首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5200篇
  免费   248篇
  国内免费   281篇
管理学   173篇
劳动科学   3篇
民族学   55篇
人口学   271篇
丛书文集   781篇
理论方法论   400篇
综合类   3663篇
社会学   324篇
统计学   59篇
  2024年   11篇
  2023年   48篇
  2022年   60篇
  2021年   73篇
  2020年   108篇
  2019年   88篇
  2018年   86篇
  2017年   105篇
  2016年   154篇
  2015年   197篇
  2014年   312篇
  2013年   367篇
  2012年   375篇
  2011年   449篇
  2010年   357篇
  2009年   400篇
  2008年   340篇
  2007年   410篇
  2006年   454篇
  2005年   341篇
  2004年   277篇
  2003年   236篇
  2002年   179篇
  2001年   146篇
  2000年   84篇
  1999年   28篇
  1998年   11篇
  1997年   8篇
  1996年   9篇
  1995年   7篇
  1994年   1篇
  1992年   3篇
  1991年   1篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
排序方式: 共有5729条查询结果,搜索用时 31 毫秒
101.
托运人向承运人开具清洁提单保函、承运人向托运人签发清洁提单的做法在当前国际货物海运中极为普遍。国际公约、国际组织规则、各国法律以及司法实践对清洁提单保函的性质、效力等仍存在诸多争议。在国际货物海运中,因清洁提单保函引发的纠纷层出不穷。尝试厘清清洁提单保函的性质和效力,探讨清洁提单保函无效的法律后果及其对交易安全的影响,提出针对性的保护方式,旨为应对清洁提单保函带来的问题提供参考。  相似文献   
102.
由于海外劳工在境外就业期间往往会遭遇社会保障双重缺失、社会保障双重缴费以及社会保障待遇支付障碍等诸多困境,使得西欧国家于20世纪初开始探索开展社会保障国际合作,主要方式是国家之间签署社会保障国际协定,合理地承担和分享海外劳工社会保障的责任与效益。经过一个多世纪的发展,社会保障国际合作开始由探索时期步入成熟时期,不仅在覆盖区域、惠及人群以及主要内容方面实现了由小到大、由少到多和由点到面的发展,而且在合作方式上实现了由双边协定到双边与多边协定并举的发展,进而成为了全球各国维护海外劳工社会保障权益的有效途径。  相似文献   
103.
From the Cold War era of the ‘veteran heroes’ to the present view of escaped North Koreans in terms more akin to ‘refugees’ and sometimes even just ‘migrants’, perceptions of North Korean defectors in South Korea have changed as swiftly as the number and origins of Northerners entering the South have expanded. At the same time, government policy for these ethnic ‘brethren’ has evolved considerably, particularly as South Korea has seen fundamental shifts in its independent identity, with important repercussions for the way its citizens view themselves as a collective. This article explores some of the key influences behind changes to policy and perceptions regarding North Korean people in South Korea over the period from 1997 to 2012, by applying international relations theory on national identity and its role in policy formation and change through the need to secure different parameters within that identity.  相似文献   
104.
现有对城乡老年人卫生服务利用不公平的研究多忽略了长期的城乡差异所导致的隐性的农村老年人就医惯性的存在。本研究在控制了收入、医疗保障和就医可及性等因素的条件下,发现就医惯性的存在;并运用集中指数分解法发现,卫生服务的利用存在不公平,偏向于富人,而就医惯性在两种卫生服务利用中的贡献度分别为12%和5%。这种城乡固定差异造成了农村老年人在身体健康、心理健康和自我照料能力上都显著地低于城市老年人。  相似文献   
105.
The Belt and Road Initiative is an important decision for the great rejuvenation of the Chinese nation. Maritime security has a significant place in this process. In recent years, there have been frequent violent terrorist incidents at sea, including piracy, armed hijackings and terrorist attacks, posing a dire threat to both international and Chinese maritime transport interests and seriously challenging the fulfillment of the maritime part of the “Belt and Road Initiative.” Five direct measures can be taken to protect ocean shipping from violence at sea. One example is the defensive measures taken against the Somali pirates. The employment of armed guards from professional security companies on board ship is an effective model for guaranteeing maritime security; it not only meets the standards of international law, but is also legally permitted in many developed countries and regions, and is thus strategically significant for overall Chinese maritime security. In the Chinese context, this model carries its own legal risks. We should embrace a new approach to national security law, strengthen legal guarantees and make concerted efforts to provide warship (military aircraft) escorts to jointly build an optimum model of Chinese maritime security in order to ensure the realization of core Chinese maritime interests.  相似文献   
106.
