全文获取类型
收费全文 | 4086篇 |
免费 | 152篇 |
国内免费 | 44篇 |
专业分类
管理学 | 477篇 |
民族学 | 30篇 |
人口学 | 52篇 |
丛书文集 | 336篇 |
理论方法论 | 174篇 |
综合类 | 2348篇 |
社会学 | 708篇 |
统计学 | 157篇 |
出版年
2024年 | 13篇 |
2023年 | 65篇 |
2022年 | 37篇 |
2021年 | 68篇 |
2020年 | 95篇 |
2019年 | 87篇 |
2018年 | 114篇 |
2017年 | 115篇 |
2016年 | 125篇 |
2015年 | 130篇 |
2014年 | 182篇 |
2013年 | 345篇 |
2012年 | 242篇 |
2011年 | 270篇 |
2010年 | 225篇 |
2009年 | 224篇 |
2008年 | 229篇 |
2007年 | 269篇 |
2006年 | 221篇 |
2005年 | 205篇 |
2004年 | 220篇 |
2003年 | 213篇 |
2002年 | 166篇 |
2001年 | 163篇 |
2000年 | 109篇 |
1999年 | 42篇 |
1998年 | 24篇 |
1997年 | 21篇 |
1996年 | 10篇 |
1995年 | 8篇 |
1994年 | 11篇 |
1993年 | 7篇 |
1992年 | 14篇 |
1991年 | 4篇 |
1990年 | 2篇 |
1988年 | 4篇 |
1987年 | 2篇 |
1981年 | 1篇 |
排序方式: 共有4282条查询结果,搜索用时 671 毫秒
1.
While the US Supreme Court was considering two related cases involving the constitutionality of same-sex marriage, one major question informing that decision was whether scientific research had achieved consensus regarding how children of same-sex couples fare. Determining the extent of consensus has become a key aspect of how social science evidence and testimony is accepted by the courts. Here, we show how a method of analyzing temporal patterns in citation networks can be used to assess the state of social scientific literature as a means to inform just such a question. Patterns of clustering within these citation networks reveal whether and when consensus arises within a scientific field. We find that the literature on outcomes for children of same-sex parents is marked by scientific consensus that they experience “no differences” compared to children from other parental configurations. 相似文献
2.
Contemporary theories on leadership development emphasize the importance of having a leader identity in building leadership skills and functioning effectively as leaders. We build on this approach by unpacking the role leader identity plays in the leader emergence process. Taking the perspective that leadership is a dynamic social process between group members, we propose a social network-based process model whereby leader role identity predicts network centrality (i.e., betweenness and indegree), which then contributes to leader emergence. We test our model using a sample of 88 cadets participating in a leadership development training course. In support of our model, cadets who possess a stronger leader role identity at the beginning of the course were more likely to emerge as leaders. However this relationship was only mediated by one form of network centrality, indegree centrality, reflecting one's ability to build relationships within one's group. Implications for research and practice are discussed. 相似文献
3.
贺洪波 《重庆邮电大学学报(社会科学版)》2018,30(3):28-35
最高人民法院、最高人民检察院《关于办理侵犯公民个人信息刑事案件适用法律若干问题的解释》第六条对为合法经营活动而侵犯公民个人信息行为进行独立规制,是新型犯罪罪状表述抽象化与罪状解释具体化、信息时代信息价值多元化与危害行为多样化、现代社会犯罪治理精细化与刑法评价精准化的内在要求.为合法经营活动而侵犯公民个人信息行为相关规范要素中的“为合法经营活动”应理解为主观超过要素,“获利五万元”应作严格解释,“曾因侵犯公民个人信息”应作广义解释,“其他情节严重”应包括信息数量标准. 相似文献
4.
《Journal of Policy Modeling》2020,42(6):1187-1207
This paper investigates the determinants of countries’ choices of monetary policy framework. A brief narrative focused on groupings of countries motivates an econometric analysis which draws on previous work on the determinants of exchange rate regimes, bringing in standard factors as well as the trade networks of potential anchor currency blocs and the financial market depth that are emphasised in the narrative. The model turns out to be able to predict three quarters of countries’ choices, and there is no obvious systematic pattern in the errors. The results have important implications for how countries should choose their monetary policy frameworks. 相似文献
5.
《Risk analysis》2018,38(8):1559-1575
Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game‐theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost‐effective decisions than selfish nonrational or semirational players. 相似文献
6.
文章介绍了近年来在美国、澳大利亚等国盛行的“体裁教学法”,评价了体裁和体裁分析理论,阐述了体裁分析的发展与特色,探讨了体裁分析法在商务语篇教学中的作用。 相似文献
7.
邓廷梅 《贵州工业大学学报(社会科学版)》2002,4(3):24-27
针对迅速崛起的电子商务的特点深入分析电子商务对税收各个方面的冲击和影响 ,提出加大对电子商务征税力度的有关建议 ,对完善电子商务征税有积极意义。 相似文献
8.
供应链与海尔的战略调整 总被引:2,自引:0,他引:2
供应链是现代工商业的一种新的业态形式 ,它通过有效的客户和市场管理、对客户需求的准确预测和迅速反应以及最大程度地降低从原材料到生产、再到销售整个过程的库存和运转费用 ,为终端顾客提供最大的让渡价值 ,提高供应链成员整体的竞争力。海尔集团以超前性的战略眼光对公司的组织管理结构和经营方式进行了战略性的调整 ,为推行供应链管理和经营创造了条件。 相似文献
9.
邹广文 《山东师范大学学报(人文社会科学版)》2002,47(3):3-8
根据市场经济条件下中国企业文化建设遇到的主要问题和发展特点 ,当前加强企业文化建设应树立以人为本的观念、市场观念、用户至上观念、人类整体观念和社会责任感 ,解决好企业管理中的实际问题 ,从理论和实践两个维度对企业文化发展走向作出系统的思考。 相似文献
10.