全文获取类型
收费全文 | 807篇 |
免费 | 28篇 |
专业分类
财政金融 | 143篇 |
工业经济 | 45篇 |
计划管理 | 141篇 |
经济学 | 185篇 |
综合类 | 3篇 |
运输经济 | 11篇 |
旅游经济 | 25篇 |
贸易经济 | 178篇 |
农业经济 | 34篇 |
经济概况 | 69篇 |
信息产业经济 | 1篇 |
出版年
2023年 | 11篇 |
2022年 | 13篇 |
2021年 | 31篇 |
2020年 | 29篇 |
2019年 | 44篇 |
2018年 | 47篇 |
2017年 | 57篇 |
2016年 | 42篇 |
2015年 | 21篇 |
2014年 | 32篇 |
2013年 | 132篇 |
2012年 | 37篇 |
2011年 | 32篇 |
2010年 | 29篇 |
2009年 | 26篇 |
2008年 | 23篇 |
2007年 | 19篇 |
2006年 | 22篇 |
2005年 | 19篇 |
2004年 | 8篇 |
2003年 | 12篇 |
2002年 | 14篇 |
2001年 | 12篇 |
2000年 | 11篇 |
1999年 | 8篇 |
1998年 | 8篇 |
1997年 | 5篇 |
1996年 | 8篇 |
1995年 | 9篇 |
1994年 | 6篇 |
1993年 | 7篇 |
1991年 | 2篇 |
1989年 | 3篇 |
1988年 | 5篇 |
1987年 | 3篇 |
1986年 | 5篇 |
1985年 | 10篇 |
1984年 | 5篇 |
1983年 | 2篇 |
1982年 | 3篇 |
1980年 | 2篇 |
1977年 | 1篇 |
1976年 | 5篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1967年 | 1篇 |
1866年 | 1篇 |
1864年 | 1篇 |
1861年 | 1篇 |
1859年 | 2篇 |
排序方式: 共有835条查询结果,搜索用时 15 毫秒
11.
Abdul-Halim Nurul-Ain Vafaei-Zadeh Ali Hanifah Haniruzila Teoh Ai Ping Nawaser Khaled 《Quality and Quantity》2022,56(5):3413-3439
Quality & Quantity - The present research aims to investigate the determinants of e-wallet continuance usage intention in Malaysia using extending Technology Continuance Theory (TCT) via... 相似文献
12.
The 1990s were tumultuous times for the US Real Estate Investment Trusts (REITs) industry. Significant structural changes
occurred during the decade, especially after the 1993 Revenue Reconciliation Act, which tremendously boosted the flow of funds
into the system by allowing the participation of institutional investors in REITs. As a result, the industry experienced remarkable
asset growth during the decade, with a large number of initial public offerings and substantial increases in market capitalization.
Employing the Data Envelopment Analysis-type Malmquist index approach, this paper explores the impact of such environmental
changes on productivity growth, efficiency change, and technological progress of REITs. Our results indicate that while efficiency
of the REITs significantly increased, their average productivity declined and technology regressed during this decade. It
appears that the typical REIT has failed to improve technically, but exerted substantial effort to catch up with the best
practice ones relying mainly on aggressive growth strategies. However, our empirical results indicate that they might have
overextended themselves as most began to suffer from diseconomies of scale.
相似文献
Ihsan IsikEmail: |
13.
This paper uses a large panel of data with up to 19 time-series observations for almost 150 countries to estimate models of arms imports. Qualitative evidence suggests a non-linear relationship. As income and military expenditure grow, the propensity to import first rises and then falls as a domestic arms industry develops. We face the difficulty that there is virtually no data on domestic arms procurement or production capability. We respond to this difficulty by adopting a random coefficient approach in order to identify any systematic influences on import propensity, through the impact of military expenditure, size of the armed forces or income on unobserved domestic production capability. While a clear non-linear pattern is apparent in the cross-section relationship, once one allows for parameter heterogeneity such a pattern is not apparent in the time-series. 相似文献
14.
