全文获取类型
收费全文 | 264篇 |
免费 | 8篇 |
国内免费 | 3篇 |
专业分类
财政金融 | 26篇 |
工业经济 | 11篇 |
计划管理 | 50篇 |
经济学 | 15篇 |
综合类 | 38篇 |
旅游经济 | 7篇 |
贸易经济 | 107篇 |
农业经济 | 3篇 |
经济概况 | 18篇 |
出版年
2024年 | 1篇 |
2023年 | 8篇 |
2022年 | 6篇 |
2021年 | 13篇 |
2020年 | 15篇 |
2019年 | 13篇 |
2018年 | 13篇 |
2017年 | 11篇 |
2016年 | 4篇 |
2015年 | 6篇 |
2014年 | 12篇 |
2013年 | 33篇 |
2012年 | 9篇 |
2011年 | 19篇 |
2010年 | 16篇 |
2009年 | 16篇 |
2008年 | 11篇 |
2007年 | 10篇 |
2006年 | 10篇 |
2005年 | 9篇 |
2004年 | 2篇 |
2003年 | 7篇 |
2002年 | 7篇 |
2001年 | 6篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1992年 | 3篇 |
1990年 | 1篇 |
1989年 | 3篇 |
1987年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有275条查询结果,搜索用时 15 毫秒
91.
中国人民银行南宁中心支行课题组 《河南金融管理干部学院学报》2013,(3):31-34
目前,我国征信领域个人隐私权保护存在的主要问题是:法律法规支持有待进一步加强,业务流程存在诸多风险点,个人权责意识不强。今后,应尽快完善《征信业管理条例》的配套措施,改进征信业务流程,加强征信知识宣传,以切实保障信息主体的权益。 相似文献
92.
In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study shows that information systems (IS) professionals' intentions to protect personal information privacy are influenced by their attitudes, subjective norms, perceived deindividuation, and organization-based self-esteem. It further shows that attitudes are influenced by subjective norms, which, in turn, are influenced by organization-based self-esteem. 相似文献
93.
重庆直辖已近10年,直辖效应发挥作用使生产力得到进一步解放,使重庆的经济和社会事业发生了巨大变化,使重庆人民生活水平得到了跨越式提升。在新的历史条件下,要进一步打好“直辖牌”,更好地发挥直辖效应,力争早日将重庆建设成为长江上游经济中心。 相似文献
94.
Individual Differences in the Acceptability of Unethical Information Technology Practices: The Case of Machiavellianism and Ethical Ideology 总被引:1,自引:0,他引:1
Susan J. Winter Antonis C. Stylianou Robert A. Giacalone 《Journal of Business Ethics》2004,54(3):275-296
While information technologies present organizations with opportunities to become more competitive, unsettled social norms and lagging legislation guiding the use of these technologies present organizations and individuals with ethical dilemmas. This paper presents two studies investigating the relationship between intellectual property and privacy attitudes, Machiavellianism and Ethical Ideology, and working in R&D and computer literacy in the form of programming experience. In Study 1, Machiavellians believed it was more acceptable to ignore the intellectual property and privacy rights of others. Programmers and R&D workers considered violating intellectual property rights more acceptable. Programmers did not consider violating privacy rights more acceptable, but R&D workers did. Finally, there was an interaction between Machiavellianism, programming and R&D. Machiavellians who also had programming experience or worked in R&D found violations of intellectual property much more acceptable. The effect of Machiavellianism on attitudes toward violations of privacy was enhanced by working in R&D, but not by programming experience. In Study 2, idealists believed it was less acceptable to ignore the intellectual property and privacy rights of others. Relativists found it more acceptable to violate intellectual property rights, though they did not consider it more acceptable to violate privacy rights. Those with programming experience were more accepting of intellectual property rights violations, but not of privacy violations. Finally, programming experience moderated the relationship between idealism, relativism and attitudes toward these unethical information practices. Implications for diminishing unethical behavior among Machiavellians, Relativists, programmers and those in R&D are discussed. 相似文献
95.
