首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1199篇
  免费   41篇
  国内免费   11篇
财政金融   102篇
工业经济   94篇
计划管理   426篇
经济学   135篇
综合类   147篇
运输经济   13篇
旅游经济   45篇
贸易经济   173篇
农业经济   41篇
经济概况   75篇
  2024年   5篇
  2023年   13篇
  2022年   14篇
  2021年   14篇
  2020年   22篇
  2019年   10篇
  2018年   18篇
  2017年   26篇
  2016年   17篇
  2015年   34篇
  2014年   93篇
  2013年   101篇
  2012年   74篇
  2011年   118篇
  2010年   120篇
  2009年   62篇
  2008年   78篇
  2007年   78篇
  2006年   78篇
  2005年   59篇
  2004年   56篇
  2003年   27篇
  2002年   39篇
  2001年   37篇
  2000年   18篇
  1999年   8篇
  1998年   10篇
  1997年   6篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1993年   3篇
  1992年   1篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
排序方式: 共有1251条查询结果,搜索用时 109 毫秒
991.
基于插件技术的多用途土地评价信息系统研究   总被引:1,自引:0,他引:1  
研究目的:研制多用途土地评价信息系统,实现不同类型评价业务、评价方法模型的系统集成。研究方法:在分析与归纳现有评价技术流程的基础上,建立多用途土地评价的"业务结点—业务过程"逻辑关系模型,并设计包含数据接口、专业算法和应用表现等层次结构的评价业务插件和调用插件的宿主程序架构。研究结果:开发了土地评价业务结点插件库,在统一的数据库和软件平台上,实现了多用途土地评价业务需求环境下的系统功能集成。研究结论:基于插件思想设计的业务结点插件和宿主模型,有效地解决了多用途土地评价业务的系统集成问题,开发的评价业务结点插件库提高了相关业务系统的开发效率。  相似文献   
992.
计算机技术应用的范围广,种类多。本文结合纺织行业的信息化,介绍了纺织行业所用的计算机技术以及它们在纺织行业中发挥的作用。  相似文献   
993.
王德君 《现代食品》2022,28(2):124-126
本文以分子料理烹饪技术作为研究对象,全方位介绍分子料理的概念、历史起源、种类、特征以及出现的意义,总结了分子料理烹饪技术的优缺点,得出自己的结论和建议,并对行业发展的前景进行展望。  相似文献   
994.
Using manually collected data on the number and category of critical audit matters (CAMs) in the period 2016–2017, we investigate the hitherto unexplored questions of whether CAMs affect firm-specific crash risk, how CAMs influence crash risk in the Chinese capital market, and recognize CAMs that contain incremental information. Our findings are as follows: (1) Crash risk decreases after implementing the new audit standard requiring the disclosure of CAMs; (2) CAMs release negative information and change the capital market information environment; (3) only corporateidiosyncratic CAMs contain incremental information; (4) crash risk is mitigated only by CAMs disclosed by companies with a high shareholding of institutional investors. The main conclusion of our study is a positive assessment of the new audit standard and of CAMs in terms of protecting the interests of investors and strengthening the stability of the capital market to provide a new perspective for supervising the implementation of the new audit standard.  相似文献   
995.
This paper explores how consumers construe a product service system (PSS) for the supply of pushchairs. A PSS is a system of products, services, networks of actors and supporting infrastructure designed to be more sustainable than traditional business models. PSSs face an implementation challenge in consumer markets, and this case based research explores some reasons for this. The study applies personal construct psychology (in particular, the repertory grid technique), which has not previously been used in relation to researching PSSs. Results suggest that a PSS might be difficult to implement in relation to pushchairs. Renting pre‐used equipment may meet resistance because of a perceived risk that acquisition by this means might endanger infants. Participants in the study construed buying new products from specialist infant product shops as being the best way of acquiring them. Accordingly, PSS providers may, for instance, have to implement certified quality assurance processes in order to reassure consumers. Copyright © 2017 John Wiley & Sons, Ltd and ERP Environment  相似文献   
996.
