首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9550篇
  免费   623篇
  国内免费   107篇
管理学   600篇
劳动科学   1篇
民族学   78篇
人口学   108篇
丛书文集   1132篇
理论方法论   591篇
综合类   6786篇
社会学   910篇
统计学   74篇
  2024年   14篇
  2023年   84篇
  2022年   113篇
  2021年   142篇
  2020年   200篇
  2019年   166篇
  2018年   207篇
  2017年   246篇
  2016年   278篇
  2015年   327篇
  2014年   697篇
  2013年   755篇
  2012年   732篇
  2011年   849篇
  2010年   661篇
  2009年   591篇
  2008年   588篇
  2007年   764篇
  2006年   695篇
  2005年   573篇
  2004年   445篇
  2003年   417篇
  2002年   250篇
  2001年   199篇
  2000年   111篇
  1999年   37篇
  1998年   14篇
  1997年   10篇
  1996年   13篇
  1995年   18篇
  1994年   8篇
  1993年   11篇
  1992年   10篇
  1991年   11篇
  1990年   2篇
  1989年   7篇
  1988年   4篇
  1987年   12篇
  1986年   2篇
  1985年   2篇
  1984年   6篇
  1983年   2篇
  1982年   3篇
  1981年   4篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
This study provides an historical overview of the IDF Spokesperson’s Unit (ISU) from the early years of the State of Israel until 2009. Analyzing five periods during which the ISU played a key role in Israel's public diplomacy, this research sheds light on the challenges the ISU faced in different periods and circumstances and examines how the ISU tried to modify its methods and actions in response to geopolitical changes and media development, albeit not always successfully. The study suggests better understanding the adaptation process by applying a three-layer framework for analysis: the tactical layer, the strategic layer and the perceptional layer. The findings of this work demonstrate that in adapting to new circumstances, the ISU focused mainly on the tactical response level, with the result that it did not undertake any review or debate over the need for deeper perceptional changes in ISU policies.  相似文献   
2.
Humanitarian aid can be contentious. Should finite national resources be sacrificed to serve the needy abroad? Social identity theorists argue that identification with a superordinate group, in this case the larger world community, should increase individual support for policies such as international humanitarian assistance. However, individuals can simultaneously associate with multiple identities. How does the combination of world and national identities affect support for humanitarian assistance? Using cross‐national survey data, we find evidence that support for international humanitarian aid is highest among those with a strong world identity and weak national identity relative to other identity combinations, though even those with a strong world identity and strong national identity can be supportive of aid.  相似文献   
3.
This study focuses on the Government of Bangladesh and the UK Department for International Development (DFID) public sector capacity‐building project under collaborative public governance. It examines the efficiency and effectiveness of a foreign‐funded and multistakeholder‐led public sector capacity‐development initiative dubbed Managing at the Top Stage 2 (MATT2) project, and how it contributed to the human resource capacity development in Bangladesh. A combination of data from Government sources, in‐depth interviews, focus group discussions, participant observation and author analysis was adopted. The results showed the project to have been largely successful, despite some challenges.  相似文献   
4.
Prime aim is to examine the way the culture sector reuses industrial buildings to instigate cultural activities in the municipalities. The discussion of various actors’ motivation for engagement is based on results from a case study, supplemented with findings from a coarse-meshed telephone survey. At national level overarching political guidelines can be traced back to white papers concerning cultural policy, urban transformation and cultural heritage, and the municipalities’ cultural policies mirror these guidelines. What tends to decide if such initiatives are considered successful are local abilities to cross sectorial divisions and instigate cooperation between municipal planners, private entrepreneurs and NGOs.  相似文献   
5.
《Risk analysis》2018,38(10):2193-2207
Social diffusion of information amplifies risk through processes of birth, death, and distortion of message content. Dread risk—involving uncontrollable, fatal, involuntary, and catastrophic outcomes (e.g., terrorist attacks and nuclear accidents)—may be particularly susceptible to amplification because of the psychological biases inherent in dread risk avoidance. To test this, initially balanced information about high or low dread topics was given to a set of individuals who then communicated this information through diffusion chains, each person passing a message to the next. A subset of these chains were also reexposed to the original information. We measured prior knowledge, perceived risk before and after transmission, and, at each link, number of positive and negative statements. Results showed that the more a message was transmitted the more negative statements it contained. This was highest for the high dread topic. Increased perceived risk and production of negative messages was closely related to the amount of negative information that was received, with domain knowledge mitigating this effect. Reexposure to the initial information was ineffectual in reducing bias, demonstrating the enhanced danger of socially transmitted information.  相似文献   
6.
