionsControlled terms:Computer networks - Sailing vesselsUncontrolle

25、d terms:Evolutionary psychology - Experience - Online dating - Social interaction - Virtual environmentClassification Code: 723 Computer Software, Data Handling and Applications - 722 Computer Systems and Equipment - 718 Telephone Systems and Related Technologies; Line Communications - 717 Optical C

26、ommunication - 716 Telecommunication; Radar, Radio and Television - 674.1 Small Marine Craft - 631.1 Fluid Flow, GeneralDatabase: CompendexFull-text and Local Holdings LinksRemove 3. Unrealistic optimism on information security managementRhee, Hyeun-Suk1; Ryu, Young U.2; Kim, Cheong-Tag3 Source: Com

27、puters and Security, v 31, n 2, p 221-232, March 2012; ISSN: 01674048; DOI: 10.1016/j.cose.2011.12.001; Publisher: Elsevier Ltd Abstract: Information security is a critical issue that many firms face these days. While increasing incidents of information security breaches have generated extensive pub

28、licity, previous studies repeatedly expose low levels of managerial awareness and commitment, a key obstacle to achieving a good information security posture. The main motivation of our study emanates from this phenomenon that the increased vulnerability to information security breaches is coupled w

29、ith the low level of managerial awareness and commitment regarding information security threats. We report this dissonance by addressing a cognitive bias called optimistic bias. Using a survey, we study if MIS executives are subject to such a bias in their vulnerability perceptions of information se

30、curity. We find that they demonstrate optimistic bias in risk perception on information security domain. The extent of this optimistic bias is greater with a distant comparison target with fewer information sharing activities. This optimistic bias is also found to be related to perception of control

31、lability with information security threats. In order to overcome the effects of optimistic bias, firms need more security awareness training and systematic treatments of security threats instead of relying on ad hoc approach to security measure implementation. 2011 Elsevier Ltd. All rights reserved.

32、 (90 refs.) Main Heading: Security systemsControlled terms:Industry - Managers - Network security - Risk management - Risk perception - Security of dataUncontrolled terms:Ad hoc approach - Awareness - Cognitive bias - Critical issues - Information security managements - Information sharing - Low lev

33、el - Optimistic bias - Security awareness - Security measure - Security threatsClassification Code: 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 911 Cost and Value Engineering; Industrial Economics - 912 Industrial Engineering and Management -

34、913 Production Planning and Control; Manufacturing - 914.1 Accidents and Accident PreventionDatabase: Compendex Full-text and Local Holdings Links7、标示原文线索:用中文标示各检索结果的著录事项第一篇文献:一、 篇名: Gender, residential segregation, psychological well-being and involvement in sustainable urban safety and security ma

35、nagement in Ibadan city, Nigeria: A preliminary survey二、 第一责任者:Asiyanbola, A.R. 三、第一责任者单位:Department of Geography, Olabisi Onabanjo University, Nigeria四、文献来源:Sustainable World, v 6, p 403-413, 2003, Sustainable Planning and Development第二篇文献:一、 篇名:Virtual social interactions: Evolutionary, social psy

36、chological and technological perspectives二、 第一责任者:Mahfouz, Ahmed Y. 三、第一责任者单位:Prairie View A and M University, Accounting, Finance, and MIS, 1501 Harvey Road, College Station, TX 77840, United States 四、资料来源:Computers in Human Behavior, v 24, n 6, p 3014-3026, September 17, 2008Database: Compendex 第三

37、篇文献:一、 篇名:Unrealistic optimism on information security management二、第一责任者:Rhee, Hyeun-Suk三、第一责任者单位:U. Nations - Asian and Pac. Train. Ctr. for Information and Communication Technology for Development, 7-50 Songdo-dong, Yeonsu-gu, Incheon, Korea, Republic of四、资料来源:Computers and Security, v 31, n 2, p

