首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   281篇
  免费   14篇
财政金融   50篇
工业经济   33篇
计划管理   53篇
经济学   30篇
综合类   5篇
运输经济   3篇
旅游经济   6篇
贸易经济   103篇
农业经济   6篇
经济概况   6篇
  2023年   2篇
  2022年   1篇
  2021年   3篇
  2020年   6篇
  2019年   13篇
  2018年   7篇
  2017年   11篇
  2016年   11篇
  2015年   8篇
  2014年   8篇
  2013年   35篇
  2012年   13篇
  2011年   13篇
  2010年   13篇
  2009年   14篇
  2008年   11篇
  2007年   4篇
  2006年   10篇
  2005年   8篇
  2004年   7篇
  2003年   6篇
  2002年   7篇
  2001年   3篇
  2000年   4篇
  1999年   3篇
  1998年   5篇
  1997年   7篇
  1996年   6篇
  1995年   5篇
  1994年   9篇
  1993年   5篇
  1992年   1篇
  1991年   4篇
  1990年   2篇
  1989年   3篇
  1988年   2篇
  1987年   4篇
  1986年   2篇
  1985年   5篇
  1984年   6篇
  1983年   1篇
  1982年   3篇
  1981年   1篇
  1978年   2篇
  1977年   1篇
排序方式: 共有295条查询结果,搜索用时 647 毫秒
241.
Rate regulations in insurance markets often impose cross-subsidies in insurance premiums from low-risk consumers to high-risk consumers. This paper develops the hypothesis that premium cross-subsidies affect risk taking by insurance consumers, and tests this hypothesis by examining the marginal impact of premium subsidies and overcharges on future insurance costs. The empirical analysis uses 1990–2003 rating cell-level data from the Massachusetts automobile insurance market, in which regulation produced large cross-subsidies across cells. Consistent with the hypothesized effects, premium subsidies are found to be significantly related to higher future insurance costs, and the opposite effects are found for premium overcharges.  相似文献   
242.
243.
Amid rising environmental concerns, Industry 4.0 and blockchain technology (BCT) are transforming circular economy (CE) practices and prevailing business models. Recognize the same; this study examines the role of blockchain technology in circular CE practices and their impact on eco-environmental performance, which influences organizational performance. The study collects data from 404 enterprises located in Chinese and Pakistani territories, involved in cross-border supply chain operations. Both countries' sample has great relevance due to the China Pakistan Economic Corridor (CPEC), which possesses several positive fallouts in terms of technology spillovers across firms. Using the partial least squares structural equation modeling (PLS-SEM) modeling framework, this study provides three key findings. First, BCT significantly improves the circular economy practices (circular procurement, circular design, recycling, and remanufacturing). Second, CE practices help improve firms' environmental performance and stimulate their financial performance. Third, higher eco-environmental performance significantly boosts organizational performance. This study sets out the foundations for participating countries/firms that simultaneously achieve financial and sustainable goals by integrating blockchain technology in circular economy practices.  相似文献   
244.
While extant literature generally suggests a positive relationship between entrepreneurial self-efficacy and entrepreneurial intention, several moderators have been identified – suggesting possible boundary conditions on that relationship. This paper introduces perceived person-entrepreneurship fit to entrepreneurship and shows that it moderates the relationship between entrepreneurial self-efficacy and entrepreneurial intention. Three studies are conducted which illuminate the utility of randomized experiments and methodological approaches to address limitations in the interpretation of empirical results. Studies 1 and 2 are randomized experiments to examine causality; Study 3 contains two correlational surveys to triangulate the results by examining whether the proposed effects withstand the influence of confounding variables in real-life. The findings indicate that when a strong perception of fit with entrepreneurship is achieved, entrepreneurial intention is strongly predicted by entrepreneurial self-efficacy. In contrast, if one perceives a low level of fit or no fit, entrepreneurial intention will be low, regardless of entrepreneurial self-efficacy.  相似文献   
245.
Drawing on recent qualitative research on the UK's Immigration Act 2016, this article sets out to explain the opposition of social housing professionals to the imposition of the Right to Rent. By locating this policy intervention within the evolving geographies of state regulation, it is possible to account for the mechanisms through which housing professionals can resist the extension of duties that were previously the remit of border agents and immigration officials. Synthesizing Bourdieu's critical sociology with Boltanski and Thevenot's sociology of critique helps explain not only the governmental underpinnings of contemporary immigration rhetoric, but also the forms of resistance for which housing professionals display a strong justification in exercising. The universal nature of ‘classification struggles’ within and beyond state institutions extends the relevance of this research to encompass most, if not all, welfarist regimes operating within actually existing neoliberal orders. The analysis of the findings of this research has wider implications that reach beyond housing and urban studies while immigration persists as one of the most significant contemporary political issues, almost without geographical exception, right across the globe.  相似文献   
246.
247.
All computers are vulnerable to misuse either by unauthorized users penetrating the system or by authorized users abusing their privileges. This paper describes the use of a data mining process to sift through large (gigabytes) computer audit log databases to detect potential improper accesses of sensitive data files by authorized users. Computer audit logs record information about what files were accessed by which users and when. The detection of computer misuse is important because computer misuse can be related to acts of computer fraud, information theft, software piracy, and violations of privacy, to name a few. The data mining process described in this paper can be applied to detect possible fraud in a wide variety of situations that share some common characteristics: first, a class of ‘sensitive’ files can be identified which may be subject to improper access; second, the selection of files by users is a random process; and third, the probability that a user-selected file is from the sensitive class should be the same for all members of a group of users. Examples of possible applications of the data mining process include detecting inappropriate accesses to classified files, celebrity files, financial accounts with high balances, and files known to have been improperly used. © 1998 John Wiley & Sons, Ltd.  相似文献   
248.
This research note addresses two limitations of Internet diffusion studies by highlighting the importance of multivariate statistical analysis and including the element of time. The results support findings on the positive relationship between two hotel characteristics – affiliation and category – with Internet adoption, but question findings on the relationship between hotel size and Internet adoption.  相似文献   
249.
250.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号