首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   274篇
  免费   19篇
  国内免费   7篇
  2023年   1篇
  2021年   6篇
  2020年   5篇
  2019年   4篇
  2018年   7篇
  2017年   13篇
  2016年   10篇
  2015年   6篇
  2014年   26篇
  2013年   19篇
  2012年   16篇
  2011年   28篇
  2010年   29篇
  2009年   30篇
  2008年   17篇
  2007年   28篇
  2006年   10篇
  2005年   14篇
  2004年   4篇
  2003年   7篇
  2002年   4篇
  2001年   8篇
  2000年   5篇
  1999年   3篇
排序方式: 共有300条查询结果,搜索用时 15 毫秒
71.
通过分析烟草生产、储存中的火灾危险性和当前烟草生产、储存时采用的防火措施,对卷烟联合生产工房内储存物料的安全间距、厂房和仓库外搭建雨篷、消防车道和烟草仓库消防设施设计等问题进行了探讨。  相似文献   
72.
当前,领导干部经济责任审计风险的成因主要有外部原因和内部原因两个方面。防范经济责任审计风险,必须创造良好的审计环境,加强审计工作管理,努力提高审计人员的综合素质。  相似文献   
73.
确保奥运会安全、顺利、成功举办,是当前压倒一切的政治任务,全国边防检查机关广大官兵要提高思想认识,加强组织领导,加大各项工作力度,真正做到“服务更加亲切,管控更加严密”,推动边检服务工作再上新台阶。  相似文献   
74.
为了解决目前装备在保障性方面存在的问题,给出了可操作性强而且实用的保障性风险识别与分析的技术与方法。该方法包括保障性风险区域的确定,保障性风险判断准则的建立,保障性风险的量化,保障性风险的评定等,为保障性风险管理提供了有效的方法和手段,从而为提高装备战备完好性和作战能力提供了有力支持。  相似文献   
75.
The profession of arms is distinct from other professions for many reasons. One reason which is not so obvious is that, unlike members of other professions, soldiers may go their entire careers preparing for a day that never arrives. All things considered, we should think this to be a very good thing. For soldiers, however, this can feel somewhat odd, since there is a natural desire to want to feel useful and to see one’s role and purpose find realization. Accordingly, the common soldier is forced to adopt a rather paradoxical mindset, one of longing for peace, and therefore for uselessness, while at the same time longing to be useful, which would entail that there be a war. This latter desire to be useful and to vindicate one’s identity as a soldier can sometimes take on an unhealthy life of its own. The pull of wanting too strongly to live up to a warrior identity, I argue, can sometimes skew a soldier’s ability to assess risk rationally. This article will therefore investigate how a soldier’s concept of self influences his or her overall capacity to evaluate risk in war and when such influence might become morally problematic.  相似文献   
76.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
77.
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted.  相似文献   
78.
沿海船舶边防治安管理是维护海上治安秩序稳定的重要手段。为加强海上治安管理,需要通过立法活动赋予公安边防机关特殊的执法权,并以此规范公安边防行政执法活动。分析沿海船舶边防治安管理立法概况及其存在的问题,提出完善沿海船舶边防治安管理立法的建议。  相似文献   
79.
提出了信息化背景下边境安全风险情报分析的基本概念及其内涵,论述了信息化背景下边境安全风险分析系统的架构和面向边境安全风险分析的信息组织方式。  相似文献   
80.
This article compares the profitability of two pervasively adopted return policies—money‐back guarantee and hassle‐free policies. In our model, a seller sells to consumers with heterogeneous valuations and hassle costs. Products are subject to quality risk, and product misfit can only be observed post‐purchase. While the hassle‐free policy is cost advantageous from the seller's viewpoint, a money‐back guarantee allows the seller to fine‐tune the consumer hassle on returning the product. Thus, when the two return policies lead to the same consumer behaviors, the hassle‐free policy dominates. Conversely, a money‐back guarantee can be more profitable even if on average, high‐valuation consumers experience a lower hassle cost than the low‐valuation ones. The optimal hassle cost can be higher when product quality gets improved; thus, it is not necessarily a perfect proxy or signal of the seller's quality. We further allow the seller to adopt a mixture of these policies, and identify the concrete operating regimes within which these return policies are optimal among more flexible policies. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 403–417, 2014  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号