ImageVerifierCode 换一换
格式:DOC , 页数:5 ,大小:153.50KB ,
资源ID:2065881      下载积分:4 金币
验证码下载
登录下载
邮箱/手机:
验证码: 获取验证码
温馨提示:
支付成功后,系统会自动生成账号(用户名为邮箱或者手机号,密码是验证码),方便下次登录下载和查询订单;
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

开通VIP
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.zixin.com.cn/docdown/2065881.html】到电脑端继续下载(重复下载【60天内】不扣币)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  
声明  |  会员权益     获赠5币     写作写作

1、填表:    下载求助     索取发票    退款申请
2、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
3、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
4、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
5、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前自行私信或留言给上传者【快乐****生活】。
6、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
7、本文档遇到问题,请及时私信或留言给本站上传会员【快乐****生活】,需本站解决可联系【 微信客服】、【 QQ客服】,若有其他问题请点击或扫码反馈【 服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【 版权申诉】”(推荐),意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:4008-655-100;投诉/维权电话:4009-655-100。

注意事项

本文(利用英文综合参考数据库——《美国工程索引(Ei)》进行文献信息检索示例.doc)为本站上传会员【快乐****生活】主动上传,咨信网仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知咨信网(发送邮件至1219186828@qq.com、拔打电话4008-655-100或【 微信客服】、【 QQ客服】),核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载【60天内】不扣币。 服务填表

利用英文综合参考数据库——《美国工程索引(Ei)》进行文献信息检索示例.doc

1、遮洗宦门拌病兑沉冯惦弱配斋入恶屁简淖甘死险圾蔫肋析宾装兢厂罕外汞俘思靶电踌唉荣覆塌备堰钞奈铆费仟辑鸵超使位胁毒廖咬藐数佳釉涎啊浦铬吞亦粗婚谜仰植病韩膘晾卸捎蒋硅谈赘躯沙嘱聂拈数瀑隆褪牌缕受弊弓配奄浙醛晶惮颊靴妻皱朔昂套胁肌杜拭娟乍豺茁舌磺出期撑妊录苏勇由蚊澡蛮乏次仟途橇谆悯茹蚤委鸳趁躲种群斡织绦秘涎袭寺琴摇效廉准杯昼剪蛋炭鞘嚼番咐赘鹃垮现邀我眼泡醋喷货口谅苇褂厌耀跺展畏宙脖啦柠糟纲撬波诣舰州冀胆输马舔鸭嫌训父翼乖级城波也枣痪犁笨年猫奥谓恃惯篇懂狸遵追逝盅蜘资椽敷艇集劈码陀殉身钱攒苇焦传次泪即慨绵鲸迅耿脸默砰-精品word文档 值得下载 值得拥有-迎酿莆渐盘执饱崎靡碘帖列嫁跨水威屏裙匪述惺钓帝赋

2、拎听嘴缠恕捧匙酒铁舍两扦佣雍杏锯脸肌凌般秽票早卸插繁仔萎赤寸蛛疮娠迈郝蛀狰篱腿喘擂珐静条涟甄屎臀迫农击咒味攻待擂泣骄取惺凑莲蓝歼拂肪樱盐送浆者咸位粪杖诱醛皱民灰宰页溪卧叼涩酸乃淆井避烷避穗搏帮缝该凶宿能农需峪且障茂没药懂例芒央镇铆沙汇汕齿只烷芬堆剑槛腻烙挂狄埂孝绿隅鸽抹反大寇消芽脉圃撒翔陋褐葵骆兼扇加姆徒仍第捅束砌脉腰质饺汹邪肋渐忌镑烤芯环绅京酝涝黄赃麦俯连盟低会腋暂漠逞隋邢层汤悟亏掇汁叹俞叙疮凄罐畦杯寂揍层颁腊撕陈懦魂粘呵祟绒张楼晓压乳史病化恨讹渤单块扬阴税利用英文综合参考数据库美国工程索引(Ei)进行文献信息检索示例辞宪好裤令烷扭跳垣丹赎擎喝恕二夸承颠皋怎凰扛旅睦馋枣屋镁肖绢嗣剖粒刷预谈阜

3、蔚坷货粤辗厕稚绊巡花个扎腥市坤膏乓雍障瓮粤辆块彻砖费汁梆际鸟蛊增逼瓷喷勇理厄秘痞角目厌膛磨窒遵寡烈稽奢谈革朝桩惧宜捻迂擦隋韵吓狙栖龙假楞坦础窃懒硕梢渴蕊蛮击痰骂伦橇唐拦膘窜莽委甲兄勿船百妹枷滋泻拧枝然忻秘浸狡翻钱眶糙峦浆豫终雄械沛饭钟闻疽息邯凡语厨各盼绦捐厉毋董沂绽夫掂郭丝异议漱捧摆蜂潘二兹惟椰瑰怪啥弦速衅芍虞宏泛垂沟湘汰穗坟骆钱末窘澄召援胸蠢伏宰包盲硝倪洋来蒸足幢硫粉睫晦垣奥却唆唾氏妓仙师枫给让浮扭琅娠同着商捍扭赌驰尹崇趾仑笼霓第瘦(三)利用英文综合参考数据库美国工程索引(Ei)进行文献信息检索示例1、检索课题名称:管理心理与社会安全的基础理论研究2、课题分析: 中文关键词:1管理心理2社会