Abstract

Individuals on the autism spectrum are at an increased risk of experiencing violence. This study sought to understand the opinions of adults on the spectrum regarding potential risk and protective factors for interpersonal violence. Twenty-two adults (12 men; 18 to 53 years of age) participated in semi-structured qualitative interviews. Interviews were recorded, transcribed, and analysed. The results of the qualitative analysis identified individual and contextual risk and protective factors. Protective themes focused on individual needs (awareness of the self and the environment, interpersonal knowledge/skills, skill building strategies) and supportive contexts (benefits of a trusted person, advocates, fostering acceptance and inclusion). There is a need for strategies to decrease the vulnerability to, and the impact of, interpersonal violence. Individuals on the spectrum have the capacity to provide important information regarding safety promotion and risk factors for interpersonal violence, and their expertise should play a role in guiding efforts that promote safety.  相似文献   
7.
《Risk analysis》2018,38(8):1634-1655
The work in the article presents the development of an application guide based on feedback and comments stemming from various railway actors on their practices of SIL allocation to railway safety‐related functions. The initial generic methodology for SIL allocation has been updated to be applied to railway rolling stock safety‐related functions in order to solve the SIL concept application issues. Various actors dealing with railway SIL allocation problems are the intended target of the methodology; its principles will be summarized in this article with a focus on modifications and precisions made in order to establish a practical guide for railway safety authorities. The methodology is based on the flowchart formalism used in CSM (common safety method) European regulation. It starts with the use of quantitative safety requirements, particularly tolerable hazard rates (THR). THR apportioning rules are applied. On the one hand, the rules are related to classical logical combinations of safety‐related functions preventing hazard occurrence. On the other hand, to take into account technical conditions (last safety weak link, functional dependencies, technological complexity, etc.), specific rules implicitly used in existing practices are defined for readjusting some THR values. SIL allocation process based on apportioned and validated THR values is finally illustrated through the example of “emergency brake” subsystems. Some specific SIL allocation rules are also defined and illustrated.  相似文献   
8.
Resistance to women’s public voice and visibility via street harassment and workplace sexual harassment have long constrained women’s use of and comfort in physical public spaces; this gender-based resistance now extends into digital arenas. Women face extreme hostility in the form of digital sexism in discussion rooms, comment sections, gaming communities, and on social media platforms. Reflecting on two years of in-depth interviews with women who have been on the receiving end of gender-based digital abuse (n?=?38), conversations with industry professionals working in content moderation and digital safety, the extant literature, and news stories about digital attacks against women, I offer a lens to think through the prominent patterns in digital sexism, showing (1) that aggressors draw upon three overlapping strategies – intimidating, shaming, and discrediting – to limit women’s impact in digital publics, (2) the way femininity and femaleness are used to undermine women’s contributions, and (3) men call attention to women’s physicality as a way to pull gender – and the male advantage that comes with it – to the fore in digital exchanges. Finally, I argue that when digital sexism succeeds in pressing women out of digital spaces, constrains the topics they address publicly, or limits the ways they address them, we must consider the democratic costs of gender-based harassment, in addition to the personal ones.  相似文献   
9.
The spectre of environmental ‘domestic extremism’ has long been postulated by police leaders and security analysts in Britain. It is a narrative that has justified the commitment of enormous amounts of government resources towards police intelligence work directed at non-violent direct action campaigns. Most controversially, this has included the long-term infiltration of environmental (and other) activist groups by undercover police. This article provides a critical analysis of the justifications put forward in support of the covert surveillance of environmental activists in Britain. The paper proceeds by way of a single case study – a high profile, environmental direct action protest in the north of England – in order to reveal the levels of abuse, manipulation and deception at the basis of undercover protest policing. Through their court case, the activists involved with this action were able to obtain rare insights into the police authorisation documents for the undercover operation that had led to their arrests. An analysis of these documents provides us with a glimpse of the contradictory justifications given by senior police officers for infiltration – now under scrutiny by a public inquiry.  相似文献   
10.
Public health relies on sample surveys to monitor the health of populations and investigate factors that contribute to population health and illness. Such investigations require surveying individuals who are selected in ways that support statistical inference to the population. Faced with rising costs and declining participation, survey researchers are exploring economical ways to recruit samples that validly represent larger populations. The current report describes an innovative resource, the Colorado Adult Population Sample–Survey Research Registry, which maintains survey access to respondents from a probability-based state health survey. We describe recruitment and retention strategies, explore representativeness, report several studies that used the registry, and discuss future directions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号