全文获取类型
收费全文 | 29914篇 |
免费 | 1014篇 |
国内免费 | 457篇 |
专业分类
财政金融 | 1872篇 |
工业经济 | 1691篇 |
计划管理 | 7900篇 |
经济学 | 5093篇 |
综合类 | 3196篇 |
运输经济 | 532篇 |
旅游经济 | 1023篇 |
贸易经济 | 4557篇 |
农业经济 | 2175篇 |
经济概况 | 3346篇 |
出版年
2024年 | 113篇 |
2023年 | 524篇 |
2022年 | 575篇 |
2021年 | 876篇 |
2020年 | 1134篇 |
2019年 | 750篇 |
2018年 | 757篇 |
2017年 | 971篇 |
2016年 | 922篇 |
2015年 | 994篇 |
2014年 | 2306篇 |
2013年 | 2684篇 |
2012年 | 2485篇 |
2011年 | 3095篇 |
2010年 | 2219篇 |
2009年 | 1835篇 |
2008年 | 1991篇 |
2007年 | 1767篇 |
2006年 | 1502篇 |
2005年 | 1132篇 |
2004年 | 784篇 |
2003年 | 538篇 |
2002年 | 337篇 |
2001年 | 302篇 |
2000年 | 197篇 |
1999年 | 104篇 |
1998年 | 109篇 |
1997年 | 66篇 |
1996年 | 60篇 |
1995年 | 46篇 |
1994年 | 42篇 |
1993年 | 24篇 |
1992年 | 21篇 |
1991年 | 20篇 |
1990年 | 11篇 |
1989年 | 8篇 |
1988年 | 6篇 |
1987年 | 4篇 |
1986年 | 9篇 |
1985年 | 15篇 |
1984年 | 18篇 |
1983年 | 14篇 |
1982年 | 10篇 |
1981年 | 2篇 |
1980年 | 3篇 |
1979年 | 3篇 |
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
41.
Shawna Weingartner 《Accounting Perspectives》2019,18(1):39-42
This two‐part case allows for maximum student engagement through preparation, in‐class discussion, and through a Part B case that is part of the Teaching Note. Through this case, students work to identify possible fraud schemes, plan an investigation, and perform horizontal analysis calculations. Students will learn about the concept of ethical hacking, red flag identification, internal control weaknesses, and investigation considerations for fraud schemes. Further, in‐class planning for next steps and investigation can occur, providing an opportunity for group work and in‐depth learning. This case offers flexibility for instructors in that it can be covered over one class or multiple classes, or can be assigned as an independent or group assignment. This teaching note provides an overview of the case along with guidance for teaching this case. 相似文献
42.
高科技社会衍生“人为风险”,西方发达高科技国家倡导新型风险沟通,而后发场域由于系统落差,呈现出迟滞型风险沟通。通过构建全球化高科技风险社会、全球本地化风险沟通的新分析框架,发现高科技社会我国风险沟通面临着风险的社会放大、气泡结构、路径互动阙如、手段叠加、目标战略缺失、过程碎片化等迟滞困境。通过创新理念、吸纳型风险沟通、复合式路径、平衡化手段、连续统、政府学习和政府职能的“七位一体”再造,可有效重塑高科技社会我国风险沟通,推进国家风险治理体系和治理能力现代化。 相似文献
43.
Automated content analysis of online travel reviews allows identification of topics of travelers' satisfaction, yet its domain is not well researched. We suggest that the Anna Karenina principle positing a greater variability of the factors leading to business failure as opposed to those leading to success can be applied to the domain of visitors’ reviews of historic and cultural attractions. The larger variability of issues in reviews of dissatisfied visitors is likely to result in limitations for automated topic modeling. We confirm our proposition using TripAdvisor reviews of the Terracotta Army museum in China, and validate the outcome with two additional sites. The study strongly suggests that application of unsupervised topic mining algorithms to negative reviews may be problematic and the results should be treated with caution. The main themes of dissatisfaction of visitors to all three sites are reported and practical implications for management of the attractions are discussed. 相似文献
44.
We survey the methodological advances in DEA over the last 25 years and discuss the necessary conditions for a sound empirical application. We hope this survey will contribute to the further dissemination of DEA, the knowledge of its relative strengths and weaknesses, and the tools currently available for exploiting its full potential. Our main points are illustrated by the case of the DEA study used by the regulatory office of the Dutch electricity sector (Dienst Toezicht Elektriciteitswet; Dte) for setting price caps. 相似文献
45.