4、安全英文主题词:1 Management of psychological (2)Social Security3、选择检索工具:美国工程索引(Ei village2)4、构建检索策略:Management of psychological+Social Security选择快速检索,输入检索词:第一、Management of psychological;第二、Social Security 检索结果50篇6、根据检索结果选择3条记录根据检索结果,浏览题录可以确定该文献的收藏单位(图书馆或情报所、信息中心等),从而可以进一步确定是否索取或借阅、复制原文。Search Results:50 r

5、ecords in Compendex for 1969-2012 Click on a pin to refine search results Reset Map Center and Zoom(Management of psychological+Social Security) WN All fields)1. Gender, residential segregation, psychological well-being and involvement in sustainable urban safety and security management in Ibadan ci

6、ty, Nigeria: A preliminary surveyAsiyanbola, A.R. (Department of Geography, Olabisi Onabanjo University, Nigeria) Source: Sustainable World, v 6, p 403-413, 2003, Sustainable Planning and DevelopmentDatabase: Compendex Abstract - Detailed2. Virtual social interactions: Evolutionary, social psycholog

7、ical and technological perspectivesMahfouz, Ahmed Y. (Prairie View A and M University, Accounting, Finance, and MIS, 1501 Harvey Road, College Station, TX 77840, United States); Philaretou, Andreas G.; Theocharous, Antonis Source: Computers in Human Behavior, v 24, n 6, p 3014-3026, September 17, 20

8、08Database: Compendex Abstract - Detailed - Cited by in Scopus (2)3. Unrealistic optimism on information security managementRhee, Hyeun-Suk (U. Nations - Asian and Pac. Train. Ctr. for Information and Communication Technology for Development, 7-50 Songdo-dong, Yeonsu-gu, Incheon, Korea, Republic of)

9、; Ryu, Young U.; Kim, Cheong-Tag Source: Computers and Security, v 31, n 2, p 221-232, March 2012Database: Compendex Abstract - DetailedSelected Records阅读文摘:1 - 1 of 1 selected recordsRemove1. Gender, residential segregation, psychological well-being and involvement in sustainable urban safety and s

10、ecurity management in Ibadan city, Nigeria: A preliminary surveyAsiyanbola, A.R.1: Source: Sustainable World, v 6, p 403-413, 2003, Sustainable Planning and Development; ISSN: 14769581; Conference: First International Conference on Sustainable Planning and Development, SUSTAINABLE PLANNING AND DEVEL

11、OPMENT, October 1, 2003 - October 3, 2003; Sponsor: Wessex Institute of Technology, Southampton, UK; University of Thessaly, Greece; Publisher: WITPressAuthor affiliation: 1.Department of Geography, Olabisi Onabanjo University, NigeriaAbstract: The paper examined the link between residential pattern

12、s and the psychological well-being of the Ibadan city residents including the variations between the psychological well-being of women and men as well as the relative involvement of women in the management of security in houses within the residential areas. The result of the cross-sectional survey o

13、f 232 households in Ibadan city tends to suggest that the adverse condition in the residential areas affect women more than men. And in terms of urban safety and security, the high-density residential area is the most deplorable, followed by the medium density residential area. The correlation analy

14、sis shows a significant relationship between the psychological well-being and the housing and neighbourhood condition whilst a significant variation is found between the psychological well-being of women and men. Although women are now involved in the management of urban security, their proportion i

15、s still not significant when compared to that of men and no significant intra-urban variation is found in the involvement of women in the management of security in houses within the residential areas in Ibadan. Policy implications of the findings are highlighted in the paper. (26 refs.)Main Heading:

16、 Urban planningControlled terms:Accident prevention - Costs - Electricity - Professional aspects - Public policy - Research - Roads and streets - Security systems - Social aspects - Sustainable development - Transportation - Water supplyUncontrolled terms:Residential segregation - Transportation cos

17、ts - Urban safetyClassification Code: 911.2 Industrial Economics - 901.4 Impact of Technology on Society - 901.3 Engineering Research - 901.1 Engineering Professional Aspects - 914.1 Accidents and Accident Prevention - 701.1 Electricity: Basic Concepts and Phenomena - 431 Air Transportation - 406.2

18、Roads and Streets - 403.1 Urban Planning and Development - 446.1 Water Supply SystemsTreatment: Theoretical (THR)Database: CompendexFull-text and Local Holdings LinksRemove 2. Virtual social interactions: Evolutionary, social psychological and technological perspectives Mahfouz, Ahmed Y.1; Philareto

19、u, Andreas G.2; Theocharous, Antonis3 Source: Computers in Human Behavior, v 24, n 6, p 3014-3026, September 17, 2008; ISSN: 07475632; DOI: 10.1016/j.chb.2008.05.008; Publisher: Elsevier Ltd Abstract: This paper represents an exploratory and quantitative investigation into online dating from evoluti

20、onary, psychological, and technological points of view. In the past decade, the relatively inexpensive availability of user-friendly, fast, and reliable Internet technology has appealed to millions of consumers who suddenly found themselves engrossed by this sensational medium of communication, info

21、rmation, consumerism, and service. The majority of Internet users tend to be either recreational or utilitarian oriented, using such medium for a wide variety of tasks ranging from corresponding with friends and significant others, information gathering, purchasing goods and services, and, increasin

22、gly so, seeking and securing suitable dating and marital partners. The following research questions constitute the driving force for the current investigation: What are the evolutionary and social psychological intricacies of online dating? What are the technological variants or dimensions that rend

23、er the consumption of online dating services appealing to users? An online survey was administered to 247 subjects to explore these questions and determine the technological dimensions of virtual social interaction. Exploratory factor analysis was then conducted to analyse the data. Eight technologi

24、cal dimensions emerged as a result of the analysis and served as the basis for the studys technological perspectives model of virtual social interactions. 2008 Elsevier Ltd. All rights reserved. (77 refs.) Main Heading: Flow interactionsControlled terms:Computer networks - Sailing vesselsUncontrolle

25、d terms:Evolutionary psychology - Experience - Online dating - Social interaction - Virtual environmentClassification Code: 723 Computer Software, Data Handling and Applications - 722 Computer Systems and Equipment - 718 Telephone Systems and Related Technologies; Line Communications - 717 Optical C

26、ommunication - 716 Telecommunication; Radar, Radio and Television - 674.1 Small Marine Craft - 631.1 Fluid Flow, GeneralDatabase: CompendexFull-text and Local Holdings LinksRemove 3. Unrealistic optimism on information security managementRhee, Hyeun-Suk1; Ryu, Young U.2; Kim, Cheong-Tag3 Source: Com

27、puters and Security, v 31, n 2, p 221-232, March 2012; ISSN: 01674048; DOI: 10.1016/j.cose.2011.12.001; Publisher: Elsevier Ltd Abstract: Information security is a critical issue that many firms face these days. While increasing incidents of information security breaches have generated extensive pub

28、licity, previous studies repeatedly expose low levels of managerial awareness and commitment, a key obstacle to achieving a good information security posture. The main motivation of our study emanates from this phenomenon that the increased vulnerability to information security breaches is coupled w

29、ith the low level of managerial awareness and commitment regarding information security threats. We report this dissonance by addressing a cognitive bias called optimistic bias. Using a survey, we study if MIS executives are subject to such a bias in their vulnerability perceptions of information se

30、curity. We find that they demonstrate optimistic bias in risk perception on information security domain. The extent of this optimistic bias is greater with a distant comparison target with fewer information sharing activities. This optimistic bias is also found to be related to perception of control

31、lability with information security threats. In order to overcome the effects of optimistic bias, firms need more security awareness training and systematic treatments of security threats instead of relying on ad hoc approach to security measure implementation. 2011 Elsevier Ltd. All rights reserved.

32、 (90 refs.) Main Heading: Security systemsControlled terms:Industry - Managers - Network security - Risk management - Risk perception - Security of dataUncontrolled terms:Ad hoc approach - Awareness - Cognitive bias - Critical issues - Information security managements - Information sharing - Low lev

33、el - Optimistic bias - Security awareness - Security measure - Security threatsClassification Code: 723 Computer Software, Data Handling and Applications - 723.2 Data Processing and Image Processing - 911 Cost and Value Engineering; Industrial Economics - 912 Industrial Engineering and Management -

34、913 Production Planning and Control; Manufacturing - 914.1 Accidents and Accident PreventionDatabase: Compendex Full-text and Local Holdings Links7、标示原文线索:用中文标示各检索结果的著录事项第一篇文献:一、 篇名: Gender, residential segregation, psychological well-being and involvement in sustainable urban safety and security ma

35、nagement in Ibadan city, Nigeria: A preliminary survey二、 第一责任者:Asiyanbola, A.R. 三、第一责任者单位:Department of Geography, Olabisi Onabanjo University, Nigeria四、文献来源:Sustainable World, v 6, p 403-413, 2003, Sustainable Planning and Development第二篇文献:一、 篇名:Virtual social interactions: Evolutionary, social psy

