首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2495篇
  免费   184篇
  国内免费   14篇
管理学   460篇
民族学   9篇
人口学   22篇
丛书文集   151篇
理论方法论   123篇
综合类   1708篇
社会学   170篇
统计学   50篇
  2024年   6篇
  2023年   25篇
  2022年   30篇
  2021年   36篇
  2020年   59篇
  2019年   60篇
  2018年   61篇
  2017年   70篇
  2016年   57篇
  2015年   100篇
  2014年   162篇
  2013年   248篇
  2012年   174篇
  2011年   196篇
  2010年   162篇
  2009年   131篇
  2008年   123篇
  2007年   163篇
  2006年   180篇
  2005年   137篇
  2004年   118篇
  2003年   118篇
  2002年   65篇
  2001年   39篇
  2000年   27篇
  1999年   15篇
  1998年   8篇
  1997年   10篇
  1996年   8篇
  1995年   7篇
  1994年   11篇
  1993年   13篇
  1992年   10篇
  1991年   8篇
  1990年   3篇
  1989年   7篇
  1988年   5篇
  1987年   16篇
  1986年   2篇
  1985年   4篇
  1984年   9篇
  1983年   4篇
  1982年   2篇
  1981年   4篇
排序方式: 共有2693条查询结果,搜索用时 31 毫秒
1.
《Risk analysis》2018,38(10):2193-2207
Social diffusion of information amplifies risk through processes of birth, death, and distortion of message content. Dread risk—involving uncontrollable, fatal, involuntary, and catastrophic outcomes (e.g., terrorist attacks and nuclear accidents)—may be particularly susceptible to amplification because of the psychological biases inherent in dread risk avoidance. To test this, initially balanced information about high or low dread topics was given to a set of individuals who then communicated this information through diffusion chains, each person passing a message to the next. A subset of these chains were also reexposed to the original information. We measured prior knowledge, perceived risk before and after transmission, and, at each link, number of positive and negative statements. Results showed that the more a message was transmitted the more negative statements it contained. This was highest for the high dread topic. Increased perceived risk and production of negative messages was closely related to the amount of negative information that was received, with domain knowledge mitigating this effect. Reexposure to the initial information was ineffectual in reducing bias, demonstrating the enhanced danger of socially transmitted information.  相似文献   
2.
Abstract

Individuals on the autism spectrum are at an increased risk of experiencing violence. This study sought to understand the opinions of adults on the spectrum regarding potential risk and protective factors for interpersonal violence. Twenty-two adults (12 men; 18 to 53 years of age) participated in semi-structured qualitative interviews. Interviews were recorded, transcribed, and analysed. The results of the qualitative analysis identified individual and contextual risk and protective factors. Protective themes focused on individual needs (awareness of the self and the environment, interpersonal knowledge/skills, skill building strategies) and supportive contexts (benefits of a trusted person, advocates, fostering acceptance and inclusion). There is a need for strategies to decrease the vulnerability to, and the impact of, interpersonal violence. Individuals on the spectrum have the capacity to provide important information regarding safety promotion and risk factors for interpersonal violence, and their expertise should play a role in guiding efforts that promote safety.  相似文献   
3.
《Risk analysis》2018,38(8):1634-1655
The work in the article presents the development of an application guide based on feedback and comments stemming from various railway actors on their practices of SIL allocation to railway safety‐related functions. The initial generic methodology for SIL allocation has been updated to be applied to railway rolling stock safety‐related functions in order to solve the SIL concept application issues. Various actors dealing with railway SIL allocation problems are the intended target of the methodology; its principles will be summarized in this article with a focus on modifications and precisions made in order to establish a practical guide for railway safety authorities. The methodology is based on the flowchart formalism used in CSM (common safety method) European regulation. It starts with the use of quantitative safety requirements, particularly tolerable hazard rates (THR). THR apportioning rules are applied. On the one hand, the rules are related to classical logical combinations of safety‐related functions preventing hazard occurrence. On the other hand, to take into account technical conditions (last safety weak link, functional dependencies, technological complexity, etc.), specific rules implicitly used in existing practices are defined for readjusting some THR values. SIL allocation process based on apportioned and validated THR values is finally illustrated through the example of “emergency brake” subsystems. Some specific SIL allocation rules are also defined and illustrated.  相似文献   
4.
A common risk among adolescents is sexual solicitation, in which an adolescent is asked to provide sexual information, engage in sexual talk, or in sexual activities. Although scholars increasingly address this topic from an intrapersonal perspective, there is little attention to factors of language use and message content. In two focus group studies, we investigated whether adolescent girls consider themselves capable of assessing whether an online stranger is an adult or a peer, the extent to which adolescent girls actually succeed in making this assessment, the strategies they apply to do so, and the content- and language-related cues focused on. Our findings suggest that most of the adolescent girls are confident in their ability to assess whether the stranger is a peer or an adult with possible sexual intentions. However, we also found that only 43% were able to correctly make this assessment. Most of the adolescents seem to apply the passive strategy of uncertainty reduction: They scan the profile page of the stranger, check contact information, and the profile picture. They may choose to apply the interactive strategy to find out more about the online stranger. Important content-related cues that alarm adolescent girls are: ignoring personal questions, showing an exaggerated amount of interest, acting as a friend, and being sexually oriented. Language cues mentioned related to word usage, abbreviations, sentence length, and tone.  相似文献   
5.
