首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11318篇
  免费   445篇
  国内免费   181篇
财政金融   320篇
工业经济   948篇
计划管理   3705篇
经济学   2028篇
综合类   1127篇
运输经济   47篇
旅游经济   152篇
贸易经济   1536篇
农业经济   613篇
经济概况   1468篇
  2024年   64篇
  2023年   192篇
  2022年   311篇
  2021年   410篇
  2020年   376篇
  2019年   205篇
  2018年   191篇
  2017年   210篇
  2016年   281篇
  2015年   444篇
  2014年   1043篇
  2013年   1079篇
  2012年   1011篇
  2011年   1174篇
  2010年   946篇
  2009年   607篇
  2008年   628篇
  2007年   585篇
  2006年   510篇
  2005年   450篇
  2004年   307篇
  2003年   235篇
  2002年   190篇
  2001年   152篇
  2000年   108篇
  1999年   66篇
  1998年   42篇
  1997年   29篇
  1996年   13篇
  1995年   18篇
  1994年   17篇
  1993年   8篇
  1992年   4篇
  1991年   3篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1985年   3篇
  1984年   6篇
  1983年   12篇
  1982年   10篇
  1981年   1篇
排序方式: 共有10000条查询结果,搜索用时 265 毫秒
11.
ABSTRACT

We develop a Manipulation Index (ManIx) that captures the potential manipulation intention of dealers during the World Markets/Reuters (WMR) benchmark (London Close) period at 4 pm London time through a unique algorithm and simulation. The application of this model (using a dataset with dealers’ identities) can identify banks that are prone to potential manipulative behavior. The results concerning the identified banks are validated by the regulatory investigations. Implementation of this algorithm allows regulators better direct their limited resources towards more targeted in-depth investigation.  相似文献   
12.
《Business Horizons》2019,62(4):539-548
The U.S. healthcare sector is inadequately prepared to deal with the reality of cyber threats. The increasing use of smart medical equipment and mobile devices is making healthcare organizations more susceptible to ransomware and other types of malware. The size and complexity of operations, coupled with the presence of numerous legacy and incompatible systems, make it difficult to implement effective cybersecurity measures. The daunting nature of the problem often results in an if-it-ain’t-broke-don’t-fix-it stance among senior healthcare leaders. The preponderance of healthcare-related laws, compliance regulations, and security guidance frameworks serve to complicate the cybersecurity challenge further and too often results in senior leadership assuming a state of blissful ignorance. This study sheds light on the key factors contributing to the chaotic state of affairs and presents a roadmap to a more deliberate and proactive approach to cybersecurity risk management.  相似文献   
13.
This study examined how entry‐level employees interacted with social media during three stages of organizational socialization. They navigated between four different media affordances (persistence, editability, visibility, and association) while experiencing them as both enabling and constraining in different socialization stages. Qualitative interview data analysis revealed during anticipatory socialization, job applicants realized visibility and persistence in relation to institutional and individualized socialization. During encounter, new employees managed personal and professional life boundaries carefully against the association and visibility affordances. Although some participants used both public and enterprise social media for obtaining job‐related information and understanding coworkers and company culture, during metamorphosis, most interviewees adopted passive information seeking strategies and experienced a paradoxical tension between the enabling and constraining affordances of social media. Findings are discussed with regards to employees’ exertion of agency in managing their professional impressions and coping with high levels of uncertainty and vulnerability during early stages of socialization.  相似文献   
14.
The deterioration of attractions, landmarks, artefacts and destinations is a critical issue facing tourism across the world. The closure of tourism sites and attractions is increasingly more common due to the difficulty and expense of managing preservation with onsite tourism engagement. However, the closure or destruction of tourism sites presents challenges for tourism development. The inability to foster meaningful visitor engagement at sites has implications for the local communities. This paper aims to explore the efficacy of creating tourism experiences in destinations and sites that have succumbed to over-tourism, resultant deterioration and even, destruction. To achieve this objective, the paper introduces the concept of second chance tourism and the role of innovative preservation methods such as virtual and mixed reality. Based on the proposed framework, the collation of data will provide indications on site preservation and impact mitigation via a second chance to reduce pressure on inherently fragile destinations.  相似文献   
15.
