首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   164篇
  免费   12篇
  国内免费   1篇
财政金融   8篇
工业经济   9篇
计划管理   43篇
经济学   23篇
综合类   27篇
运输经济   1篇
旅游经济   16篇
贸易经济   19篇
农业经济   21篇
经济概况   10篇
  2023年   4篇
  2022年   4篇
  2021年   5篇
  2020年   11篇
  2019年   4篇
  2018年   5篇
  2017年   3篇
  2016年   1篇
  2015年   1篇
  2014年   7篇
  2013年   10篇
  2012年   13篇
  2011年   13篇
  2010年   13篇
  2009年   12篇
  2008年   8篇
  2007年   11篇
  2006年   15篇
  2005年   10篇
  2004年   8篇
  2003年   6篇
  2002年   3篇
  2001年   4篇
  2000年   6篇
排序方式: 共有177条查询结果,搜索用时 265 毫秒
1.
浅谈旅游景区危机管理体系构建   总被引:2,自引:0,他引:2  
旅游景区是旅游产品的核心。研究旅游景区的危机,构建我国旅游景区危机管理体系,有利于防范和减少景区公共安全事故,提升景区管理水平。本文通过分析目前我国旅游景区存在的主要危机类型,提出相应的危机管理体系构建措施,指导旅游景区健康、快速发展。  相似文献   
2.
This paper applies Kim and Wardes (2004) stratified Warners randomized response model to Mangat and Singhs (1990) two-stage randomized response model. The proposed stratified randomized response model has an optimal allocation and a large gain in precision. Hence, the estimator based on the proposed method is more efficient than Kim and Wardes (2004) and Mangat and Singhs (1990) estimators under the conditions presented in both the case of completely truthful reporting and that of not completely truthful reporting by the respondents.  相似文献   
3.
河流风景区生态旅游环境承载力指标体系研究---以漓江为例   总被引:15,自引:0,他引:15  
本文给出了生态旅游环境承载力的定义并揭示了其内涵.在深入研究河流风景区的生态旅游环境承载力的特点上,构建了河流风景区的生态旅游环境承载力的指标体系。并以漓江为例进行分析,提出了优化漓江生态旅游环境承载力的措施。  相似文献   
4.
基于政策演变的景区经营权转让的实践问题分析   总被引:1,自引:0,他引:1  
自从1997年张家界黄龙洞和宝峰湖的经营权转让以来,景区经营权转让就一直成为争论的焦点。主要从中国相关政策的演进和资源的价值构成分析景区经营权转让的可行性和实践中面临的问题进行探讨,并针对目前的发展形式提出了一些建议。  相似文献   
5.
李跃军  孙虎 《经济地理》2007,27(3):502-504,521
城市和景区是区域旅游网络中两个基本节点,它们之间关系紧密,包含多种空间匹配关系。数量关系上由一对一匹配、一对多匹配、多对一匹配、多对多匹配构成;等级关系上由正位匹配和倒位匹配构成;距离关系上由城区城郊型、一日游型、离散型构成;几何分布关系上由点轴匹配和面状匹配构成;管理匹配关系上由同位管理匹配和异位管理匹配构成。分析城市与景区空间匹配组合特征,对于寻找合理的景区依托城镇、采取正确的区域旅游发展战略等都具有重要的实践意义。  相似文献   
6.
张红英 《价值工程》2014,(36):176-177
景区旅游服务质量满意度是景区长远发展的软实力和竞争的关键因素。本文通过天目湖景区服务质量满意度调查分析,找出满意度存在的问题,提出提升天目湖旅游景区服务质量满意度的对策和建议,以促进天目湖景区的深度发展。  相似文献   
7.
This article deals with a newsvendor inventory model in light of green product marketing of corporate social responsible firms. In this model, comparison between green and non green marketing is analyzed including subsidy and tax implementation by Government where the Government offers higher subsidy and lower tax to the green producer unlike the lower subsidy and higher tax to the non green producer. There is also price contest between green and non green producer as the demands of the products are dependent on sales price, carbon emission and corporate social responsibility index. Assuming the cost and profit parameters, an expected profit function of the systems is formulated and maximized analytically. Finally, numerical examples are illustrated to justify the proposed model.  相似文献   
8.
Investors have always been interested in reducing inflation risk in their portfolios. However, investors face different types of inflation than those measured by the Consumer Price Index (CPI). Moreover, different asset classes can be used to hedge portfolio inflation. In this paper, we show how individual equities can be used to construct equity portfolios sensitive to customized inflation targets. We illustrate portfolios for three types of inflation: US headline CPI, Forbes Cost of Living Extremely Well Index, and the US Medical Care Price Index. We also show how alternative weighting schemes, such as minimum volatility and maximum inflation beta, can be used to construct inflation‐hedged portfolios.  相似文献   
9.
从南方冰灾透视旅游景区危机管理——以南岳衡山为例   总被引:1,自引:0,他引:1  
通过分析南方雨雪冰冻灾害对南岳衡山旅游景区的影响,从旅游危机的预防、旅游危机的应急管理以及旅游危机的灾后恢复重建三个层面构建南岳衡山旅游景区危机管理框架。  相似文献   
10.
Information security represents the cornerstone of every data processing system that resides in an organisation’s trusted network, implementing all necessary protocols, mechanisms and policies to be one step ahead of possible threats. Starting from the need to strengthen the set of security services, in this article we introduce a new and innovative process named controlled information destruction (CID) that is meant to secure sensitive data that are no longer needed for the organisation’s future purposes but would be very damaging if revealed. The disposal of this type of data has to be controlled carefully in order to delete not only the information itself but also all its splinters spread throughout the network, thus denying any possibility of recovering the information after its alleged destruction. This process leads to a modified model of information assurance and also reconfigures the architecture of any information security management system. The scheme we envisioned relies on a reshaped information lifecycle, which reveals the impact of the CID procedure directly upon the information states.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号