Over the last 15 years, high trade deficits have become a source of external vulnerability for the relatively stabilized Turkish economy. This corresponds to the period where authorities have been following a floating exchange rate regime. Thus, this study aims to empirically show whether the adopted exchange rate regime has an impact on the trade balance for the period of 1987 Q1 to 2015 Q2. Estimation results indicate that there is a long-run relationship between the real effective exchange rate and trade balance under both fixed and floating regimes in Turkey, but there is no evidence for the J-curve hypothesis. 相似文献
15.
The aim of this study is to explore the influence of religious beliefs on social or work-related ties of managers who are member of organizational networks representing two different ideologies (religious and secular) in Turkey. In this research, the emergence of secular and devout entrepreneurs is considered as a phenomenon, and special attention is paid to religious transformation and secularism in Turkey. Social network analysis method is used to define the nature of communication links among 80 chairmen who are the members of two conflicting and dominant groups in Turkish business system. The findings show that Protestant work ethic suggested by Weber with regard to Christianity have attained a similar place over the past decade in Islamic organizational networks. The concern of political power in religion leads to organizational networks being nourished by religious norms and creeds in many developing countries. Especially in societies like Turkey where the state is dominant in the business life, organizations and managers prefer to be included in religious networks to make close contacts with the state. Another significant finding is that efforts of the members of religious networks—in spite of their relatively closed characteristics—in terms of being at the center of a network and taking the brokerage role, are highly developed on the contrary to the literature. 相似文献
16.
Several twin crises occurred in the Turkish economy in the last three decades. In this article, we aim to analyze the link between banking and currency crises and to illustrate the essential determinants of these twin crises by developing a multivariate logit model for the period 1990–2013. The empirical findings show that Turkish currency crises are mainly due to excessive fiscal deficits, rises in short-term external debt, overvaluation of Turkish lira, and external adverse shocks; banking crises are primarily caused by excessive money supplies and bank short positions. The empirical findings also indicate that banking crises lead to currency crises, and vice versa. 相似文献
17.
What makes you click?—Mate preferences in online dating 总被引:1,自引:0,他引:1
We estimate mate preferences using a novel data set from an online dating service. The data set contains detailed information on user attributes and the decision to contact a potential mate after viewing his or her profile. This decision provides the basis for our preference estimation approach. A potential problem arises if the site users strategically shade their true preferences. We provide a simple test and a bias correction method for strategic behavior. The main findings are (i) There is no evidence for strategic behavior. (ii) Men and women have a strong preference for similarity along many (but not all) attributes. (iii) In particular, the site users display strong same-race preferences. Race preferences do not differ across users with different age, income, or education levels in the case of women, and differ only slightly in the case of men. For men, but not for women, the revealed same-race preferences correspond to the same-race preference stated in the users’ profile. (iv) There are gender differences in mate preferences; in particular, women have a stronger preference than men for income over physical attributes. 相似文献
18.
We present a theoretical methodology for the pricing of catastrophe (CAT) derivatives with event‐dependent and non‐convex payoffs given the price of a CAT indexed futures contract. We do not assume a fully diversifiable CAT event risk, nor do we assume knowledge of the martingale probability measure beyond the futures price. We derive tight bounds on the contract value and present trading strategies exploiting the mispricing whenever the bounds are violated. We estimate the bounds of the reinsurance contract with data from hurricane landings in Florida. Our method is also applicable when there is no futures market but the price of a CAT‐indexed bond is available. 相似文献
19.
Md. Ezazul Islam Md. Rafiqul Islam A B M Shawkat Ali 《The Review of Socionetwork Strategies》2016,10(2):105-123
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously. 相似文献
20.
Corporate mergers possibly enhance the labor negotiation advantage of employers. This study investigates the association between
wage levels and merger activity to test the employer bargaining strength hypothesis. The results indicate significantly lower
union wages as a consequence of merging. Merger activity, however, does not influence wage levels of non-union workers. These
findings are supportive of the employer bargaining strength hypothesis. 相似文献