全文获取类型
收费全文 | 86篇 |
免费 | 1篇 |
专业分类
财政金融 | 24篇 |
工业经济 | 2篇 |
计划管理 | 20篇 |
经济学 | 23篇 |
综合类 | 2篇 |
运输经济 | 1篇 |
旅游经济 | 3篇 |
贸易经济 | 9篇 |
经济概况 | 3篇 |
出版年
2023年 | 2篇 |
2022年 | 2篇 |
2021年 | 1篇 |
2020年 | 3篇 |
2019年 | 5篇 |
2018年 | 5篇 |
2017年 | 5篇 |
2015年 | 3篇 |
2014年 | 5篇 |
2013年 | 8篇 |
2012年 | 3篇 |
2011年 | 6篇 |
2010年 | 5篇 |
2009年 | 6篇 |
2008年 | 4篇 |
2007年 | 5篇 |
2006年 | 3篇 |
2005年 | 1篇 |
2004年 | 2篇 |
2003年 | 2篇 |
2002年 | 6篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1993年 | 2篇 |
排序方式: 共有87条查询结果,搜索用时 15 毫秒
11.
基于矿业监管博弈的激励约束机制研究 总被引:2,自引:0,他引:2
资源型城市地方政府在执行矿业监管权时,通常由于信息不对称及矿业政策执行力度范围限定与中央政府博弈。基于由此导致的矿业生产外部性,通过分析中央政府与地方政府各自的目标偏好和效益函数,利用经济博弈论和矩阵对策,试图寻求矿业监管存在问题的原因。文章尝试在利用行为经济学“前景理论”建模的基础上,借助贝叶斯理论分析,提出贝叶斯风险成本诱导机制,进而得出在该机制的激励约束下矿业监管倾向于帕累托有效。文章最后结合研究结论给出政策建议,为制定我国的能源资源开采政策提供了重要的理论参考。 相似文献
12.
Jos M. Carrera 《Journal of Empirical Finance》1999,6(5):1377
This paper develops a simple optimization model to characterize the behaviour of market participants during currency attacks and tests it empirically. Specifically, we test for the determinants of the timing, magnitude and chance of success of an attack. The empirical part is carried out using Mexican data, as this market provides us with an appropriate target zone framework and with a very rich dataset. We find empirical support for a set of microeconomic determinants which include: daily order flow, inventory management, intra-day price volatility, and the forward intervention-price differential. Finally, we test for the role of central bank reserves in speculative attack dynamics. 相似文献
13.
Kraay [Kraay, A., 2003. Do high interest rates defend currencies during speculative attacks? Journal of International Economics 59, 297-321.] documents the lack of any systematic association between monetary policy and the outcome of a speculative attack. This paper revisits Kraay's work and modifies it by introducing an improved measure of monetary policy and an additional country-specific fundamental, short-term corporate debt, to capture balance sheet vulnerabilities emphasized by the recent currency crises literature. The results show that for low levels of short-term corporate debt, raising interest rates lowers the probability of a successful attack. This effect decreases and eventually reverses for higher levels of debt. These findings contrast earlier empirical evidence and imply a fundamental reconsideration of the role of monetary policy during currency crises. 相似文献
14.
This paper presents a methodology for the detection of critical airports (those whose isolation would cause the largest losses in network connectivity) in the global air transport network (ATN), based on simulating an attack on selected ATN airports using different adaptive selection criteria. The performances of several node selection criteria are compared, together with a new criterion based on Bonacich power centrality. The results show that most critical airports can be detected with an adaptive strategy based on betweenness centrality. The detection of such airports may help the development of contingency plans to develop an appropriate response to any airport closure. 相似文献
15.
我国近些年来经济突飞猛进的发展,其背后房地产对CDP的拉动功不可没,特别在金融危机中,大幅拉动内需,成为我国实体经济的支柱产业,但随着需求增大,房价节节攀升,购房困难成为百姓实现小康生活的头号难题。本文就房价过高产生的原因,以及如何看待我国的房地产政策谈了几点看法,并针对高房价提出了几点对策建议。 相似文献
16.
17.
User costs and bubbles in land markets 总被引:2,自引:2,他引:0
In asset markets with speculative behavior, the long-run equilibrium relationship between asset prices and the discounted flow of future rents may become invalid. We distinguish short-term user costs and longer-term user costs with variables that reflect fundamentals. We show how to work around the empirical problem of measuring speculative expectations about asset price changes and derive a simple user cost formula where the asset price change in the short-term relationship comes out as the long-run change in the overall price level. 相似文献
18.
《Journal of Accounting and Public Policy》2018,37(6):545-563
With increasing security spending in organizations, evaluation of the quality and effectiveness of IT security investments has become an important component in managing these projects. The academic literature, however, is largely silent on post-audit of such investments, which is a formal evaluation of IT resource allocation decisions. IT post-audits are considered a useful risk management tool for organizations and are often emphasized in security certifications and standards. To fill this research gap and contribute to practice, we suggest post-auditing of IT security investments using the generic Markov Chain Monte Carlo (MCMC) simulation approach. This approach does not place stringent conjugate assumptions and can handle high-dimensional Bayesian post-audit inference problems often associated with information security resource allocation decisions. We develop two Bayesian post-audit models using the MCMC method: (1) measuring the effectiveness of an IT security investment using posterior mean score ratios (MSR), and posterior crossover error rates (CER); and (2) measuring the effectiveness through detection of a denial of service (DOS) attack using Bayesian estimation to statistically compare the degree of divergence using the concept of entropy. We demonstrate the utility of the proposed methodology using an email intrusion detection system application. 相似文献
19.
Corporate bond markets enable the efficient allocation of capital among competing firms, as well as an extensive degree of disintermediation. While the role of the junk bond market in financing leveraged buyouts, “fallen angels,” start-ups, small firms, and sovereign governments is known, little is known about interactions between low-risk (AAA) bonds markets and high-risk (CCC and below) bonds markets. In this study, we used a sample of daily data spanning 20 years to investigate the dynamic link in first and second moments between low-risk and high-risk bonds during calm and turbulent periods in the U.S. financial markets. Using asymmetric and nonlinear causality tests, as well as the extended DCC-GJR-GARCH model, we found evidence of an asymmetric and nonlinear unidirectional causal link from high-risk to low-risk bonds markets, which intensifies during bear markets. There is a bidirectional volatility and shock transmission only during normal bond market conditions. The high-risk bonds market induces more destabilizing effects in the corporate bond market than the low-risk bonds market. The time-varying, highly persistent, and negative correlation during normal market conditions provides the opportunity for combining low-risk and high-risk bonds to diversify a portfolio. 相似文献
20.
开放经济下投机攻击的策略分析 总被引:2,自引:0,他引:2
郭清马 《广东金融学院学报》2007,22(2):62-67
在资本高度流动、金融市场高度互联及金融产品大量创新的背景下,投机者的投机攻击策略越来越趋于组合化、立体化;投机者在投机领域的频繁运作,客观上造成了金融危机内的扩散,进而加剧了世界经济、金融体系的不稳定性。 相似文献