Environmental issues are massively emerging in the current agendas of governments, businesses and consumers all over the globe. Consumers increasingly adopt a more energetic role in the environmental discussion and employ product consumption to manifest their contribution to the debate. Equally, a growing number of businesses try to affect positive social change, whereas others strategically approach green opportunities; at the same time, they persistently intensify their branding offerings to sustain loyalty. This article brings into discussion green consumption values as the authors aim to shed light into the way the latter moderate the effect of brand related factors, namely, brand experiences and brand personality, on brand loyalty. Based on data received from 413 participants and using the wearable technologies industry as the focal context, the study underscores the significance of green consumption values. Findings are discussed, and implications for managers are provided.  相似文献   
16.
This paper reviews some recent blockchain‐based applications for information capture, distribution and preservation. As part of that review, this paper examines two key concerns with current blockchain designs for accounting and supply chain transactions: data independence and multiple semantic models for the same information distribution problem. Blockchain applications typically integrate database, application and presentation tiers all in the same ledger. This results in a general inability to query information in the ledger and other concerns. Further, since most applications appear to be private blockchain applications, there is a concern of agents needing to accommodate multiple blockchains depending on who their trading partners are and what they request. Finally, this paper uses a distributed database to design a ‘blockchain‐like’ system for virtual organizations.  相似文献   
17.
This paper considers the Web as a big data container that can be used by Technology Observatories and administrations to track emerging issues and more specifically emerging technologies. It considers information that is available on the Internet for free from different sources, and proposes a framework that can be useful to characterise them and to detect patterns of dissemination. This framework is made up of 30 metrics obtained from different kinds of sources (general web, patents, scholars?…). Some of them are obtained directly as the number of hits retrieved by queries on a search engine, and other ones calculated by means of ratios. This paper contains the development of a complete case that utilises this framework to characterise emerging technologies included in the well-known Hype Cycle for Emerging Technologies, in this case the 2015 release1 and to analyze patterns of dissemination of these technologies on the Internet.  相似文献   
18.
In this article the impact of technology education, as a new learning area (subject) in the curriculum, on in-service teacher education in South Africa is described in order to ascertain the extent of the impact. The research on which this article is based draws on a variety of experiences and observations in the field at grassroots level (in particular an outreach project in rural communities). The envisaged impact of technology education on South African schools, communities, teacher educators and teachers, the range of in-service teacher education that is required, and the impacts in urban and rural areas are discussed. Finally a number of concluding remarks are made about the extent of the impact of the inclusion of technology education in the new National Curriculum Statement and whether the situation has changed since the implementation of a pilot technology education project in 1998. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   
19.
随着科学技术的不断创新和提高,专利技术的交易越来越频繁,其交易所占贸易的比重也越来越大。文章指出,在专利技术交易发生前后对被交易技术进行必要的产权研究,理顺交易双方的产权关系,明确交易双方的权利和义务,对于交易双方避免交易错位和发生法律纠纷有着重要的指导意义。  相似文献   
20.
This paper investigates India's exceptional development pattern, specifically the major importance of information technology services (ITS), and compares it with China's development pattern. Both countries want to develop capabilities for carrying out the innovation of technologies that compete at the state-of-the-art in the world market. The paper posits that technological/economic success in the contemporary world market requires the ability to innovate complex technologies and complex technology-related services. The share of trade represented by complex technologies is compared with the “high-tech” share. The trading patterns of the two countries are compared using United Nations data. Two case studies of Indian ITS companies are then compared with two case studies of Chinese manufacturing companies. Historical and cultural differences appear to explain some of the differences in the development patterns of the companies located in the two countries.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号