ABSTRACT

The shift in the technology landscape has altered the technology ecosystem of adolescents and emerging adults in the 21st century. Yet, with greater use of digital gadgets comes greater mental health risks that technological advancement brings. This study provides a narrative review of contemporary cyber risks faced by adolescents and emerging adults. In particular, this review will cover dangers and effects of cyber-bullying, social media, cyber-dating violence, sextortion, sexting, revenge porn, online dating, catfishing, and scammers, with an emphasis to raise awareness and encourage proactive efforts dedicated to address these social concerns as the digital era continues to evolve.  相似文献   
6.
Recent guidance on safety monitoring during drug development, issued by regulatory authorities in the United States and European Union, indicate a shift in focus towards aggregate safety monitoring and scientific evaluation of integrated safety data. The call for program‐level reviews of accumulating safety data, including from ongoing studies, provides an opportunity to leverage the scientific expertise and medical judgment of safety management teams with (a) a multidisciplinary approach, (b) quantitative frameworks to measure level of evidence, and (c) assessments that are product‐specific and driven by medical judgment. A multidisciplinary team, regularly reviewing aggregate safety data throughout the development program, is vital not only for early signal detection but also for generating a better understanding of the accumulating data and context needed for decreasing false alarms.  相似文献   
7.
It has been well established that those working in the sex industry are at various risks of violence and crime depending on where they sell sex and the environments in which they work. What sociological research has failed to address is how crime and safety have been affected by the dynamic changing nature of sex work given the dominance of the internet and digital technologies, including the development of new markets such as webcamming. This paper reports the most comprehensive findings on the internet‐based sex market in the UK demonstrating types of crimes experienced by internet‐based sex workers and the strategies of risk management that sex workers adopt, building on our article in the British Journal of Sociology in 2007. We present the concept of ‘blended safety repertoires’ to explain how sex workers, particularly independent escorts, are using a range of traditional techniques alongside digitally enabled strategies to keep themselves safe. We contribute a deeper understanding of why sex workers who work indoors rarely report crimes to the police, reflecting the dilemmas experienced. Our findings highlight how legal and policy changes which seek to ban online adult services advertising and sex work related content within online spaces would have direct impact on the safety strategies online sex workers employ and would further undermine their safety. These findings occur in a context where aspects of sex work are quasi‐criminalized through the brothel keeping legislation. We conclude that the legal and policy failure to recognize sex work as a form of employment, contributes to the stigmatization of sex work and prevents individuals working together. Current UK policy disallows a framework for employment laws and health and safety standards to regulate sex work, leaving sex workers in the shadow economy, their safety at risk in a quasi‐legal system. In light of the strong evidence that the internet makes sex work safer, we argue that decriminalisation as a rights based model of regulation is most appropriate.  相似文献   
8.
In interviews with members of Britain’s Civil Defence Services, experiences of Cold War voluntarism are recalled in different ways. Some remembered their desire to help defend their nation and local community. Others remembered making a leisure choice that had little connection to the potential nuclear war the organization was ostensibly preparing for. No one provided a well-developed account of civil defence’s ability to provide a defence against the effects of a nuclear war. Popular memory theorists suggest cultural discourse limits the ability of individuals to narrate stories that do not align with culturally valued frameworks: in this case, dominant understandings of civil defence as at best ridiculous or at worst dangerous were established in the 1980s. This article argues that memories of civil defence voluntarism in the 1950-60s have been shaped by these discourses, but that individuals were able to express the different meanings civil defence had in their lives in ways that provide a more nuanced and holistic picture of the intersections of leisure, service and sociability that made up civil defence. As such, it argues that oral history allows us to understand the various ‘horizons of possibility’ that made up individual experiences of the Cold War.  相似文献   
9.
Kun Xie  Kaan Ozbay  Hong Yang  Di Yang 《Risk analysis》2019,39(6):1342-1357
The widely used empirical Bayes (EB) and full Bayes (FB) methods for before–after safety assessment are sometimes limited because of the extensive data needs from additional reference sites. To address this issue, this study proposes a novel before–after safety evaluation methodology based on survival analysis and longitudinal data as an alternative to the EB/FB method. A Bayesian survival analysis (SARE) model with a random effect term to address the unobserved heterogeneity across sites is developed. The proposed survival analysis method is validated through a simulation study before its application. Subsequently, the SARE model is developed in a case study to evaluate the safety effectiveness of a recent red‐light‐running photo enforcement program in New Jersey. As demonstrated in the simulation and the case study, the survival analysis can provide valid estimates using only data from treated sites, and thus its results will not be affected by the selection of defective or insufficient reference sites. In addition, the proposed approach can take into account the censored data generated due to the transition from the before period to the after period, which has not been previously explored in the literature. Using individual crashes as units of analysis, survival analysis can incorporate longitudinal covariates such as the traffic volume and weather variation, and thus can explicitly account for the potential temporal heterogeneity.  相似文献   
10.
魏红珊 《民族学刊》2019,10(6):61-70, 127-129
风云激荡的近代“川边”,历任主政者的川边治理成效殊异:赵尔丰籍“平康三策”,锐意进取,开拓出广阔的川边境域,成功践行“固川保藏”方略。尹昌衡藉个人英雄主义维持短暂的绚烂;其后走马灯式的镇守使无法掌控川边局势,失地溃败;颇具政治韬略的刘文辉,妥善处理民族关系,稳固川边,促使西康成功建省。34年的川边治理为现代西南边疆治理留下了鲜活的经验教训,川滇藏结合部需要新的边疆治理统筹。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号