旅游收入是旅游经济活动的重要内容,它一方面反映了旅游者的旅游需求通过旅游经营者的旅游供给而不断得到满足,另一方面又体现着旅游产业部门和企业在产经营活动的价值运行与价值实现。旅游收入与分配是旅游经济运行的前提,对其进行考察分析,是十分重要的。本章从收入和分配两个方面入手,对旅游收入分类、指标、旅游企业收入和分配以及旅游收入乘数的作用等进行了分析和阐述。 相似文献
46.
Luis Ubeda 《Economic Theory》2003,23(1):195
Summary. Although not assumed explicitly, we show that neutrality plays an important role in Arrow and other impossibility theorems. Applying it to pivotal voters we produce direct proofs of classical impossibility theorems, including Arrow's, as well as extend some of these theorems. We further explore the role of neutrality showing that it is equivalent to Pareto or reverse Pareto, and to effective dictatorship for non-null social welfare functions satisfying the principle of independence of irrelevant alternatives. It is also equivalent to Wilson's Citizens' Sovereignty--which is related to the intuition that symmetry over alternatives makes social preference depend only on citizens' preferences. We show that some of these results are more fundamental than others in that they extend both to infinite societies and to considerably smaller domains of preferences. Finally, as an application of Arrow's theorem, we provide a simple proof of the Gibbard-Satterthwaite theorem.Received: 13 April 2000, Revised: 6 December 2002, JEL Classification Numbers:
D71, C70.I thank Salvador Barberá, Luis Corchón, Cesar Martinelli, Eric Maskin, Tomas Sjöström, Ricard Torres, José Pedro Ubeda, and an anonymous referee for feedback. The proofs of Arrow's theorem and two Wilson's theorems come from a note I wrote in 1987 at Universitat Autónoma de Barcelona (Ubeda [16]). In 1996 Geanakoplos [7] wrote a proof of Arrow's theorem similar but not identical to mine. All work in this paper is independent of his. 相似文献
47.
Sharon A. JohnsonJoe Zhu 《Socio》2003,37(2):125-139
Selecting the most promising candidates to fill an open position can be a difficult task when there are many applicants. Each applicant achieves certain performance levels in various categories and the resulting information can be overwhelming. We demonstrate how data envelopment analysis (DEA) can be used as a fair screening and sorting tool to support the candidate selection and decision-making process. Each applicant is viewed as an entity with multiple achievements. Without any a priori preference or information on the multiple achievements, DEA identifies the non-dominated solutions, which, in our case, represent the “best” candidates. A DEA-aided recruiting process was developed that (1) determines the performance levels of the “best” candidates relative to other applicants; (2) evaluates the degree of excellence of “best” candidates’ performance; (3) forms consistent tradeoff information on multiple recruiting criteria among search committee members, and, then, (4) clusters the applicants. 相似文献
48.
随着网络技术的广泛应用,网络安全也越来越受到重视。本简述了网络安全问题的定义和TCP/IP协议的安全漏洞。同时,介绍了当前网络采用的安全技术。 相似文献
49.
While the dynamic theory of production provides little insight towards identifying a specific functional form for the firm's technology, dynamic production analysis has been explored traditionally in a parametric framework. A nonparametric dynamic dual cost approach to production analysis is developed in this article. Recovering technological information from intertemporal cost minimizing behavior is possible without imposing a parametric functional form on the firm's technology. Nonparametric tests to analyze the structure of a dynamic technology are presented from a dynamic cost minimizing perspective. The empirical implementation of these tests is illustrated for a balanced panel data set of Pennsylvania dairy operators during the time period 1986–1992. 相似文献
50.
The Graph Model for Conflict Resolution is a flexible methodology for systematically studying strategic conflicts in the real world, and is therefore a natural tool for negotiation support. The basic definitions underlying the graph model are reviewed, and the techniques for analysis and interpretation are discussed. The modeling and analysis of a case study, an international trade negotiation concerning the export of Canadian softwood lumber to the United States, are used to demonstrate the practical application of the Graph Model for Conflict Resolution as a negotiation support tool. The modeling and analysis is carried out using the GMCR software system. The ability of the Graph Model for Conflict Resolution to provide insights and advice to negotiators is emphasized. 相似文献