TIAGO PINHEIRO FRANCISCO RIVADENEYRA MARC TEIGNIER 《Journal of Money, Credit and Banking》2017,49(7):1653-1665
How does financial development affect the magnitude of the business cycles fluctuations? We examine this question in a general equilibrium model with heterogeneous agents and endogenous credit constraints based on Kiyotaki (1998). We show that there is a hump‐shaped relationship between the degree of financial frictions and the amplification of unexpected productivity shocks. This nonmonotonic relation is due to the fall in financial frictions having two opposite effects on the response of output. One effect is the reallocation of productive inputs between agent types, which, while active, increases with the fall in financial frictions. The other effect is the change in the demand of inputs, which decreases with the fall in financial frictions. At low levels of financial development, the reallocation effect dominates and a fall in financial frictions increases the amplification of productivity shocks. In contrast, at higher levels of financial development, a fall in financial frictions decreases the shock amplification because the reallocation effect disappears while the effect on the demand of inputs is still present. 相似文献
96.
This study investigates the effects of advergame customization features and trust in the brand advertised in the advergame on players’ brand attitude and personal information disclosure. Moreover, we examine to what extent players’ privacy concerns moderate these effects. Drawing on self-determination theory and uncertainty reduction theory, we developed and tested a game with varying levels of customization features and brand trust. Results show that customization possibilities and brand trust may have a positive influence on advergame persuasion outcomes, but this influence is strongly conditioned by consumers’ privacy concerns. When privacy concerns are low, a game containing customization features leads to a more positive brand attitude. However, when privacy concerns are high, the effect becomes negative. Additionally, we find that different levels of privacy concerns do not affect players’ responses toward high trust brands, but toward low trust brands. For low trust brands, players with high privacy concerns show more negative game responses than players with low concerns. These findings set the boundaries for several theoretical and practical implications regarding advergame effectiveness. 相似文献
97.
曹亚伟 《四川商业高等专科学校学报》2013,(6):42-46,53
隐私权作为宪法上的基本权利之一,在网络环境下的保护面临诸多挑战。美国“监控门事件”突出反映了网络环境下隐私权保护与国家安全之间的冲突,以及国际互联网企业在隐私权保护中的责任空缺。实现网络隐私权的充分保护,必须解决网络隐私权与国家安全之间的冲突,明确国际互联网企业在网络隐私权保护中的责任,并通过国际合作与国际协调,构建网络世界的新秩序。 相似文献
98.
Chun-I Fan Bo-Wei Lin Shi-Ming Huang 《Journal of Organizational Computing & Electronic Commerce》2013,23(3):259-281
The technology of electronic cash makes it possible to transmit digital money over communication networks during electronic transactions. Owing to the untraceability and unforgeability properties, electronic cash can protect the privacy of customers and guarantee security of payments in the transactions. This paper introduces a customer-efficient electronic cash protocol where each customer only needs to store 1 coin for w dollars and transmit 1 coin for a w-dollar payment. Compared with traditional electronic cash protocols, the proposed method greatly reduces not only the storage required for the customers, but the communication traffic in the payments as well. Furthermore, the computation cost of each customer in the payment stage is greatly reduced by more than 99% as compared with other storage efficient electronic cash protocols. The proposed protocol is quite suitable for situations where storage and computation capabilities are limited, such as smart-card or mobile environments. In addition, both the problem of money laundering and the unlimited-growth problem of the bank's database, which records all spent coins for double-spending checking, are also considered in the proposed protocol. Especially, our basic idea is independent of the underlying cryptographic primitives such that it can be implemented by any public-key encryption, symmetric encryption, digital signature, and partially blind signature scheme. 相似文献
99.
随着信息和技术革命的推进,数字经济已经成为全球经济发展的新要求和新趋势,跨境电商、数字贸易等数字经济在全球范围内加速发展,经济贸易全球化推动了数据在不同国家之间交互、流动。跨境数据流动治理对发展数字经济、维护国家安全、构建数字红利收入分配体系至关重要。全球各国对跨境数据流动的规制反映了其国际博弈的战略:美欧等发达经济体希望促进数据自由流动;而发展中国家则采取"本土化"防御方式,抵御数据领域的长臂管辖。我国选择了适应当前数字经济发展形势的"本土化"政策,但也面临对外和对内等多重挑战。建议在总体的监管路径选择上,合理兼顾审慎性和包容性;完善跨境数据流动制度体系,保障立法的全面性和灵活性;构建跨境数据流动治理的统一监管架构,提升治理体系的统筹性和协同性;完善跨境数据流动安全评估体系,平衡金融市场的开放性和安全性。 相似文献
100.
Michał Brzoza-Brzezina 《Applied economics letters》2016,23(14):1029-1033
This letter compares the consequences of hitting the zero lower bound in small open and large closed economies. I show that in a large economy shocks are modified by the zero lower bound on interest rate much more than in a small one – as a result, the large economy may suffer more. 相似文献