首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   203篇
  免费   6篇
财政金融   45篇
工业经济   10篇
计划管理   29篇
经济学   76篇
贸易经济   25篇
经济概况   24篇
  2022年   2篇
  2021年   2篇
  2020年   4篇
  2019年   4篇
  2018年   5篇
  2017年   3篇
  2016年   4篇
  2015年   3篇
  2014年   10篇
  2013年   17篇
  2012年   6篇
  2011年   5篇
  2010年   6篇
  2009年   9篇
  2008年   7篇
  2007年   5篇
  2006年   3篇
  2005年   5篇
  2004年   4篇
  2003年   2篇
  2002年   3篇
  2001年   3篇
  2000年   3篇
  1999年   6篇
  1997年   5篇
  1996年   3篇
  1995年   2篇
  1994年   4篇
  1992年   2篇
  1991年   2篇
  1988年   2篇
  1985年   5篇
  1984年   4篇
  1983年   3篇
  1982年   2篇
  1981年   5篇
  1980年   6篇
  1979年   13篇
  1978年   4篇
  1977年   5篇
  1973年   1篇
  1970年   1篇
  1969年   1篇
  1968年   2篇
  1963年   1篇
  1961年   2篇
  1958年   2篇
  1954年   1篇
  1914年   1篇
  1912年   1篇
排序方式: 共有209条查询结果,搜索用时 421 毫秒
61.
Summary The annual change in the marginal utility of the guilder is numerically specified, together with its two components: the real-income and the price level components. Research supported in part by the McKethan-Matherly Eminent Scholar Chair, University of Florida, and the Deutsche Forschungsgemeinschaft (German Research Foundation).  相似文献   
62.
When a random sample of size n from a standard normal population is contaminated by a normal outlier with either a different mean or a different variance, the maximum entropy median outperforms the sample median in terms of squared-error loss. The only exception is when n=3 and the outlier mean or variance is sufficiently different.  相似文献   
63.
Statistical inference in complete demand systems is usually based on imperfect data. This letter explores some of the implications of these imperfections, in particular for the estimates of income elasticities.  相似文献   
64.
65.
We apply the differential production theory approach to U.S. import data (1921-70) without imposing restrictions on Divisia elasticities. The estimates of these elasticities are 0.58 for the imports of foods, 0.95 for those of crude materials, 1.34 for semi-manufactures, and 1.16 for finished manufactures.  相似文献   
66.
The symmetric maximum entropy (ME) distribution is introduced based on symmetrized order statistics. Its properties (including higher-order moments) are compared with those of the non-symmetric ME distribution.  相似文献   
67.
A preference independence transformation of U.S. consumption data, including leisure, shows that affordable free time is the transformed good with the largest share in the semidurables/ durables/leisure group. Other results concern the effect of the transformation on the group structure under weak separability.  相似文献   
68.
69.
This article examines how a vision of organizational fraud has been constructed around a particular technology, the fraud triangle, which was initially developed in the aftermath of the creation of the fraud examination discipline. We examine the genealogy of the fraud triangle and follow various chains of translations underlying its construction. One of the main translation trajectories we uncover presents individuals as vectors of moral riskiness needing to be vigilantly monitored and controlled by the organization. The organization is conceived of as a prime site in which fraud is to be addressed – not annihilated but significantly reduced as long as sufficient care is devoted to establishing layers of vigilance. As such, the fraud triangle redefines social, political and economic relations through a web of translations that both celebrate and normalize the use of organizational surveillance systems to control risk ensuing from the individual’s (alleged) frail morality. In the process, other visions of fraud, focused on the broader role of society, political agendas and powerful economic institutions in engendering and preventing fraud, escape from view.  相似文献   
70.
A firm's network capability refers to its ability to build, handle and exploit relationships. These capabilities are interwoven in a complex configuration with the other capabilities and competencies of the firm and in practice, are very difficult to separate from them. Rather than assuming that firms inherently possess network capability, our aim is to discover if the shared managerial logic of top management teams confirms its presence. In order to understand how managers perceive, process and interpret network capability, we guided the management teams of five industrial suppliers through a novel five-step process of introducing, identifying, critically screening, challenging and verifying the capabilities of the firm. The paper introduces a framework for strategic capability architecture and investigates how network capability emerges from among the configuration of other capabilities in industrial firms. We found that network capabilities are central to the formation of customer capabilities. Network capabilities also play an important role as assets contributing to the formation of other capability sets. Furthermore, we found that the networking capabilities act in unison with other capabilities through three different strategic logics termed partnering, value streaming, and horizontal allying.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号