首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   201篇
  免费   20篇
管理学   67篇
民族学   8篇
人口学   4篇
丛书文集   4篇
理论方法论   15篇
综合类   55篇
社会学   64篇
统计学   4篇
  2024年   1篇
  2023年   7篇
  2022年   8篇
  2021年   3篇
  2020年   13篇
  2019年   21篇
  2018年   14篇
  2017年   8篇
  2016年   7篇
  2015年   12篇
  2014年   16篇
  2013年   29篇
  2012年   14篇
  2011年   13篇
  2010年   8篇
  2009年   8篇
  2008年   6篇
  2007年   11篇
  2006年   10篇
  2005年   2篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2001年   1篇
  2000年   1篇
  1987年   1篇
排序方式: 共有221条查询结果,搜索用时 46 毫秒
91.
信息系统安全漏洞研究   总被引:3,自引:0,他引:3  
信息系统安全漏洞是信息时代存在的一种客观对象,针对信息系统安全漏洞的研究对保护网络安全和信息安全有着重要意义。首先在国内外已有的研究基础上,提出系统地、全面地开展信息系统安全漏洞的研究。然后从信息系统管理角度和技术角度对漏洞做了区分,并且从信息系统安全漏洞存在的宿主和起因对其类型进行了分析,对信息系统安全漏洞的定义做了明确。最后从信息系统安全漏洞研究的主体、客体、行为和属性四个方面进行了论述,提出信息系统安全漏洞生命周期的概念,使信息系统安全漏洞的研究能够从标准规范、知识体系、关键技术与基础理论等多个方面有系统、有针对性的开展。  相似文献   
92.
Risk assessors and managers face many difficult challenges related to novel cyber systems. Among these challenges are the constantly changing nature of cyber systems caused by technical advances, their distribution across the physical, information, and sociocognitive domains, and the complex network structures often including thousands of nodes. Here, we review probabilistic and risk-based decision-making techniques applied to cyber systems and conclude that existing approaches typically do not address all components of the risk assessment triplet (threat, vulnerability, consequence) and lack the ability to integrate across multiple domains of cyber systems to provide guidance for enhancing cybersecurity. We present a decision-analysis-based approach that quantifies threat, vulnerability, and consequences through a set of criteria designed to assess the overall utility of cybersecurity management alternatives. The proposed framework bridges the gap between risk assessment and risk management, allowing an analyst to ensure a structured and transparent process of selecting risk management alternatives. The use of this technique is illustrated for a hypothetical, but realistic, case study exemplifying the process of evaluating and ranking five cybersecurity enhancement strategies. The approach presented does not necessarily eliminate biases and subjectivity necessary for selecting countermeasures, but provides justifiable methods for selecting risk management actions consistent with stakeholder and decisionmaker values and technical data.  相似文献   
93.
The article considers strategic defense and attack of a system that can be separated into parallel elements. The defender distributes its resource between separation and protecting the elements from outside attacks. The vulnerability of each element is determined by an attacker‐defender contest success function, which depends on a contest intensity that may increase or decrease through the separation process. The article determines criteria of separation efficiency for systems without performance redundancy and 1‐out‐of‐N and Q‐out‐of‐N systems with performance redundancy. For the systems with performance redundancy the cases of expected damage proportional to the probability that the demand is not met, and expected damage proportional to the unsupplied demand, are considered.  相似文献   
94.
This paper presents an ecological model approach to conceptualizingrisk of sexual violence against people with learning difficulties,which takes account of the complex social processes involvedin the creation of risk. The concept ‘vulnerability’,often assumed to be a risk-creating characteristic of peoplewith learning difficulties, is too simplistic to take accountof all the processes involved in the formation of risk of sexualviolence. Risk is influenced by personal attributes, self-defenceskills, environments and socio-cultural factors. These riskfactors are closely interlinked and constantly interact withone another. The ecological model provides a tool for examiningthe impact that interactions between individuals and socialenvironments have on an individual’s learning and thedevelopment opportunities that have the potential to increaseself-defence skills.  相似文献   
95.
乡土中国的人口弱化和优化研究   总被引:1,自引:0,他引:1  
文章从人口优化视角剖析乡土人口发展的弱化及其对农村发展带来的影响,对“无农不稳”给出双重意义的新解读;并尝试对三农问题作出新的诠释.无农不稳的新含义是没有新的农民人口,农业将缺乏人口保障,城市将缺乏农村的保障.农村劳动力的无序、过度转移导致农村的凋敝与衰退;人口萎缩、人口亏损和人口断层的新“三农”问题导致农村人口发展脆弱化.文章同时提出兴农、助农、安农、福农的“四农”主张,以优化农村人口发展.  相似文献   
96.
