首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   14230篇
  免费   339篇
财政金融   2671篇
工业经济   1060篇
计划管理   2313篇
经济学   3036篇
综合类   133篇
运输经济   75篇
旅游经济   238篇
贸易经济   2260篇
农业经济   632篇
经济概况   2123篇
邮电经济   28篇
  2020年   150篇
  2019年   214篇
  2018年   240篇
  2017年   274篇
  2016年   276篇
  2015年   193篇
  2014年   282篇
  2013年   1317篇
  2012年   383篇
  2011年   404篇
  2010年   352篇
  2009年   372篇
  2008年   383篇
  2007年   355篇
  2006年   325篇
  2005年   297篇
  2004年   250篇
  2003年   275篇
  2002年   281篇
  2001年   254篇
  2000年   259篇
  1999年   291篇
  1998年   267篇
  1997年   226篇
  1996年   230篇
  1995年   219篇
  1994年   212篇
  1993年   226篇
  1992年   223篇
  1991年   220篇
  1990年   179篇
  1989年   201篇
  1988年   170篇
  1987年   157篇
  1986年   161篇
  1985年   295篇
  1984年   279篇
  1983年   255篇
  1982年   230篇
  1981年   219篇
  1980年   236篇
  1979年   230篇
  1978年   190篇
  1977年   203篇
  1976年   165篇
  1975年   160篇
  1974年   157篇
  1973年   143篇
  1972年   106篇
  1971年   105篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
71.
72.
Abstract.  We use tax‐based longitudinal microdata for 1982–99 to (i) examine how earnings distributions have shifted, (ii) identify changes in earnings mobility patterns, and (iii) replicate and update Beaudry and Green's cohort analysis of age‐earnings profiles. We find: (i) increased polarization of men's earnings and marked decline in real earnings of workers aged 20–4; (ii) general decline in men's earnings mobility, while women's mobility has increased for young and prime‐age workers; and (iii) upward drift in earnings profiles of 1960s–1970s entry cohorts and downward shifts for 1980s–1990s cohorts (largely confirming Beaudry and Green's findings), but suggestive of steepening profiles for the 1990s cohorts. JEL classification code : J31,O33  相似文献   
73.
Ohne Zusammenfassung  相似文献   
74.
75.
76.
The emerging concern about software piracy and illegal or unauthorized use of information technology and software has been evident in the media and open literature for the last few years. In the course of conducting their academic assignments, the authors began to compare observations from classroom experiences related to ethics in the use of software and information technology and systems. Qualitatively and anecdotally, it appeared that many if not most, students had misconceptions about what represented ethical and unethical behaviors in these realms. Clearly, one can argue that if college students are uncertain about what constitutes appropriate and inappropriate behavior then this uncertainty will be carried forward into their workplaces upon graduation. Furthermore, if their workplaces don't provide ethics training as a component of a new employee orientation program, one can project a potential for unintentional violations and infringements of copyrights and law in the field. This study was conducted among graduate and undergraduate students to gain insight into their attitudes, perceptions and understanding of some of the relevant ethics issues. A questionnaire of 11 statements was employed that described ubiquitous but most likely unethical (or surely dubious) behaviors in the prevailing business and academic environments. Each respondent was asked to evaluate each statement twice (once for “self” and once for “colleague”) on a five-option highly ethical (5) to neutral (3) to highly unethical (1) scale. The statements were worded such that lower instrument score was associated with higher ethical responses. The questionnaire's two-part structure was designed to solicit honest answers. The encouraging learning from this study was that the overall sample and its various sub-samples did not consider any of the eleven behaviors to be “ethical” or “highly ethical.” It was also encouraging to note that the overall sample and all sub-samples considered “highly unethical” those behaviors associated with personal privacy or property or outright theft. This indicated that moral judgment and probity prevail. The discouraging learning was that behaviors associated with the use of enterprise property were viewed as “neutral” i.e., neither “ethical” nor “unethical.” These findings suggested confusion and lack of clarity and definition around workplace deportment as it regards ethics in software and information technology use. The current study suggests that additional research needs to be conducted to define and clarify the issues, which in turn can form the basis for programs to rectify or at least ameliorate the situation.  相似文献   
77.