The aim of this paper is to provide an exhaustive survey of the academic research dedicated to the study of human capital‐intensive firms (HCIFs). We use a bibliometric analysis based on the three widely used databases (Econlit, Science Direct and Wiley) over the period 1992–2015. We are adapting a methodology developed in previous works to our specific object of study, and we generate a bottom‐up clustering on keywords, titles and abstracts. Our examination of the data sheds a light on five main clusters of works that respectively focus on (1) critical human resource management, (2) intellectual capital assessment, (3) funding risk and innovation (4) high‐skilled employees supporting economic development and (5) internal and external valuable social networks. In a critical appraisal of our results, we stress that the bibliometric analysis remains silent on how the different clusters are linked with each other. Based on our own appreciation of the HCIFs literature, we propose a further step in the identification of a central question linking up these clusters: a transversal review of the five clusters reveals that HCIFs appear as a network of specialized agents whose complementary human resources are decisive for the value‐creation process.  相似文献   
997.
There has always been a critical, emancipatory tradition within futures studies. Although those voices can still be heard, there has been a growing tendency for futures studies to be driven by more utilitarian needs in business and government. Whilst it is positive that futures thinking and research is increasingly valued within corporate and policy-making settings, much of that work appears to lack genuine plurality of worldviews and interests.The paper traces the changing contexts for futures research over the past 25 years. It argues that futures research needs to be viewed as part of the re-politicisation – in the Habermasian sense – of technocratic decision-making. It suggests that there are three particular reasons for revisiting the need for criticality in futures research: the increasing acknowledgement of systemic interrelatedness (ecological, social, economic), a growth in the forward-looking socio-economic paradigm that permeates both business and policy, and the challenge of theory development. Drawing on social theory and futures research, we suggest three pathways for revived critical futures research: socio-technical practices, future-oriented dialectics, and socio-economic imaginaries. As a result, the paper calls for development in futures studies that would dialectically integrate and overcome the dichotomy between instrumentalisation and (critical) theorising that can be currently understood as somewhat antagonistic. In order to find a balance between these antagonistic dimensions, futures research should be more engaged in enabling critique and revealing assumptions and interests.  相似文献   
998.
李明 《价值工程》2015,(14):136-137
以王家漓江双线特大桥为工程背景,主要介绍了水中承台钢板桩围堰施工技术要点,为类似工程技工技术参考。  相似文献   
999.
Despite increasing interest toward luxury vintage products, companies often struggle to understand why consumers buy those products. This article is aimed to advance knowledge about luxury vintage product consumption by identifying the latent determinants of Italian consumers? purchasing of these products. The article utilizes the means‐end chain (MEC) approach and the laddering interview technique to achieve this goal. Results show that consumers buy luxury vintage products mainly to satisfy their individual identity, improve their self‐confidence, and achieve a sense of fulfillment. The hierarchical value mapping resulting from the MEC analysis demonstrates that luxury vintage product consumption is undeniably aimed to improve consumers? perception of their desired and ideal individual self‐image. The article discusses the managerial implications of the study, along with its limitations and directions for future research.  相似文献   
1000.
Advances in information technology (IT) have prompted tremendous growth in security issues for companies. Increasingly, cyberattacks represent a threat to companies and national security; to prevent them, firms should routinely perform risk assessments of their IT infrastructure and employees. This article highlights the importance of open-source intelligence (OSINT) tools in conducting risk assessments to prevent cyberattacks. More specifically, we performed a vulnerability assessment on the critical infrastructure of a company operating on the U.S. electrical grid. We successfully profiled the company’s network software, hardware, and key IT personnel—using OSINT—and detailed potential vulnerabilities associated with these findings. The results of our study provide empirical evidence for the efficacy of OSINT in improving the security posture of organizations. Our research findings were subsequently used to produce tactical and strategic recommendations for organizations based on the use of OSINT to identify vulnerabilities, mitigate risks, and formulate more robust security policies to prevent cyberattacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号