首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   807篇
  免费   28篇
财政金融   143篇
工业经济   45篇
计划管理   141篇
经济学   185篇
综合类   3篇
运输经济   11篇
旅游经济   25篇
贸易经济   178篇
农业经济   34篇
经济概况   69篇
信息产业经济   1篇
  2023年   11篇
  2022年   13篇
  2021年   31篇
  2020年   29篇
  2019年   44篇
  2018年   47篇
  2017年   57篇
  2016年   42篇
  2015年   21篇
  2014年   32篇
  2013年   132篇
  2012年   37篇
  2011年   32篇
  2010年   29篇
  2009年   26篇
  2008年   23篇
  2007年   19篇
  2006年   22篇
  2005年   19篇
  2004年   8篇
  2003年   12篇
  2002年   14篇
  2001年   12篇
  2000年   11篇
  1999年   8篇
  1998年   8篇
  1997年   5篇
  1996年   8篇
  1995年   9篇
  1994年   6篇
  1993年   7篇
  1991年   2篇
  1989年   3篇
  1988年   5篇
  1987年   3篇
  1986年   5篇
  1985年   10篇
  1984年   5篇
  1983年   2篇
  1982年   3篇
  1980年   2篇
  1977年   1篇
  1976年   5篇
  1975年   2篇
  1974年   2篇
  1967年   1篇
  1866年   1篇
  1864年   1篇
  1861年   1篇
  1859年   2篇
排序方式: 共有835条查询结果,搜索用时 15 毫秒
11.
Quality & Quantity - The present research aims to investigate the determinants of e-wallet continuance usage intention in Malaysia using extending Technology Continuance Theory (TCT) via...  相似文献   
12.
The 1990s were tumultuous times for the US Real Estate Investment Trusts (REITs) industry. Significant structural changes occurred during the decade, especially after the 1993 Revenue Reconciliation Act, which tremendously boosted the flow of funds into the system by allowing the participation of institutional investors in REITs. As a result, the industry experienced remarkable asset growth during the decade, with a large number of initial public offerings and substantial increases in market capitalization. Employing the Data Envelopment Analysis-type Malmquist index approach, this paper explores the impact of such environmental changes on productivity growth, efficiency change, and technological progress of REITs. Our results indicate that while efficiency of the REITs significantly increased, their average productivity declined and technology regressed during this decade. It appears that the typical REIT has failed to improve technically, but exerted substantial effort to catch up with the best practice ones relying mainly on aggressive growth strategies. However, our empirical results indicate that they might have overextended themselves as most began to suffer from diseconomies of scale.
Ihsan IsikEmail:
  相似文献   
13.
This paper uses a large panel of data with up to 19 time-series observations for almost 150 countries to estimate models of arms imports. Qualitative evidence suggests a non-linear relationship. As income and military expenditure grow, the propensity to import first rises and then falls as a domestic arms industry develops. We face the difficulty that there is virtually no data on domestic arms procurement or production capability. We respond to this difficulty by adopting a random coefficient approach in order to identify any systematic influences on import propensity, through the impact of military expenditure, size of the armed forces or income on unobserved domestic production capability. While a clear non-linear pattern is apparent in the cross-section relationship, once one allows for parameter heterogeneity such a pattern is not apparent in the time-series.  相似文献   
14.
Over the last 15 years, high trade deficits have become a source of external vulnerability for the relatively stabilized Turkish economy. This corresponds to the period where authorities have been following a floating exchange rate regime. Thus, this study aims to empirically show whether the adopted exchange rate regime has an impact on the trade balance for the period of 1987 Q1 to 2015 Q2. Estimation results indicate that there is a long-run relationship between the real effective exchange rate and trade balance under both fixed and floating regimes in Turkey, but there is no evidence for the J-curve hypothesis.  相似文献   
15.
The aim of this study is to explore the influence of religious beliefs on social or work-related ties of managers who are member of organizational networks representing two different ideologies (religious and secular) in Turkey. In this research, the emergence of secular and devout entrepreneurs is considered as a phenomenon, and special attention is paid to religious transformation and secularism in Turkey. Social network analysis method is used to define the nature of communication links among 80 chairmen who are the members of two conflicting and dominant groups in Turkish business system. The findings show that Protestant work ethic suggested by Weber with regard to Christianity have attained a similar place over the past decade in Islamic organizational networks. The concern of political power in religion leads to organizational networks being nourished by religious norms and creeds in many developing countries. Especially in societies like Turkey where the state is dominant in the business life, organizations and managers prefer to be included in religious networks to make close contacts with the state. Another significant finding is that efforts of the members of religious networks—in spite of their relatively closed characteristics—in terms of being at the center of a network and taking the brokerage role, are highly developed on the contrary to the literature.  相似文献   
16.
Several twin crises occurred in the Turkish economy in the last three decades. In this article, we aim to analyze the link between banking and currency crises and to illustrate the essential determinants of these twin crises by developing a multivariate logit model for the period 1990–2013. The empirical findings show that Turkish currency crises are mainly due to excessive fiscal deficits, rises in short-term external debt, overvaluation of Turkish lira, and external adverse shocks; banking crises are primarily caused by excessive money supplies and bank short positions. The empirical findings also indicate that banking crises lead to currency crises, and vice versa.  相似文献   
17.
What makes you click?—Mate preferences in online dating   总被引:1,自引:0,他引:1  
We estimate mate preferences using a novel data set from an online dating service. The data set contains detailed information on user attributes and the decision to contact a potential mate after viewing his or her profile. This decision provides the basis for our preference estimation approach. A potential problem arises if the site users strategically shade their true preferences. We provide a simple test and a bias correction method for strategic behavior. The main findings are (i) There is no evidence for strategic behavior. (ii) Men and women have a strong preference for similarity along many (but not all) attributes. (iii) In particular, the site users display strong same-race preferences. Race preferences do not differ across users with different age, income, or education levels in the case of women, and differ only slightly in the case of men. For men, but not for women, the revealed same-race preferences correspond to the same-race preference stated in the users’ profile. (iv) There are gender differences in mate preferences; in particular, women have a stronger preference than men for income over physical attributes.  相似文献   
18.
We present a theoretical methodology for the pricing of catastrophe (CAT) derivatives with event‐dependent and non‐convex payoffs given the price of a CAT indexed futures contract. We do not assume a fully diversifiable CAT event risk, nor do we assume knowledge of the martingale probability measure beyond the futures price. We derive tight bounds on the contract value and present trading strategies exploiting the mispricing whenever the bounds are violated. We estimate the bounds of the reinsurance contract with data from hurricane landings in Florida. Our method is also applicable when there is no futures market but the price of a CAT‐indexed bond is available.  相似文献   
19.
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously.  相似文献   
20.
Corporate mergers possibly enhance the labor negotiation advantage of employers. This study investigates the association between wage levels and merger activity to test the employer bargaining strength hypothesis. The results indicate significantly lower union wages as a consequence of merging. Merger activity, however, does not influence wage levels of non-union workers. These findings are supportive of the employer bargaining strength hypothesis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号