首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   249篇
  免费   23篇
财政金融   31篇
工业经济   42篇
计划管理   45篇
经济学   43篇
综合类   2篇
运输经济   5篇
旅游经济   11篇
贸易经济   61篇
农业经济   10篇
经济概况   22篇
  2023年   4篇
  2022年   4篇
  2021年   3篇
  2020年   14篇
  2019年   17篇
  2018年   13篇
  2017年   18篇
  2016年   12篇
  2015年   9篇
  2014年   11篇
  2013年   32篇
  2012年   12篇
  2011年   14篇
  2010年   14篇
  2009年   10篇
  2008年   13篇
  2007年   12篇
  2006年   13篇
  2005年   5篇
  2004年   6篇
  2003年   1篇
  2002年   3篇
  2001年   2篇
  2000年   1篇
  1999年   4篇
  1998年   1篇
  1997年   4篇
  1996年   2篇
  1995年   1篇
  1994年   1篇
  1993年   3篇
  1990年   1篇
  1989年   1篇
  1986年   2篇
  1985年   2篇
  1983年   3篇
  1976年   1篇
  1973年   1篇
  1970年   1篇
  1967年   1篇
排序方式: 共有272条查询结果,搜索用时 15 毫秒
71.
This article reports on the challenges faced when enterprise risk management courses (commonly studied by practitioners after several years of actuarial practice) were introduced into a postgraduate coursework degree, and taught concurrently with Actuarial Control Cycle (Part II) units. A small sample of students were interviewed, and the information gleaned from these interviews combined with the reflections provided by teaching staff is used to argue that although not problem‐free, the overall gain to students makes the project worthwhile. Assessment structure and use of class time in particular are examined as key features of the class, and potential improvements are suggested.  相似文献   
72.
We use daily positions of futures market participants to identify informed traders. These data contain 8,921 unique traders. We identify between 94 and 230 traders as overnight informed and 91 as intraday informed with little overlap. Floor brokers/traders are over-represented in the overnight informed group. The intraday informed group is dominated by managed money traders/hedge funds and swap dealers, with commercial hedgers under-represented. We find that characteristics such as experience, position size, trading activity, and type of positions held offer significant predictive power for who is informed. An analysis of daily trader profits confirms that we select highly profitable traders.  相似文献   
73.
In this paper, we examine the role of national culture in corporate takeover decisions, by arguing that managerial risk tolerance (a combination of risk aversion and risk perception), at the national level, is a cultural trait and affects the expected net synergies CEOs require. We propose a theoretical framework that links CEO risk tolerance to the expected net synergies. We empirically show that CEOs of firms located in countries with lower levels of risk tolerance, measured by Hofstede’s (1980, 2001) uncertainty avoidance score, require higher premiums on takeovers, and show that uncertainty avoidance plays a greater role in relatively large takeovers. Additional testing reveals that CEOs from high uncertainty avoiding nations engage less in cross-border/cross-industry takeovers, suggesting that uncertainty avoidance captures more the CEO’s risk perception than his/her risk aversion.  相似文献   
74.
Air medical healthcare (AMH) professionals care for critically-ill individuals while conveying them to healthcare centres from distant, and frequently dangerous, locations. AMH professionals experience additional health and safety issues beyond the “typical” stressors faced by other healthcare professionals. Therefore, we integrated the safety and psychosocial health literatures to examine the relationship between workplace stressors (risk perception, worries, and patient-care barriers) and two components of burnout (emotional exhaustion; depersonalization), and the moderating impact of job control and team efficacy for 106 Canadian AMH professionals. Worries over medical hassles and barriers to patient care uniquely predicted emotional exhaustion. Lack of perceived control over one's job was related to exhaustion and depersonalization after controlling for stressors. Job control and team efficacy buffered some of the stressor-burnout relationships. Copyright © 2009 ASAC. Published by John Wiley & Sons, Ltd.  相似文献   
75.
Aaron 《中国广告》2007,(4):142-143
“新年了,祝你百事可乐!”每年春节,人们相互间都会转发类似的祝福,在祝福的传递间渲染着节日的喜庆。春节,正是百事可乐历年来品牌推广的重点排期,也是营销活动大放异彩的重要时刻。  相似文献   
76.