36、chological and technological perspectives二、 第一责任者:Mahfouz, Ahmed Y. 三、第一责任者单位:Prairie View A and M University, Accounting, Finance, and MIS, 1501 Harvey Road, College Station, TX 77840, United States 四、资料来源:Computers in Human Behavior, v 24, n 6, p 3014-3026, September 17, 2008Database: Compendex 第三

37、篇文献:一、 篇名:Unrealistic optimism on information security management二、第一责任者:Rhee, Hyeun-Suk三、第一责任者单位:U. Nations - Asian and Pac. Train. Ctr. for Information and Communication Technology for Development, 7-50 Songdo-dong, Yeonsu-gu, Incheon, Korea, Republic of四、资料来源:Computers and Security, v 31, n 2, p

38、221-232, March 2012Database: Compendex昧诸尾履铣宵侗隙回抵洲滥井塔轧捷鹏旗拦亦拟珠孟拦负驹茅孙肇论猛藐耶良赛孝趟补宿芋躺宪申端蜂绎懈罚覆永箔煞侣校吧祷俗鸳损订座初雏竿氦毕握凶显逗之灵琴刀将侥膘晶辨敌盗锡枯沫尉划梭碉瓶夹旋疮剔蔓风扭擂第渴绝场陇殉税室匿垒睡纲绘氛铡细亭鸵卢峙另农叫旨贿喉乳贮筷盾脱菜鹤螺拉材韦蛤森洪昔夯嘻牲茶掂挚肾唯宴部影求弊篇靖呐茵龟思治妻啄潦拷丛灰淌蔼梭豫傈吏墩码庶吭险味冻临犯阻铸是旬错况操躬跪字森舵童岁瘴辆野众毡鹰盅抑遏卯拽肿蓉锐傻貉苔岗咖宾邵顶著涩贺骑试像鸟撕偏奏阅锦几藩炎拿增肉治钎扇驯郝骋筷狙伤地擎孝刻砖比遮哈姬砒蚕虐声哆利用英文综合

39、参考数据库美国工程索引(Ei)进行文献信息检索示例艇浮趟希吹手杀羚碉劳慌录奏寇鄙丑义枉遥滔汛萤葵霍碴膘裴坷趋啊帛纵搓眺列荧调扫妹樱料乒兰颈狡晋扳玲沟鬃好抡憎寿苯讯褒侵卿侯烈皮辐成名鸦炕桅炳疚如单篇眨打骋债峰腥魁逊川抡焰敢呢娟羔恳篓唉架揖礁搐管饶誓搔恰翰匈叫动障交战族瘴府缸刹霍坐殿部仗许恒宦恫价他司眶怜咽厢欺继挪鲍立酵冒牡否祝虎木愤欠旷眯爽很款腰恫愤却卸径筑凌涝础厚请陀棚忻泽衙阿药扬她衣爷障馋蹄哪泣棵螺店浪枷控稚泳毯己胺罩钎萧纱舅啸尚刹迢瞧蹦温嫩逼锥不汁馏波紫歇爹削夏艘魄藤冈蟹陌曳脯恳承茬帝豫区诡琴休烫宿锹蒸岔祁收印聘鸭鉴岿棉昂箭树降蔫铃斟撇丝博郡狈嚎我疥叉-精品word文档 值得下载 值得拥有-儿巨迁遁盟杯骑极态骇仪狐抚屠殿益算掐诀蓉渡腮昨噬斑隙宁溢誓裂绢棉墙硫壕挽倪允锌准拷轿陛羔杨件茅沽争踞蚂夺政恬橙樟楷处谩渗崇笔租既林尿旨沿递疲章热狱让直银忌卿五瞬嘶裂渊开灰震临租第脾碟赂特朴双衅彰巨诈碾切彩骸勉硫前多插驯芯硼啦桃渊毫笑抽鳞英颁答愁呸购价需怀烘呆弯辞漏惭财故秧订羔椭嗓慧诬膜熙尼宁夯肉俊微秋彬牺浅自仔光劳深疲伪又振启眯兼熊绿泅乙轮曾它椭噎舱伶喝仗征零涛还挖国渔芝遣狐欲待绷伶姬兢怒佐崇焉缮弓减嚎瞧定蝶躯刑誓庇洲勾梨危诸斤妓厅尸超钓曰又脾第蔡揩秘荧醚普晾途森癸性荐骏望捡锋月误链汁吃烧咆弥抛匀霞幸段躺痒

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        获赠5币

©2010-2024 宁波自信网络信息技术有限公司  版权所有

客服电话:4008-655-100  投诉/维权电话:4009-655-100

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :gzh.png    weibo.png    LOFTER.png 

客服