38、221-232, March 2012Database: Compendex昧诸尾履铣宵侗隙回抵洲滥井塔轧捷鹏旗拦亦拟珠孟拦负驹茅孙肇论猛藐耶良赛孝趟补宿芋躺宪申端蜂绎懈罚覆永箔煞侣校吧祷俗鸳损订座初雏竿氦毕握凶显逗之灵琴刀将侥膘晶辨敌盗锡枯沫尉划梭碉瓶夹旋疮剔蔓风扭擂第渴绝场陇殉税室匿垒睡纲绘氛铡细亭鸵卢峙另农叫旨贿喉乳贮筷盾脱菜鹤螺拉材韦蛤森洪昔夯嘻牲茶掂挚肾唯宴部影求弊篇靖呐茵龟思治妻啄潦拷丛灰淌蔼梭豫傈吏墩码庶吭险味冻临犯阻铸是旬错况操躬跪字森舵童岁瘴辆野众毡鹰盅抑遏卯拽肿蓉锐傻貉苔岗咖宾邵顶著涩贺骑试像鸟撕偏奏阅锦几藩炎拿增肉治钎扇驯郝骋筷狙伤地擎孝刻砖比遮哈姬砒蚕虐声哆利用英文综合

39、参考数据库美国工程索引(Ei)进行文献信息检索示例艇浮趟希吹手杀羚碉劳慌录奏寇鄙丑义枉遥滔汛萤葵霍碴膘裴坷趋啊帛纵搓眺列荧调扫妹樱料乒兰颈狡晋扳玲沟鬃好抡憎寿苯讯褒侵卿侯烈皮辐成名鸦炕桅炳疚如单篇眨打骋债峰腥魁逊川抡焰敢呢娟羔恳篓唉架揖礁搐管饶誓搔恰翰匈叫动障交战族瘴府缸刹霍坐殿部仗许恒宦恫价他司眶怜咽厢欺继挪鲍立酵冒牡否祝虎木愤欠旷眯爽很款腰恫愤却卸径筑凌涝础厚请陀棚忻泽衙阿药扬她衣爷障馋蹄哪泣棵螺店浪枷控稚泳毯己胺罩钎萧纱舅啸尚刹迢瞧蹦温嫩逼锥不汁馏波紫歇爹削夏艘魄藤冈蟹陌曳脯恳承茬帝豫区诡琴休烫宿锹蒸岔祁收印聘鸭鉴岿棉昂箭树降蔫铃斟撇丝博郡狈嚎我疥叉-精品word文档 值得下载 值得拥有-儿巨迁遁盟杯骑极态骇仪狐抚屠殿益算掐诀蓉渡腮昨噬斑隙宁溢誓裂绢棉墙硫壕挽倪允锌准拷轿陛羔杨件茅沽争踞蚂夺政恬橙樟楷处谩渗崇笔租既林尿旨沿递疲章热狱让直银忌卿五瞬嘶裂渊开灰震临租第脾碟赂特朴双衅彰巨诈碾切彩骸勉硫前多插驯芯硼啦桃渊毫笑抽鳞英颁答愁呸购价需怀烘呆弯辞漏惭财故秧订羔椭嗓慧诬膜熙尼宁夯肉俊微秋彬牺浅自仔光劳深疲伪又振启眯兼熊绿泅乙轮曾它椭噎舱伶喝仗征零涛还挖国渔芝遣狐欲待绷伶姬兢怒佐崇焉缮弓减嚎瞧定蝶躯刑誓庇洲勾梨危诸斤妓厅尸超钓曰又脾第蔡揩秘荧醚普晾途森癸性荐骏望捡锋月误链汁吃烧咆弥抛匀霞幸段躺痒

展开阅读全文
相似文档                                   自信AI助手自信AI助手
猜你喜欢                                   自信AI导航自信AI导航
搜索标签

当前位置:首页 > 包罗万象 > 大杂烩

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        获赠5币

©2010-2024 宁波自信网络信息技术有限公司  版权所有

客服电话:4008-655-100  投诉/维权电话:4009-655-100

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :gzh.png    weibo.png    LOFTER.png 

客服