The purpose of this study was to assess the basis behavior of the Live Cattle Futures contract at the Chicago Mercantile Exchange (CME) before and after the 1995 contract changes. Additionally, an alternative method of basis calculation utilizing weighted mean futures prices versus settlement futures prices was compared to determine which method provides a better representation of the basis level. Within a regression model with heteroskedascity error framework, we found that the level of nearby basis in the period after June 1995 has shifted lower and the average monthly open interest of net commercial long positions has substantially increased after the contract modifications. These empirical results are consistent with the notion that more long activity entered the market in response to the contract modifications. Additionally, an alternative (new) measure of basis calculation (cash price minus weighted mean futures price) produced similar results to two other commonly used measures. In conclusion, the 1995 contract changes have neither increased nor decreased the volatility of live cattle basis. © 2004 Wiley Periodicals, Inc. Jrl Fut Mark 24:557–590, 2004  相似文献   
78.
Cross‐docking replaces traditional warehousing, enabling continuous flow of items without storage. Here we model location‐distribution networks, that include cross‐docking facilities, to obtain the latter's impact on the supply chain. We formulate optimization models to minimize total cost in three multi‐echelon networks, each model generalizing the preceding one. The first includes a single manufacturer, one product type, and multiple customers. Cross‐docks are to be located between origin and destinations. Besides solving optimally, a tool for quantitative analysis of direct‐shipment decisions is developed. The second model considers more than one product: We determine a cost‐effective sequence of items for indirect shipment (via cross‐docks). Finally, in a network with multiple origins, optimal solutions are obtained for 40 medium‐sized and larger examples.  相似文献   
79.
This paper attempts to understand what drives Japanese venture capital (JVC) fund managers to select either active managerial monitoring or portfolio diversification to manage their firms' investment risks [J. Bus. Venturing 4 (1989) 231]. Unlike U.S. venture capitalists that use active managerial monitoring to gain private information in order to maximize returns [J. Finance 50 (1995) 301], JVCs have traditionally used portfolio diversification to attenuate investment risks [Hamada, Y., 2001. Nihon no Bencha Kyapitaru no Genkyo (Current State of Japanese Venture Capital), Nihon Bencha Gakkai VC Seminar, May 7]. We found that performance pay is positively related to active monitoring and that management ownership is positively related to active monitoring and negatively related to portfolio diversification. The managerial implication of our study is that venture capitalists should be as concerned about the structure of their incentive systems for their fund managers as they are for their investee-firm entrepreneurs. Agency theory says that contingent compensation is a self-governing mechanism for individual effort that is difficult to measure and verify. When properly applied, equity ownership and performance-based pay can have powerful influencing effects on the strategic choices of managers.  相似文献   
80.
QUADRATIC TERM STRUCTURE MODELS FOR RISK-FREE AND DEFAULTABLE RATES   总被引:4,自引:0,他引:4  
In this paper, quadratic term structure models (QTSMs) are analyzed and characterized in a general Markovian setting. The primary motivation for this work is to find a useful extension of the traditional QTSM, which is based on an Ornstein–Uhlenbeck (OU) state process, while maintaining the analytical tractability of the model. To accomplish this, the class of quadratic processes, consisting of those Markov state processes that yield QTSM, is introduced. The main result states that OU processes are the only conservative quadratic processes. In general, however, a quadratic potential can be added to allow QTSMs to model default risk. It is further shown that the exponent functions that are inherent in the definition of the quadratic property can be determined by a system of Riccati equations with a unique admissible parameter set. The implications of these results for modeling the term structure of risk-free and defaultable rates are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号