首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   142551篇
  免费   3987篇
  国内免费   1篇
财政金融   26885篇
工业经济   11898篇
计划管理   22959篇
经济学   31043篇
综合类   1521篇
运输经济   1011篇
旅游经济   2562篇
贸易经济   24604篇
农业经济   6276篇
经济概况   17425篇
信息产业经济   11篇
邮电经济   344篇
  2021年   891篇
  2020年   1701篇
  2019年   2479篇
  2018年   2520篇
  2017年   2688篇
  2016年   2833篇
  2015年   2185篇
  2014年   3536篇
  2013年   15810篇
  2012年   4381篇
  2011年   4444篇
  2010年   3934篇
  2009年   4555篇
  2008年   4138篇
  2007年   3501篇
  2006年   3749篇
  2005年   3782篇
  2004年   3342篇
  2003年   3108篇
  2002年   3044篇
  2001年   2805篇
  2000年   2715篇
  1999年   2589篇
  1998年   2454篇
  1997年   2465篇
  1996年   2326篇
  1995年   2118篇
  1994年   2160篇
  1993年   2117篇
  1992年   2154篇
  1991年   2064篇
  1990年   1915篇
  1989年   1741篇
  1988年   1681篇
  1987年   1686篇
  1986年   1780篇
  1985年   2553篇
  1984年   2435篇
  1983年   2233篇
  1982年   2092篇
  1981年   2000篇
  1980年   1977篇
  1979年   1906篇
  1978年   1701篇
  1977年   1663篇
  1976年   1422篇
  1975年   1307篇
  1974年   1204篇
  1973年   1200篇
  1972年   911篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
871.
872.
873.
874.
This paper investigates whether governments can change market structures through interventions. We study the effects of four political events over the life cycle of the market for daily newspapers in the Netherlands. We find that policy measures meant to lower entry barriers in an expanding industry created new entry and increased survival chances for potential entrants and incumbent newspapers. Exit barrier enhancing policies to reduce concentration tendencies have not been successful.  相似文献   
875.
Lejeune  Miguel A. 《NETNOMICS》2002,4(2):145-162
Denial of Service (DoS) attacks consist of overwhelming a server, a network or a Web site in order to paralyze its normal activity. The additional parameter in Distributed Denial of Service (DdoS) attacks is the distributing strategy. It means that DDoS attacks do not come from a single computer but stem from all accessible channels and servers. Consequences are multiple, ranging from system errors, temporary inability to access the Web site for normal users to challenging the actual reliability of the Internet. Despite this, Internet users show carelessness. The explanation lies in the specificities of DDoS attacks. We explore possibilities to raise users' awareness about the actual amplitude of problems caused by DDoS attacks. We suggest a careful examination of Internet pricing mechanisms and switching from flat to usage-constraining pricing schemes.  相似文献   
876.
The use of transferable discharge permits as a water pollution control policy is rapidly increasing in the United States. Drawing on evidence from existing water quality trading programs, this paper provides a taxonomy of the forms that such markets take. Four main structures are identified: exchanges, bilateral negotiations, clearinghouses, and sole-source offsets. Each of these structures has its own strengths and weaknesses; none is optimal for all scenarios. Since market structure is largely determined by a program's rules, policy makers should be aware of the differences between these structures and the conditions under which each comes to be.  相似文献   
877.
Agricultural policy reform has been an important source of change in the Chinese agricultural sector. The reforms led to productivity growth and helped China to pursue its self-sufficiency goal especially in the grain sector. In order to analyze whether observable productivity growth stems from technologically induced components or from the market induced parts, a multi-input–multi-output model is derived by using an econometric distance function framework. A decomposition allows to distinguish allocative effects, scale effects, technological change, and technical efficiency change. Data on farms in Zhejiang from 1986 to 2000 are used to analyze the impact of policy reform.  相似文献   
878.
Elicitation using multiple price list formats   总被引:2,自引:0,他引:2  
We examine the properties of a popular method for eliciting choices and values from experimental subjects, the multiple price list format. The main advantage of this format is that it is relatively transparent to subjects and provides simple incentives for truthful revelation. The main disadvantages are that it only elicits interval responses, and could be susceptible to framing effects. We consider extensions to address and evaluate these concerns. We conclude that although there are framing effects, they can be controlled for with a design that allows for them. We also find that the elicitation of risk attitudes is sensitive to procedures, subject pools, and the format of the multiple price list table, but that the qualitative findings that participants are generally risk averse is robust. The elicitation of discount rates appear less sensitive to details of the experimental design. Electronic Supplementary Material Supplementary material is available in the online version of this article at . JEL Classification C9, D81, D91 An erratum to this article is available at .  相似文献   
879.
There is ongoing debate about the apparent weak or negative relation between risk (conditional variance) and expected returns in the aggregate stock market. We develop and estimate an empirical model based on the intertemporal capital asset pricing model (ICAPM) that separately identifies the two components of expected returns, namely, the risk component and the component due to the desire to hedge changes in investment opportunities. The estimated coefficient of relative risk aversion is positive, statistically significant, and reasonable in magnitude. However, expected returns are driven primarily by the hedge component. The omission of this component is partly responsible for the existing contradictory results.  相似文献   
880.
Until the stock market bubble burst in 2000–2002, most CFOs viewed their defined benefit pension plans as profit centers and relatively risk‐free sources of income. Since neither pension assets nor liabilities were reported on corporate balance sheets, and expected returns on pension stocks could be substituted for actual returns when reporting net income, the risks associated with DB plans were masked by GAAP accounting and thus assumed to have no bearing on corporate capital structure. But when stock prices and corporate profits fell together, the risks associated with conventional stock‐heavy pension plans showed up first in reduced pension surpluses (or, in many cases, deficits) and then later in higher required cash contributions and lower reported earnings. As a consequence, today's investors (and rating agencies) are viewing pension and other legacy liabilities as corporate debt, and demands for transparency and increased funding have triggered accounting changes and proposed legislative reforms that will further unmask the economics. This article aims to provide both private‐sector and public‐sector CFOs with suggestions for reducing and controlling the cost of providing for the retirement of their employees. Profitable, tax‐paying companies with DB plans should consider (1) funding any unfunded liabilities (if necessary, by issuing debt) and (2) reducing pension equity and interest rate exposures by shifting some (if not all) pension assets into bonds and defeasing the pension liability (achieving a tax arbitrage in the process). And in cases where the expected costs of maintaining DB plans outweigh the benefits, companies should consider freezing or terminating their plans and switching to a defined contribution (DC) or some form of hybrid plan. The authors also propose similar changes for public pension plans, where underfunding and mismatch problems are greater, less transparent, and in some ways less tractable than those of corporate DB plans.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号