全文获取类型
收费全文 | 35703篇 |
免费 | 777篇 |
国内免费 | 1篇 |
专业分类
财政金融 | 6910篇 |
工业经济 | 2657篇 |
计划管理 | 5410篇 |
经济学 | 7825篇 |
综合类 | 726篇 |
运输经济 | 237篇 |
旅游经济 | 597篇 |
贸易经济 | 5388篇 |
农业经济 | 1817篇 |
经济概况 | 4846篇 |
信息产业经济 | 1篇 |
邮电经济 | 67篇 |
出版年
2021年 | 197篇 |
2020年 | 375篇 |
2019年 | 601篇 |
2018年 | 687篇 |
2017年 | 719篇 |
2016年 | 703篇 |
2015年 | 444篇 |
2014年 | 761篇 |
2013年 | 3555篇 |
2012年 | 998篇 |
2011年 | 1160篇 |
2010年 | 976篇 |
2009年 | 1063篇 |
2008年 | 1063篇 |
2007年 | 918篇 |
2006年 | 787篇 |
2005年 | 702篇 |
2004年 | 737篇 |
2003年 | 693篇 |
2002年 | 745篇 |
2001年 | 692篇 |
2000年 | 745篇 |
1999年 | 651篇 |
1998年 | 640篇 |
1997年 | 645篇 |
1996年 | 623篇 |
1995年 | 561篇 |
1994年 | 582篇 |
1993年 | 636篇 |
1992年 | 635篇 |
1991年 | 614篇 |
1990年 | 527篇 |
1989年 | 472篇 |
1988年 | 446篇 |
1987年 | 449篇 |
1986年 | 476篇 |
1985年 | 683篇 |
1984年 | 691篇 |
1983年 | 609篇 |
1982年 | 578篇 |
1981年 | 568篇 |
1980年 | 582篇 |
1979年 | 517篇 |
1978年 | 438篇 |
1977年 | 410篇 |
1976年 | 336篇 |
1975年 | 354篇 |
1974年 | 300篇 |
1973年 | 298篇 |
1972年 | 206篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
Haitham A. Al-Zoubi Jennifer A. O’Sullivan Abdulaziz M. Alwathnani 《Annals of Finance》2018,14(1):105-123
We perform peridogram based cycle analysis of firm capital structure and find evidence that firms’ leverage is both persistent and cyclical. The cyclicality of leverage is supported by the trade-off, pecking order and market timing capital structure theories (Korajczyk and Levy in J Financ Econ 68:75–109, 2003; Bhamra et al. in Rev Financ Stud 23:645–703, 2010). Although market timing theory research supports persistence, previous literature dictates that the trade-off and pecking order theories may predict either persistent or mean reverting leverage. Our tests reject mean reversion in favor of persistent and cyclical leverage. We corroborate pecking order theory literature that predicts leverage is persistent. In these models, when firms’ investment spending is below earnings, leverage decreases. In addition, we examine whether firms change their capital structure as a result of business and financial cycles. Since financial cycles last longer than business cycles, financial cycles should have a long term effect on leverage. Our findings confirm the persistent leverage business cycle models that suggest firms change their capital structure due to financial and credit cycles (Jermann and Quadrini in Am Econ Rev 102:238–271, 2012; Azariadis et al. in Rev Econ Stud 83:1364–1405, 2016). We conclude that leverage is persistent due to the cyclicality of the financing decision. 相似文献
992.
Khawaja A. Saeed Manoj K. Malhotra Sue Abdinnour 《Journal of Purchasing & Supply Management》2019,25(1):40-52
In order to enhance performance, manufacturing firms are building various capabilities and utilizing supply chain networks that are geographically dispersed around the globe. This study examines how decisions related to supply chain architecture and product architecture influence organizational competitiveness. Building on the co-specialization perspective, we evaluate the performance implications of product modularity and supply chain agility. While, product modularity constitutes a product configuration related to sourcing and assembling of products, supply chain agility is a supply chain configuration related to velocity (sensing, comprehending, and responding) and visibility (supplier network, internal operations, and external environment). Both the product and supply chain architectural decisions can impact performance, individually and in conjunction with each other. We empirically test the hypothesized relationships using data collected from 103 manufacturing firms. Results show that supply chain agility and product modularity directly enhance responsiveness and enable organizations to reduce cost. Furthermore, supply chain agility partially mediates the relationship between product modularity and both responsiveness and cost reduction. We elaborate on the key contributions of this study for both research and practice, discuss limitations, and also offer various avenues for further research. 相似文献
993.
In the past decade (2000–2010), pirates from Somalia have carried out thousands of attacks on cargo ships sailing through the Gulf of Aden and the Indian Ocean, causing what others have identified as significant damage to maritime trade. In this paper, we use variations in the spread and intensity of Somali piracy to estimate its effect on the volume of international trade. By comparing trade volume changes along shipping routes located in pirate waters to those that are not, we estimate that Somali piracy reduced bulk commodities trade passing through the Gulf of Aden by 4.1% per year from 2000 to 2010. We find smaller reductions in total trade, consistent with the fact that not all goods are shipped by sea or are targets of pirate attacks. While our estimates suggest that the trade costs of piracy are much lower than what has been suggested in the existing literature, we find that they remain significant and unevenly distributed, with five countries and the EU shouldering 70% of the total costs. 相似文献
994.
995.
Md. Ezazul Islam Md. Rafiqul Islam A B M Shawkat Ali 《The Review of Socionetwork Strategies》2016,10(2):105-123
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously. 相似文献
996.
997.
998.
999.
Contextual Innovation Management Using a Stage‐Gate Platform: The Case of Philips Shaving and Beauty
Patrick A. van der Duin J. Roland Ortt Wieger T. M. Aarts 《Journal of Product Innovation Management》2014,31(3):489-500
To improve its innovation process, Philips Shaving and Beauty (S&B) designed a blueprint for its innovation process. Although it has proved to be quite effective, it has experienced a lack of efficiency, in terms of frequent cost and time overruns, in the fuzzy front end of this process. We suggest a contextual innovation management approach to set up a stage‐gate‐based innovation process platform and thus improve the efficiency in the fuzzy front end, which means that, for different contexts, stage‐gate process variants will be designed from which unnecessary activities are removed and important activities are emphasized. The design is based on the identification of relevant contextual factors to develop variations of the common innovation process within Philips S&B. We distinguished different variants of the innovation processes within Philips S&B that can increase the efficiency in the fuzzy front end. Based on interviews within and outside Philips S&B, we identified problems and potential solutions with regard to efficiency in eight recently finished innovation processes. The results indicate that the most important contextual factors are the distinction between incremental and radical innovations, and between market and technology‐based innovations. We used these factors to design three variants on the basic platform of the stage‐gate process. 相似文献
1000.
Heinz D. Kurz 《Journal of Evolutionary Economics》2015,25(1):147-162