首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4250篇
  免费   203篇
  国内免费   51篇
管理学   258篇
劳动科学   1篇
民族学   42篇
人口学   220篇
丛书文集   482篇
理论方法论   361篇
综合类   2861篇
社会学   252篇
统计学   27篇
  2024年   12篇
  2023年   47篇
  2022年   45篇
  2021年   63篇
  2020年   84篇
  2019年   71篇
  2018年   74篇
  2017年   86篇
  2016年   125篇
  2015年   134篇
  2014年   239篇
  2013年   252篇
  2012年   305篇
  2011年   345篇
  2010年   274篇
  2009年   299篇
  2008年   260篇
  2007年   320篇
  2006年   352篇
  2005年   275篇
  2004年   222篇
  2003年   186篇
  2002年   134篇
  2001年   106篇
  2000年   69篇
  1999年   27篇
  1998年   9篇
  1997年   11篇
  1996年   13篇
  1995年   7篇
  1994年   8篇
  1993年   7篇
  1992年   7篇
  1991年   2篇
  1990年   2篇
  1989年   5篇
  1988年   4篇
  1987年   8篇
  1986年   1篇
  1985年   3篇
  1984年   5篇
  1983年   2篇
  1982年   2篇
  1981年   2篇
排序方式: 共有4504条查询结果,搜索用时 132 毫秒
81.
彭万 《职业时空》2012,(1):75-77
分析了80后农民工在城市的就业特征,主要从四方面提出了对策建议:建立健全80后农民工就业的社会保障机制;改革创新80后农民工就业培训模式;为农民工塑造良好的工作环境;构建农民工双向流迁就业体系。  相似文献   
82.
Women’s groups have worked diligently to place gender and women’s vulnerability on the transnational security agenda. This article departs from the idea that negotiating and codifying gender and women’s vulnerability in terms of security represent a challenge to mainstream security contexts. By contrasting the UN Security Council resolutions on women, peace and security with feminist theory, this article aims to analyze what is considered to be threatened when women’s vulnerability is negotiated. The article identifies two approaches to the gender/security nexus: gendering security, which involves introducing ideas regarding gender-sensitive policies and equal representation, and securitizing gender, which proceeds by locating rape and sexual violence in the context of war regulations. We demonstrate that, although these measures are encouraged with reference to women’s vulnerability, they serve to legitimize war and the male soldier and both approaches depoliticize gender relations.  相似文献   
83.
How does the US recruit its citizen spies used to maintain and proliferate coercive power? I use an interdisciplinary approach and a framework of affect theory to argue that there is an ‘affective security curriculum’ (ASC) that assists in explaining the tendencies towards jingoism used in the recruitment and indoctrination of students – as future security workers – in certain academic disciplines. The ASC is precisely the phenomenon that works to construct this expert class and is produced by order words, the most crucial of which is ‘terrorism’, as well as larger cultural norms linked to neoliberalism that have achieved near total dominance since the 1980s. The ASC works by intensifying the (in)ability to act for those in its domain. The necessity of linguistically proficient security workers to the US’ hegemonic project makes this a question of considerable political importance. The ASC is a different approach to answering questions of how US hegemony is maintained. Whereas positivist research agendas, such as content analysis, and postpositivist approaches, such as critical discourse analysis, certainly have their uses (and to which my notion of ASC is indebted), paradigms such as these fail to focus on the engendering processes at work vis-à-vis the expert class, without which the discursive frames such methodologies analyse would simply dissipate. My overarching purpose in this paper is to develop the concept of the ASC, its quiddity, and to present at least an incipient methodology for analysing its critical duties. As my primary intent is to introduce and conceptualize the theoretical framework of the affective security curriculum, the applied segment of this endeavour will be relatively brief – and is designed as a primer for further research.  相似文献   
84.
Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed.  相似文献   
85.
The rate of population aging is increasing in the developing world and the trend is particularly dramatic in East Asia. One consequence is sharp increases in old-age dependency ratios which have major implications for the sustainability of current public pension schemes. These trends are pushing pension policy experts in many of these countries to search for new pension models that are more suited to the increased demographic pressures they will be facing in the decades ahead. In this article we discuss five alternative public pension models with a focus on the newest of these models, the notional defined contribution (NDC) approach. We consider three countries with very different pension systems in place, two from East Asia (China and South Korea) and one from South East Asia (Singapore). The central question we address is which (if any) of the limitations in these existing models might more adequately be addressed using a variant of the NDC model. We conclude that the NDC model has the most to offer China and the least to offer Singapore.  相似文献   
86.
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information‐based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions.  相似文献   
87.
梁飞 《学术探索》2012,(1):7-12
高兹是法国当代左翼生态政治思想家,他以法国发展核电技术为例,从技术、经济、生态和安全方面对资本主义使用的核电技术进行了深刻的分析和批判。他指出核电技术是"资本的圈套",符合资本主义积累逻辑,是资本主义专制的政治选择,社会生态重建的基本前提是工具转换。高兹的核电批判理论为我们审视目前的能源发展战略提供了一种新的理论视野,他对节约能源以及采用新技术发展新型能源的思考,对建设生态文明具有重要的价值。  相似文献   
88.
In late 2009 China launched an innovative, voluntary programme that by 2011 had extended pension coverage to 326.4 million people in the rural sector, including contributors and beneficiaries. It requires one contribution per year and provides a flat‐rate benefit and a contributions‐related benefit through a contributory individual account, with a government guarantee that the benefit will continue for life. The programme encourages participation of persons who do not pay income taxes, and thus have no tax incentive to participate, by providing substantial government subsidies. As a further incentive, old‐age benefits are provided to older parents when all their adult children participate in the contributory programme.  相似文献   
89.
本文运用图式理论探讨有效进行公安行业英语口语教学的相关策略。  相似文献   
90.
More often than not, the existing modes of contribution collection and benefit payment of social security organizations are adapted to the collective arrangements that characterize employer‐employee relationships. Extending coverage to individuals in difficult‐to‐reach groups, however, may require new modalities of service that can cope with many separate, secure transactions rather than a few bulk data transfers between organizations. Recent developments in electronic payment show its wide applicability in enabling huge volumes of such individual transactions. It is in this light that the article explores the potentials of this technology and identifies possible arrangements through which electronic payments could surmount barriers that stand in the way of covering difficult‐to‐reach groups. The high level of mobile phone penetration on a global scale augurs well for using e‐payment mechanisms to collect social security contributions and to deliver social security benefits and services. A generic model is used to describe the requisite elements to implement electronic payments in social protection programmes. Based on empirical evidence of current social protection practices from around the world, five scenarios are presented to describe possible configurations for electronic payment, from the simplest to the most sophisticated. The broader objective is to contribute in a practical manner to the international commitment to extend social protection to all, as defined by the 2030 Sustainable Development Goals.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号