全文获取类型
收费全文 | 8507篇 |
免费 | 177篇 |
国内免费 | 58篇 |
专业分类
财政金融 | 1183篇 |
工业经济 | 372篇 |
计划管理 | 1771篇 |
经济学 | 1326篇 |
综合类 | 1156篇 |
运输经济 | 319篇 |
旅游经济 | 128篇 |
贸易经济 | 969篇 |
农业经济 | 546篇 |
经济概况 | 972篇 |
出版年
2024年 | 17篇 |
2023年 | 71篇 |
2022年 | 122篇 |
2021年 | 207篇 |
2020年 | 269篇 |
2019年 | 165篇 |
2018年 | 113篇 |
2017年 | 187篇 |
2016年 | 226篇 |
2015年 | 232篇 |
2014年 | 541篇 |
2013年 | 678篇 |
2012年 | 688篇 |
2011年 | 937篇 |
2010年 | 670篇 |
2009年 | 591篇 |
2008年 | 635篇 |
2007年 | 500篇 |
2006年 | 488篇 |
2005年 | 347篇 |
2004年 | 252篇 |
2003年 | 199篇 |
2002年 | 153篇 |
2001年 | 104篇 |
2000年 | 64篇 |
1999年 | 54篇 |
1998年 | 30篇 |
1997年 | 16篇 |
1996年 | 14篇 |
1995年 | 6篇 |
1994年 | 8篇 |
1993年 | 10篇 |
1992年 | 5篇 |
1991年 | 2篇 |
1990年 | 4篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 27篇 |
1984年 | 31篇 |
1983年 | 21篇 |
1982年 | 15篇 |
1981年 | 7篇 |
1980年 | 10篇 |
1979年 | 7篇 |
1978年 | 1篇 |
1977年 | 9篇 |
排序方式: 共有8742条查询结果,搜索用时 15 毫秒
1.
可食性小麦蛋白膜的研究 总被引:7,自引:0,他引:7
本文介绍了小麦蛋白及其成膜特性,总结了国内外可食性蛋白膜的研究现状,提出了可食性小麦蛋白膜的研究方案,并对膜的安全性及其应用作了展望。 相似文献
2.
3.
关于如何提高财务管理教学质量的几点建议 总被引:1,自引:1,他引:0
王文俐 《山西经济管理干部学院学报》2005,13(3):82-83
针对财务管理学的特点,本文分别从教学内容、教学方法、教学手段和考核方法这四方面探讨了如何提高财务管理的教学质量. 相似文献
4.
白立娟 《沈阳工程学院学报(社会科学版)》2008,4(2):198-200
"红色管理"是对中国共产党的管理理论、管理思想和管理方法的总结.在现代社会有许多组织独具慧眼,兴起了向中国共产党学习"红色管理"的浪潮.与此同时,"红色管理"理论体系也开始构建."红色管理"在现代社会的盛行有其独特的原因,它是中国管理现状发展的必然选择.但在借鉴"红色管理"的过程中应深刻领会和把握"红色管理"内涵,应紧密联系自身实际借鉴"红色管理",还应面向未来借鉴"红色管理". 相似文献
5.
Juha-Pekka Kallunki Jussi Nikkinen Petri Sahlström Kristina Wichmann 《Accounting & Finance》2006,46(2):265-283
This paper investigates the potential disadvantages of the secondary markets for executive stock options (ESOs). The benefits of such markets are evident, but they might also have negative effects for shareholders. Executives might, for example, use inside information to time their ESO selling. We investigate two personal motives of managers that can be assumed to affect their optimal selling decision, that is, managers' personal portfolio management issues and the use of inside information. We explore these motives by analyzing unique data from Finland, where there are secondary markets for ESOs. The results of the study support the traditional portfolio diversification hypothesis according to which managers tend to sell their ESOs when holding an ESO is equivalent to holding the underlying stock; that is, in such a case a manager's wealth is closely tied to the stock price of the firm. With respect to the use of inside information the results indicate that ESO selling activity is not related to future stock price behaviour, suggesting that managers do not use inside information to determine the selling time of their ESOs. These results imply that the existence of secondary markets for ESOs does not weaken the usefulness of ESOs as the management compensation, although the benefits of such markets are evident. 相似文献
6.
Keld Laursen 《International Journal of the Economics of Business》2002,9(1):139-156
Recent theoretical and empirical analysis in the field of economic organization has focused almost exclusively on identifying organizational practices and complementarities between such practices, without regard for the type of activity in question. However, organizational theory suggests that more knowledge-intensive production activities often involve higher degrees of strategic uncertainty for firms and performance ambiguity in relation to individual employees. Therefore, the 'organic' or 'clan' form of organization - involving the application of 'new' HRM practices - is expected to perform better within knowledge-intensive sectors of the economy, as compared to other sectors. A sample of 726 Danish firms with more than 50 employees in manufacturing and private services is studied. The results show that HRM practices are more effective in influencing innovation performance when applied together, as compared with situations in which individual practices are applied alone. In other words, organizational complementarities obtain. Moreover, the application of complementary HRM practices is more effective for firms in knowledge-intensive industries ('high' and 'medium' knowledge-intensive industries). 相似文献
7.
8.
Vendor Managed Inventory (VMI) involves the vendor making the replenishment decision for products supplied to a customer based on various inventory and supply chain policies. Information sharing between supply chain members is required in VMI. Sometimes VMI decisions are delayed and/or the information shared is inaccurate. This research examines the effects of information delay and accuracy, and the sharing of sales and forecast information in a VMI environment facing stationary and nonstationary demand. The simulation experiments show the impact of information delay, information inaccuracy, and information sharing on a variety of performance measures, including inventory levels and fill rates. 相似文献
9.
Ronald H. Ballou 《Journal of Business Logistics》2005,26(2):143-164
Estimation of the inventory level for an entire class of items is a valuable time saver when control of inventories at the aggregate level, rather than the item level, is of interest. Inventory approximation by location in supply chain network configuration and evaluation of inventory control policy shifts, are two examples of application. In this article, various popular inventory policies are related to a general function known as an inventory turnover curve that expresses inventory levels from the combined demand of multiple items. By knowing some basic item characteristics of representative items in a product class, the type of inventory policy being used, and the current aggregate inventory level, an inventory turnover curve can be constructed. This resulting turnover curve can be used to estimate inventory levels within 4.6%, on the average, of theoretically predicted ones. 相似文献
10.
Denial of Service (DoS) attacks consist of overwhelming a server, a network or a Web site in order to paralyze its normal activity. The additional parameter in Distributed Denial of Service (DdoS) attacks is the distributing strategy. It means that DDoS attacks do not come from a single computer but stem from all accessible channels and servers. Consequences are multiple, ranging from system errors, temporary inability to access the Web site for normal users to challenging the actual reliability of the Internet. Despite this, Internet users show carelessness. The explanation lies in the specificities of DDoS attacks. We explore possibilities to raise users' awareness about the actual amplitude of problems caused by DDoS attacks. We suggest a careful examination of Internet pricing mechanisms and switching from flat to usage-constraining pricing schemes. 相似文献