This article presents a framework for economic consequence analysis of terrorism countermeasures. It specifies major categories of direct and indirect costs, benefits, spillover effects, and transfer payments that must be estimated in a comprehensive assessment. It develops a spreadsheet tool for data collection, storage, and refinement, as well as estimation of the various components of the necessary economic accounts. It also illustrates the usefulness of the framework in the first assessment of the tradeoffs between enhanced security and changes in commercial activity in an urban area, with explicit attention to the role of spillover effects. The article also contributes a practical user interface to the model for emergency managers.  相似文献   
107.
彭万 《职业时空》2012,(1):75-77
分析了80后农民工在城市的就业特征,主要从四方面提出了对策建议:建立健全80后农民工就业的社会保障机制;改革创新80后农民工就业培训模式;为农民工塑造良好的工作环境;构建农民工双向流迁就业体系。  相似文献   
108.
Women’s groups have worked diligently to place gender and women’s vulnerability on the transnational security agenda. This article departs from the idea that negotiating and codifying gender and women’s vulnerability in terms of security represent a challenge to mainstream security contexts. By contrasting the UN Security Council resolutions on women, peace and security with feminist theory, this article aims to analyze what is considered to be threatened when women’s vulnerability is negotiated. The article identifies two approaches to the gender/security nexus: gendering security, which involves introducing ideas regarding gender-sensitive policies and equal representation, and securitizing gender, which proceeds by locating rape and sexual violence in the context of war regulations. We demonstrate that, although these measures are encouraged with reference to women’s vulnerability, they serve to legitimize war and the male soldier and both approaches depoliticize gender relations.  相似文献   
109.
How does the US recruit its citizen spies used to maintain and proliferate coercive power? I use an interdisciplinary approach and a framework of affect theory to argue that there is an ‘affective security curriculum’ (ASC) that assists in explaining the tendencies towards jingoism used in the recruitment and indoctrination of students – as future security workers – in certain academic disciplines. The ASC is precisely the phenomenon that works to construct this expert class and is produced by order words, the most crucial of which is ‘terrorism’, as well as larger cultural norms linked to neoliberalism that have achieved near total dominance since the 1980s. The ASC works by intensifying the (in)ability to act for those in its domain. The necessity of linguistically proficient security workers to the US’ hegemonic project makes this a question of considerable political importance. The ASC is a different approach to answering questions of how US hegemony is maintained. Whereas positivist research agendas, such as content analysis, and postpositivist approaches, such as critical discourse analysis, certainly have their uses (and to which my notion of ASC is indebted), paradigms such as these fail to focus on the engendering processes at work vis-à-vis the expert class, without which the discursive frames such methodologies analyse would simply dissipate. My overarching purpose in this paper is to develop the concept of the ASC, its quiddity, and to present at least an incipient methodology for analysing its critical duties. As my primary intent is to introduce and conceptualize the theoretical framework of the affective security curriculum, the applied segment of this endeavour will be relatively brief – and is designed as a primer for further research.  相似文献   
110.
Researchers recommend the use of pictographs in medical risk communication to improve people's risk comprehension and decision making. However, it is not yet clear whether the iconicity used in pictographs to convey risk information influences individuals’ information processing and comprehension. In an eye‐tracking experiment with participants from the general population (N = 188), we examined whether specific types of pictograph icons influence the processing strategy viewers use to extract numerical information. In addition, we examined the effect of iconicity and numeracy on probability estimation, recall, and icon liking. This experiment used a 2 (iconicity: blocks vs. restroom icons) × 2 (scenario: medical vs. nonmedical) between‐subject design. Numeracy had a significant effect on information processing strategy, but we found no effect of iconicity or scenario. Results indicated that both icon types enabled high and low numerates to use their default way of processing and extracting the gist of the message from the pictorial risk communication format: high numerates counted icons, whereas low numerates used large‐area processing. There was no effect of iconicity in the probability estimation. However, people who saw restroom icons had a higher probability of correctly recalling the exact risk level. Iconicity had no effect on icon liking. Although the effects are small, our findings suggest that person‐like restroom icons in pictographs seem to have some advantages for risk communication. Specifically, in nonpersonalized prevention brochures, person‐like restroom icons may maintain reader motivation for processing the risk information.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号