首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   77篇
  免费   3篇
财政金融   49篇
工业经济   5篇
计划管理   13篇
经济学   6篇
贸易经济   5篇
经济概况   2篇
  2022年   3篇
  2019年   1篇
  2018年   1篇
  2016年   1篇
  2015年   2篇
  2014年   1篇
  2013年   2篇
  2012年   3篇
  2011年   3篇
  2010年   1篇
  2009年   1篇
  2007年   1篇
  2006年   2篇
  2005年   2篇
  2004年   1篇
  2003年   2篇
  2002年   2篇
  2000年   2篇
  1999年   4篇
  1998年   4篇
  1997年   2篇
  1996年   3篇
  1995年   3篇
  1993年   3篇
  1992年   2篇
  1991年   2篇
  1990年   3篇
  1989年   2篇
  1988年   3篇
  1987年   4篇
  1986年   3篇
  1985年   2篇
  1984年   1篇
  1983年   1篇
  1981年   3篇
  1979年   1篇
  1977年   1篇
  1970年   1篇
  1968年   1篇
排序方式: 共有80条查询结果,搜索用时 15 毫秒
1.
2.
The paper addresses the question of what constitutes an appropriate evaluation strategy for national foresight activities in different situations. The variety of rationales for foresight is explored, ranging from a desire to set priorities through to participation-oriented goals and building new networks around common visions and strategies. A generational model of foresight is used to show the evolution of key evaluation issues. The generic motivations for evaluation of accountability, justification and learning are discussed in the context of foresight. Evaluation grounded in the concept of behavioural additionality and the systems failure rationale is shown to be more suited as a rationale for foresight as public policy.Assessing the effects of foresight requires an understanding that it is only one of several influences on public policy. To be effective it needs to be tuned into the strategic behaviour and cycles of policy and economic actors. Cases are presented of evaluation of foresight programmes in the United Kingdom, Germany and Hungary. It is concluded that there is no “one-size-fits-all” evaluation approach and that the method selected is conditioned by motivation, timing and the level of aggregation. Foresight cannot be fully evaluated independently from its context. Foresight is being strengthened by the emergence of rigorous and systematic knowledge to assist learning and improvement.  相似文献   
3.
Willingness to take on risk is influenced by the presence of fair and unfair background risks for decision makers who are risk vulnerable as defined by Gollier and Pratt [1996], for these decision makers are more risk averse when they possess such an uninsurable background risk. We present an alternative derivation of the index of local vulnerability based on Diamond and Stiglitz [1974] compensated increases in risk, such that risk aversion increases with the introduction of any small fair background risk if and only if the index of local vulnerability is positive. We establish that the increase in risk aversion is greater for those who are more vulnerable as measured by the index of local vulnerability.  相似文献   
4.
5.
I offer new evidence on the adjustment of local labor markets to geographic shifts in labor demand within US metropolitan areas using a unique data set in which metropolitan subregions are geographically matched across the 1970–1980 and 1980–1990 decades. The evidence uncovered paints the following picture. Workers, especially those with less education, make incomplete adjustments within metropolitan areas in response to intra-metropolitan demand shifts. Although blacks may not make especially limited adjustments, they have disproportionately suffered deleterious effects from job movements because the demand shifts have tended to be away from their places of residence.  相似文献   
6.
7.
Looking at a sample of conventional fixed-rate mortgages, this paper examines whether lending practices are consistent with the competitive hypothesis that the racial and ethnic composition of the borrower??s neighborhood affects the contract rate charged only to the extent that these characteristics objectively influence the probability of the loan defaulting or prepaying. Our results, however, reject this hypothesis, showing instead that borrowers in predominantly black neighborhoods pay a significantly higher contract rate than is consistent with evidence of their behavior.  相似文献   
8.
An estimated 12.6% of primary mortgage loans were simultaneously originated with a second loan from 2004 until 2008, although relatively little is known about how the presence of such subordinate loans affects the default decisions of borrowers. We use a novel data series of loan servicing records from 2002 until 2010 to identify such borrowers and find evidence that the default behavior of these borrowers significantly differs from borrowers without second loans. Estimating a discrete‐time proportional odds hazard model, we find borrowers with a second loan were 62.7% more likely to default each month on their primary loan when conditioning alone on the attributes of the primary loan. However, borrowers of second loans were 58.3% less likely to default on their primary loan as compared to single‐loan borrowers with equivalent current combined attributes (i.e., loan‐to‐value, balance and interest rate). We hypothesize and provide empirical evidence that this occurs because borrowers with second loans have the option to sequentially default on each loan since subordinate lenders will not pursue foreclosure if borrowers have insufficient equity. Lenders of defaulted subordinate debt may revisit their decision to foreclose in the future after housing markets start to recover, thus prompting a new round of foreclosures.  相似文献   
9.
We present two theorems that provide necessary and sufficient conditions for an expected utility maximizer to become more risk averse in the sense of Ross with respect to bearing a foreground risk after the introduction of any independent fair or unfair additive background risk. We call these decision makers Ross risk vulnerable, and show that Ross decreasing absolute risk aversion and Ross decreasing absolute prudence are jointly sufficient for Ross risk vulnerability. Restrictions on utility necessary and sufficient for Ross risk vulnerability with respect to stochastic dominance deteriorations of an existing background risk are also presented. Our analysis concludes with applications of Ross risk vulnerability.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号