全文获取类型
收费全文 | 283篇 |
免费 | 10篇 |
专业分类
财政金融 | 30篇 |
工业经济 | 34篇 |
计划管理 | 45篇 |
经济学 | 62篇 |
综合类 | 30篇 |
运输经济 | 6篇 |
旅游经济 | 2篇 |
贸易经济 | 48篇 |
农业经济 | 15篇 |
经济概况 | 21篇 |
出版年
2023年 | 13篇 |
2022年 | 4篇 |
2021年 | 14篇 |
2020年 | 11篇 |
2019年 | 8篇 |
2018年 | 5篇 |
2017年 | 6篇 |
2016年 | 11篇 |
2015年 | 2篇 |
2014年 | 18篇 |
2013年 | 10篇 |
2012年 | 12篇 |
2011年 | 24篇 |
2010年 | 14篇 |
2009年 | 12篇 |
2008年 | 14篇 |
2007年 | 16篇 |
2006年 | 23篇 |
2005年 | 11篇 |
2004年 | 13篇 |
2003年 | 9篇 |
2002年 | 10篇 |
2001年 | 7篇 |
2000年 | 5篇 |
1999年 | 1篇 |
1998年 | 3篇 |
1997年 | 2篇 |
1996年 | 4篇 |
1993年 | 5篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1981年 | 1篇 |
排序方式: 共有293条查询结果,搜索用时 265 毫秒
61.
62.
Organized legal professions often play a central role in successful institutional development. The paper’s model examines how legal professions affect institutional reform. Professional review of reform proposals solves a politician’s informational problem in a way that makes democracy, political stability, and professional power substitutes. The model’s applicability is examined by showing that its predictions track the fortunes of lawyers in the USSR and early transition and are consistent with events in 1688 in England and 1789 in France, indicating why these two revolutions had different consequences. The model suggests why and when civil law and common law systems differ.
相似文献
Peter MurrellEmail: |
63.
Emeric Henry 《The Scandinavian journal of economics》2010,112(2):417-440
Exclusive patents sacrifice product competition to provide firms incentives to innovate. We characterize an alternative mechanism whereby later inventors are allowed to share the patent if they discover within a certain time period of the first inventor. These runner‐up patents increase social welfare under very general conditions. Furthermore, we show that the time window during which later inventors can share the patent should become a new policy tool at the disposal of the designer. This instrument will be used in a socially optimal mix with the breadth and length of the patent and could allow sorting between more or less efficient firms. 相似文献
64.
《Socio》2016
While topologies and key player positions and roles differ across terrorist networks, similar ideological networks share similar structures and topologies, maintaining structural properties of their predecessor groups. In this study, we look at basic ideological waves of terrorism in history, classify terrorist network ideologies, and describe the patterns in network topologies and key player characteristics. We show that ideological differences in terrorist networks in part explain the differences in the structure of links between key players. 相似文献
65.
The management and retention of key accounts is imperative in facilitating a firm's long-term viability. Previous examinations of key account relationships have revealed valuable insights into the factors facilitating key account management and driving relationship strength. However, account managers often fail to recognize weaknesses within their existing key accounts and the sources of their relationship vulnerabilities. Utilizing an exploratory inquiry of in-depth interviews with 99 executive decision makers across 52 key accounts cases, the authors assess customer relationship evaluations prior to contract expirations for account retention opportunities valued at over $1.3 billion. Unique positive and negative drivers of key account relationship evaluations are identified in a thematic categorization, along with a subsequent content analysis highlighting their patterned associations with positive and negative relationship evaluations, future business intentions, and business referral behaviors. These patterned associations reveal that positive and negative perceptions of relational drivers often affect outcomes in a differential manner, resulting in a classification of conventional constructs, prevention constructs, and promotion constructs. The results indicate that the desire of a supplier to maximize positive relational outcomes or minimize negative relational outcomes is driven by distinct underlying associations and allow for insights into resource allocation strategies within key account relationships. 相似文献
66.
This paper studies changes in travel mode specific trip rates after life course (and accessibility) related key events from a gender perspective. It is theoretically informed by the mobility biographies approach, and by gender/travel studies. The data used is the German Mobility Panel (GMP) 1994 to 2010 in which households and their members are asked three times in three subsequent years to report the trips they made over a week. The changes reported are regressed to key events over the life course, cohort effects and period effects, while sociodemographics and spatial context attributes are controlled. A cluster–robust regression approach is used to account for the non-independent character of panel observations. Significant effects were found for some key events, including the birth of a child, entry into the labour market, and changes in spatial context, accessibility and mobility. Some effects differed distinctly between men and women, suggesting that men and women are differently affected by life course events. However, taken together the associations found, as well as their gender differences are rather limited. Hence, key events over the life course seem to be only loosely associated with travel mode specific trip rates. 相似文献
67.
对培育和提升我国保险业核心竞争力的战略思考 总被引:3,自引:0,他引:3
何惠珍 《中央财经大学学报》2005,(8):45-49
随着加入WTO后中国保险市场的全面开放,培育和提升我国保险业核心竞争力成为国内保险业可持续发展的关键.本文在对保险业核心竞争力内涵进行科学界定的基础上,客观分析了目前我国保险业竞争力的现状和差距,从而提出了培育和提升保险业核心竞争力的具体对策. 相似文献
68.
针对平衡计分卡(BSC)这种全新的战略管理理念与工具,我们最应该关注的是它的“执行力”。本文首先对“平衡管理”问题进行了重新审视,并试图与Robert Kaplan的四大平衡进行“融合”。在此基础上借用“战略地图”的巨大力量,将公司愿景、战略目标、关键控制点和测量工具之间主要因果关系逐一具体化和形象化,致力于公司战略目标、平衡管理理念具体落实到数字指标。 相似文献
69.
中美贸易摩擦背景下,研究科学合理的“卡脖子”技术识别方法对攻克“卡脖子”技术、提升国家技术实力、维护国家经济安全具有重要意义。通过对“卡脖子”技术的概念和内涵进行分析,得出“卡脖子”技术的识别原则和识别方法,以电子信息产业为例,通过问卷调查法搜集关键核心技术35项,从中识别出“卡脖子”技术13项,得出电子信息产业“卡脖子”技术基础性特征突出、集成电路“卡脖子”威胁大、高端软件相对安全的结论,并从技术、企业、产业、社会层面出发提出我国攻克“卡脖子”技术的政策建议。 相似文献
70.
曹绍君 《黄石理工学院学报》2005,21(4):49-51
阐述了网络安全技术这个综合性的课题,涉及到国际上流行的各种安全技术以及许多方面的应用,论证了实时地保证信息的完整性和确证性的技术实现,提出一种技术只能解决一方面的问题,而不是万能的的思想,从而为网络提供强大的安全服务。 相似文献