政大機構典藏-National Chengchi University Institutional Repository(NCCUR):
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113485/144472 (79%)
Visitors : 51391280      Online Users : 708
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Journal Articles [100/100]

    Siblings


    Taiwanese Journal of WTO Studies [133/133]
    Collectanea of History NCCU [209/209]
    Third-Sector Review [85/85]
    Issues & Studies: A Social Science Quarterly on China, Taiwan, and East Asian Affairs [966/988]
    Bulletin of Taiwanese Literature [255/255]
    Bulletin of the Department of Chinese Literature National Chengchi University [341/341]
    Wenshan Review of Literature and Culture [249/249]
    NCCU Philosophical Journal [180/183]
    Taiwan Journal of TESOL THCI [157/157]
    Taiwan Journal of Linguistics [192/192]
    The Journal of History, NCCU [273/273]
    Mass Communication Research [1305/1307]
    Issues & Studies [616/616]
    Mainland China Studies [494/497]
    Journal of Public Administration [286/287]
    Journal of Taiwan land research [148/150]
    Journal of Electoral studies [202/202]
    Chengchi law review [1146/1147]
    Journal of Education & Psychology [715/728]
    Journal of Librarianship and Information Science [587/587]
    Cross-cultural Studies [58/58]
    Journal of Social Sciences [110/110]
    the NCCU Journal of Sociology [12/12]
    Studies in Chinese Religions [104/104]
    Journal of Social Sciences [35/35]
    Bulletin of Labour Research [70/70]
    Journal of the History of Ideas in East Asia [239/239]
    ETHNOLOGIA [75/83]
    Chinese journal of administration [22/22]
    NCCU Intellectual Property Review [132/132]
    International Journal of Accounting Studies [237/237]
    The Journal of Advertising & Public Relations [243/243]
    Asian Broadcasting & New Media Research [102/102]
    Foreign language studies [198/198]
    Guang Yi: Lingual, Literary, and Cultural Translation [127/127]
    Journal of Russian Philology [137/138]
    Chengchi journal of Japanese studies [137/137]
    韓國語文研究 [14/14]
    Journal of international relations [118/118]
    East Asia Studies [164/165]
    Journal of Russian Studies = Vestnik instituta rossii [73/73]
    Mondai to Kenkyu [312/314]
    Journal of Strategic and security analyses [1225/1225]
    NCCU Sports Series [81/83]

    Community Statistics


    Item counts issued in 3 years:0(0.00%)
    Items With Fulltext:100(100.00%)

    Download counts of the item
    Download times greater than 0:100(100.00%)
    Download times greater than 100:100(100.00%)
    Total Bitstream Download Counts:56118

    Last Update: 2024-12-03 17:06

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 26-50 of 100. (4 Page(s) Totally)
    << < 1 2 3 4 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2004-12 ERP對企業產銷互動價值性產出之影響 許麗玲; 王曉梅; Hsu, Li-Ling; Wang, Hsiao-Mei
    2014-03 Exploring Donation Appeals in Top Not-for-Profit Websites Pitts, Robert E.; Blose, Julia E.; Mack, Rhonda W.
    2009-09 Exploring E-learning Effectiveness Based on Activity Theory: An Example of Asynchronous Distance Learning Hung, Shin-Yuan; Yu, Wen-Ju; Liou, Kuang-Long; Hsu, Shih-Chieh
    2015-03 Exploring the Role of Culture in eWOM Adoption Pentina, Iryna; Basmanova, Oksana; Zhang, Lixuan; Ukis, Yuliya
    2013-03 Facilities and Service Models for Electric Scooter Recharge Stations Wu, Hsu-Che; Wang, Pei-Wen
    2012-03 From CAATTs Adoption to Continuous Auditing Systems Implementation: An Analysis Based on Organizational Routines Theories Sun, Chia-Ming
    2014-03 Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key Algorithm Kuppuswamy, Prakash; Saeed, Q. Y. Al-Khalidi
    2015-03 Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution Cryptosystem Adebayo, Olawale S.; Olalere, Morufu; Ugwu, Joel N.
    2014-09 Insights into Motivation to Participate in Online Surveys Foster, Mary K.; Michon, Richard
    2012-09 Insights into Online Auction Market Structure of eBay in 2006-2007: A Historical Perspective Tu, Yan-Bin; Clinton, Steven R.; Holstein, Adora
    1998-12 Interaction between Manufacturing and Marketing from an Information Technology Perspective – A Case Study 許麗玲; Hsu, Li-Ling
    2012-09 Key Management Scheme for Cumulative Member Removal and Bursty Behavior in Secure Group Communication Using m-ary Tree Aparna, R.; Amberker, B.B.
    2016-03 Metamorphic Malware Detection Using Function Call Graph Analysis Deshpande, Prasad; Stamp, Mark
    2014-03 Modelling e-Health Systems Security Requirements: A Business Process Based Approach Alahmadi, Ahmed H.; Soh, Ben; Ullah, Azmat
    2010-03 Non Homogenous Poisson Process Model for Optimal Software Testing Using Fault Tolerance Srivastava, Praveen Ranjan; Mittal, Chetan; Rungta, Ajay; Malhotra, Vaibhav; Raghurama, G
    2013-09 On Measuring and Increasing the Effectiveness of Banner Advertising Ghosh, Haren; Bhatnagar, Amit
    2013-03 Optimal Software Release Policy Approach Using Test Point Analysis and Module Prioritization Srivastava, Praveen Ranjan; Sankaran, Subrahmanyan; Pandey, Pushkar
    2010-09 Perceptions of Information Privacy in Outsourcing among Healthcare Executives: An Empirical Analysis Mariott, Russell; Raisinghani, Mahesh S.
    2013-09 Posting Articles for Occupational Stress Reduction in Social Networking Sites: A View of Social Cognitive Theory Yen, Yung-Shen
    2016-03 Probabilistic Approach of Improved Binary PSO Algorithm Using Mobile Sink Nodes Anand, S. Raj; Kannan, E.
    2012-03 Revisiting Software Requirements Specifications-What Could We Learn Johansson, Bjorn; Rolandsson, Tanja
    2011-03 Secure Password Based Authentication Protocol to Thwart Online Dictionary Attacks Sood, Sandeep K.
    2016-03 Secure WLAN Handoff Scheme with Continuous Authentication Singh, Rajeev; Sharma, Teek P.
    2013-09 Securing DNA Information through Public Key Cryptography Tripathi, Shiv P. N.; Jaiswal, Manas; Singh, Vrijendra
    2014-09 Securing E-Commerce Business Using Hybrid Combination Based on New Symmetric Key and RSA Algorithm Kuppuswamy, Prakash; Saeed, Q. Y. Al-Khalidi

    Showing items 26-50 of 100. (4 Page(s) Totally)
    << < 1 2 3 4 > >>
    View [10|25|50] records per page

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback