全文获取类型
收费全文 | 495篇 |
免费 | 20篇 |
专业分类
财政金融 | 85篇 |
工业经济 | 65篇 |
计划管理 | 91篇 |
经济学 | 52篇 |
综合类 | 5篇 |
运输经济 | 8篇 |
旅游经济 | 9篇 |
贸易经济 | 163篇 |
农业经济 | 17篇 |
经济概况 | 20篇 |
出版年
2023年 | 2篇 |
2021年 | 5篇 |
2020年 | 7篇 |
2019年 | 18篇 |
2018年 | 11篇 |
2017年 | 15篇 |
2016年 | 21篇 |
2015年 | 12篇 |
2014年 | 15篇 |
2013年 | 54篇 |
2012年 | 20篇 |
2011年 | 19篇 |
2010年 | 20篇 |
2009年 | 20篇 |
2008年 | 13篇 |
2007年 | 9篇 |
2006年 | 13篇 |
2005年 | 15篇 |
2004年 | 13篇 |
2003年 | 10篇 |
2002年 | 11篇 |
2001年 | 7篇 |
2000年 | 11篇 |
1999年 | 13篇 |
1998年 | 13篇 |
1997年 | 11篇 |
1996年 | 14篇 |
1995年 | 6篇 |
1994年 | 12篇 |
1993年 | 10篇 |
1992年 | 8篇 |
1991年 | 11篇 |
1990年 | 5篇 |
1989年 | 5篇 |
1988年 | 6篇 |
1987年 | 7篇 |
1986年 | 3篇 |
1985年 | 6篇 |
1984年 | 8篇 |
1983年 | 4篇 |
1982年 | 5篇 |
1979年 | 2篇 |
1978年 | 6篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1974年 | 2篇 |
1971年 | 3篇 |
1969年 | 2篇 |
1968年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有515条查询结果,搜索用时 421 毫秒
451.
452.
Noor Hazarina Hashim Jamie Murphy Sharon Purchase Peter O’Connor 《International Journal of Hospitality Management》2010
This research note addresses two limitations of Internet diffusion studies by highlighting the importance of multivariate statistical analysis and including the element of time. The results support findings on the positive relationship between two hotel characteristics – affiliation and category – with Internet adoption, but question findings on the relationship between hotel size and Internet adoption. 相似文献
453.
454.
Sharon Kay Heatley James R. Otto 《International Journal of Intelligent Systems in Accounting, Finance & Management》1998,7(3):125-134
All computers are vulnerable to misuse either by unauthorized users penetrating the system or by authorized users abusing their privileges. This paper describes the use of a data mining process to sift through large (gigabytes) computer audit log databases to detect potential improper accesses of sensitive data files by authorized users. Computer audit logs record information about what files were accessed by which users and when. The detection of computer misuse is important because computer misuse can be related to acts of computer fraud, information theft, software piracy, and violations of privacy, to name a few. The data mining process described in this paper can be applied to detect possible fraud in a wide variety of situations that share some common characteristics: first, a class of ‘sensitive’ files can be identified which may be subject to improper access; second, the selection of files by users is a random process; and third, the probability that a user-selected file is from the sensitive class should be the same for all members of a group of users. Examples of possible applications of the data mining process include detecting inappropriate accesses to classified files, celebrity files, financial accounts with high balances, and files known to have been improperly used. © 1998 John Wiley & Sons, Ltd. 相似文献
455.
This article details the stages in developing a multiitem communication-evoked imagery processing scale. It builds on the foundation provided by Ellen and Bone (1991) by proposing three dimensions of imagery processing: vividness, quantity, and elaboration. Scale development procedures advocated by Churchill (1979) and techniques described by Gerbing and Anderson (1988) are applied. Qualitative and quantitative methods are employed. Face validity of the theoretical structure and items is assessed by consulting experts and employing judging procedures, respectively. Evaluation of the items is done across two separate samples in which reliability, convergent validity, discriminant validity, and nomological validity are exhibited. © 1998 John Wiley & Sons, Inc. 相似文献
456.
457.
This study examines and explains private four-yearcollege closures and mergers in the United Statesusing time series data at the national level for theperiod 1960 to 1994. The data imply that, exceptduring the 1970s, private colleges were much lesslikely to close than businesses in general.Furthermore, the data indicate that private collegemergers occur more often than casual empiricismsuggests. Multiple regression analysis of the exit andmerger decision reveals that private college closuresand mergers are more likely when the real tuition ratedeclines and real faculty salaries rise at privatecolleges. Both the closure and merger rates are foundto be highly responsive with respect to changes inprivate tuition and faculty salaries. The empiricalresults further indicate that religiously-affiliatedcolleges are less likely to close and merge thansecular institutions and that a larger student poolleads to less closing and merging of private four-yearcolleges. 相似文献
458.
It has been shown that under perfect competition and constant returns-to-scale, a one-sector real business cycle model may exhibit indeterminacy and sunspots when income tax rates are determined by a balanced-budget rule with a pre-set level of government expenditures. This paper shows that indeterminacy disappears if the government finances endogenous public spending and transfers with fixed income tax rates. Under this type of balanced-budget formulation, the economy exhibits saddle-path stability and equilibrium uniqueness, regardless of the source of government revenue and/or the existence of lump-sum transfers. 相似文献
459.
Joyce Tait Joanna Chataway Sharon Jones 《Technology Analysis & Strategic Management》1990,2(3):293-305
This paper contributes to the debate surrounding the question of whether biotechnology, particularly its applications in agricultural and food-related industries, should be regarded as revolutionary or evolutionary (with some reservations about the vaildity of teh question). The potential to create a revolutionary techno-economic paradigm shift does exist but it is currently systems. It is also important to consider the motivations underlying statements about the revolutionary/ evolutionary nature of biotechnology, as some such statements are intended to influence events rather than to reflect them. The impact of small firms on the direction and place of revolutionary change in these industries is likely to be marginal, unlike the situation in the early phases of teh electronics/IT revolution. At present the lack of integration of policy initiatives by national governments and the EC is a major factor discouraging the rapid implementation of change. 相似文献
460.