Aaron 《中国广告》2007,(6):158-159
女人爱钻戒,因为它的纯洁和璀璨还有什么比钻石更具诱惑力也许只有比钻石更闪耀的无瑕肌肤肌肤如雪,吹弹可破女人一生永恒的追求征服女人,从网上开始奢侈品,从小众向大众过渡提及奢侈品,很多女人会想到Dior。Dior是一个历史悠久,长期屹立于世界时尚舞台前沿的品牌。  相似文献   
77.
Drawing from clinical and organizational narcissism research, we develop a novel measure of narcissistic rhetoric, investigating its prevalence in a sample of 1863 crowdfunding campaigns. An experiment using 1800 observations further validates our measure and confirms our hypothesized inverted-U relationship between narcissistic rhetoric and crowdfunding performance. Leveraging social role theory, we explore sex, sexual orientation, and race as potential moderators of this relationship. Moderation tests reveal LGBTQ entrepreneurs generally yield greater performance when using narcissistic rhetoric than heterosexuals while racial minorities underperform Caucasians using narcissistic rhetoric. Our findings suggest successful crowdfunding campaigns must balance narcissistic rhetoric with entrepreneurs' perceived social roles.  相似文献   
78.
Crypto-mining attacks have emerged as a new generation of web-based attacks which have seen cybercriminals eschew the infamous crypto ransomware. The watering hole attack vector has by far been the most widely employed attack methodology but it faces the task of luring the victim to the infected web resources. However, cryptojacking injection presents a paradigm shift to web-based crypto-mining attacks in that it eliminates the need for a pivotal third-party such as the exploitable web server. Thus, instead of attacking credit card and other private information of e-commerce users, attackers seek to maliciously abuse a victim’s CPU to generate cryptocurrency. In this paper, we investigate and evaluate cryptojacking injection – a state-of-the-art web-centric attack vector in the crypto-mining attacks landscape. We formulate an attack model based on finite state machines which depicts the various breaches of confidentiality, integrity and availability in the web system as the attack progresses. We show how this new attack vector attacks some of the core components of e-commerce (URL, HTTP and HTML) to generate Monero crypto currency from benign web users. We evaluate our modeling approach with a series of experiments with two attack scenarios using different operating systems. Results show that the attack is indeed cross-platform and feasible on any operating system of a browser-capable device. We analyze the generated network traffic during the attack and draw features such as URLs and the parsed files, the associated cryptographic hashes, and the IP addresses of the crypto-mining domains. These, together with host-based features such as exhaustive CPU usage can be used as indicators of compromise and subsequently act as feed into intrusion detection systems.  相似文献   
79.
Millennial consumers are increasingly becoming important actors in business that account for sufficient purchasing power. However, Millennials are infamously narcissistic and their views of ethics are more relaxed than previous generations (i.e., Baby Boomers, Generation X). Millennials remain poorly understood in general, especially in the context of developing countries. Hence, the purpose of this study was to profile this generation by segmenting Millennials in Indonesia and investigating differences between these segments on their ethical beliefs and Machiavellianism, an important personality characteristic. This study used a convenience sample from a university in Indonesia (N = 540). The TwoStep cluster analysis produced three segments, namely, “The Religious Millennials”, “The Lukewarm Religious Millennials” and “The Least Religious Millennials”. Consumers who are highly religious are less likely to engage in various unethical behaviours. Interestingly, no significant differences were found between The Lukewarm Millennials and The Least Religious Millennials on their ethical beliefs. This research makes several research contributions. First, this study extended the Hunt–Vitell theory of ethics, where an individual (i.e., Millennials) confronts a problem perceived as having ethical content. Second, the study examined consumer ethics in the context of developing countries where religion plays a significant role in people’s daily life. Third, through understanding different segments, the results assist educators, social marketers and public policy makers in creating an effective campaign to reduce unethical behaviour among Millennials.  相似文献   
80.
We consider patent pool formation by owners of essential patents for differentiated standards that may be complements or substitutes in use. Pooling improves coordination in terms of royalty setting within a standard but provokes a strategic response from licensors in the competing standard. We characterise the incentives to form and defect from pools within standards and show how pool formation and stability depend on competition between standards. We also examine strategic patent pool formation by consortium standards and show that policies promoting compatibility of standards may increase or decrease welfare depending on the effects on the incentives to form pools.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号