Social work practitioners today are having to deal with ever-increasing numbers of families falling into the at risk category. At the same time, the issues and problems facing these family units are often overwhelming and challenging to resolve. The E.S.S.E. Group Model, outlined in this article, is a new research based approach that was designed to address the most relevant concerns facing families today. It is a unique program that combines family life education within a support group framework. Initially, the model was developed for several school districts in the midwest. Counseling personnel had identified a need for a parent training program that would elicit higher levels of participation. The E.S.S.E. Model accomplishes that goal through its structured yet individualized curriculum along with its parallel and conjoint group set-up. The specific content and process guidelines of this new approach make it easy for clinicians to duplicate in a wide variety of settings. One of the model's curriculums is outlined in detail in this article. Readers will find that the E.S.S.E. program serves as an excellent example of the type of group intervention needed today to help revitalize at-risk families.  相似文献   
97.

This paper responds to van Deth's overview of empirical research on social capital and the difficulties of measuring the concept. We entirely agree with many of the problems that he identifies with the dominant mode of enquiry to date: namely survey and polling methods of attitudinal data. We are sure there are ways of improving on such quantitative methods although we are of the view that qualitative research is especially helpful for exploring the processes of social capital formation and the relationship between networks and norms so crucial to Putnam's use of the concept. Briefly, we discuss our own qualititive work involving intensive interviews with 120 activists drawn from a Citizens Audit of Britain. We address the importance of pre-existing trust and informal processes of mobilization, the significance of experiences of group involvement for generating norms of trust as well as distrust and the extent to which evaluations of such experiences influence wider views of participation and democracy in Britain. In sum, we totally endorse van Deth's call for the greater use of 'multi-methods and multi-level srategies' in empirical research by extending his plea to consider the valuable role of qualitative methods in the study of social capital.  相似文献   
98.
In 2008, the Institut national de santé publique du Québec (INSPQ) undertook a research programme on lotteries. The preliminary qualitative exploratory component enabled us to observe the diversity and ubiquity of lottery advertising to which the vast majority of the population is exposed, including minors and non-players. The aim of a second component was to better comprehend the relationships between exposure to lottery marketing, lottery purchasing habits, attitudes towards gambling, and socio-economic vulnerability indicators. The study's data was collected by a polling firm from a representative sample of adults in the Québec population (n = 2001). Our survey revealed significant links between exposure, gambling behaviour and certain socio-economic indicators: for example, individuals with lower levels of education more often play the lotteries and spend the most on them. In addition, a greater number of people who are less educated and from a low-income household considered that lottery advertising was very or excessively present in their daily lives and that the amount of advertising has increased in recent years. From the perspective of creating healthy environments and protecting vulnerable populations, legislative measures to control the quantity, location and contents of gambling marketing would be promising preventive measures.  相似文献   
99.
Abstract

Through a critical Agambean reading of aging Finland's care deficit, I argue that the human body is politically powerful in its “bare” vulnerability. Even in feminist care theory, however, the neediness of the body is barely recognized as political. This is somewhat paradoxical, given that the vulnerable body is discursively deeply feminized. Thus, through a deconstructive reading of feminist care theory and Joan Tronto's (1993 Tronto, J. 1993. Moral Boundaries: A Political Argument for an Ethic of Care. New York and London: Routledge. [Google Scholar]) ethics of care in particular, I argue for a new political understanding of care, defined as a corporeal relation. In this conception, the political dimensions of care are no longer understood in terms of work or the moral dispositions enabled by caring, as the existing literature largely suggests. Rather, the political relevance of care is seen as departing from that which makes the work of care an absolute necessity: namely, the needy body that belongs to each and every one of us. Through its neediness, the vulnerable body exposes itself as a constant opening of the political, the recognition of which also leads to an alternative type of ethics.  相似文献   
100.
This paper attempts to understand the exclusion of ageing people within contemporary society through developing a model around the notion of the “encounter with the ageing body”. It is divided into three parts. In the first, I develop a model of the encounter through combining Sara Ahmed’s notion of “affective economies” with Shildrick’s theory of the encounter with the “vulnerable self”. I argue that the fear of ageing becomes embodied within the encounter with the ageing body. Specifically, the fear is vulnerability: within the encounter, the youthful self is forced into the recognition of his/her own vulnerability. Modernity requires that this be disavowed, with the ageing body banished to the margins through sequestration to foreclose the possibility of a repeat. In the second section, I discuss the nature of vulnerability within modernity. I explore two approaches to this: in the first, the vulnerability is to the threat of death, which has become particularly problematic within modernity; in the second, the vulnerability is the loss of subjectivity resulting from the ageing body’s failure to correspond to constructions of the ideal body within contemporary capitalism. In the final section, I evaluate whether recent social shifts promise a brighter future for ageing people, arguing that although the situation is not black and white, there is, nevertheless, unfortunately currently relatively limited potential for real change for older people.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号