首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   206篇
  免费   21篇
  国内免费   2篇
管理学   66篇
民族学   5篇
人口学   3篇
丛书文集   15篇
理论方法论   14篇
综合类   79篇
社会学   46篇
统计学   1篇
  2023年   1篇
  2021年   1篇
  2020年   9篇
  2019年   9篇
  2018年   3篇
  2017年   10篇
  2016年   7篇
  2015年   7篇
  2014年   11篇
  2013年   22篇
  2012年   17篇
  2011年   9篇
  2010年   9篇
  2009年   8篇
  2008年   11篇
  2007年   20篇
  2006年   13篇
  2005年   14篇
  2004年   14篇
  2003年   17篇
  2002年   15篇
  2001年   2篇
排序方式: 共有229条查询结果,搜索用时 203 毫秒
1.
To better understand how media exposure to terrorism-related images can lead to perceiving immigrants as more threatening, in the present study we manipulated participants’ exposure to media coverage of terrorist attacks and investigated how this may influence people's perception of Arab immigrants. Considering the important role of regulatory abilities when facing stressful events like terrorist attacks, we measured individual differences in both trait emotional intelligence and resting heart rate variability (HRV). Results showed that participants perceived Arab immigrants as more threatening in the media exposure condition than in the control condition. Importantly, there were moderating effects of both trait emotional intelligence and HRV. People with lower trait emotional intelligence or lower HRV at rest felt more threatened in the media exposure condition compared to the control condition, whereas this effect was not observed among participants with higher trait emotional intelligence or higher resting HRV. The present study highlights some of the complexities related to how media exposure to terrorism-related images influences people's reactions to, and evaluations of, an outgroup that is related to the perpetrators of the attacks.  相似文献   
2.
Informed by social media data collected following four terror attacks in the UK in 2017, this article delineates a series of “techniques of disinformation” used by different actors to try and influence how the events were publicly defined and understood. By studying the causes and consequences of misleading information following terror attacks, the article contributes empirically to the neglected topic of social reactions to terrorism. It also advances scholarship on the workings of disinforming communications, by focusing on a domain other than political elections, which has been the empirical focus for most studies of disinformation to date. Theoretically, the analysis is framed by drawing an analogy with Gresham Sykes and David Matza's (1957) account of the role of “techniques of neutralization” originally published in the American Sociological Review. The connection being that where they studied deviant behaviour, a similar analytic lens can usefully be applied to disinformation cast as “deviant” information.  相似文献   
3.
Effective risk communication is an integral part of responding to terrorism, but until recently, there has been very little pre‐event communication in a European context to provide advice to the public on how to protect themselves during an attack. Following terrorist attacks involving mass shootings in Paris, France, in November 2015, the U.K. National Police Chiefs’ Council released a Stay Safe film and leaflet that advises the public to “run,” “hide,” and “tell” in the event of a firearms or weapons attack. However, other countries, including Denmark, do not provide preparedness information of this kind, in large part because of concern about scaring the public. In this survey experiment, 3,003 U.K. and Danish participants were randomly assigned to one of three conditions: no information, a leaflet intervention, and a film intervention to examine the impact of “Run, Hide, Tell” advice on perceptions about terrorism, the security services, and intended responses to a hypothetical terrorist firearms attack. Results demonstrate important benefits of pre‐event communication in relation to enhancing trust, encouraging protective health behaviors, and discouraging potentially dangerous actions. However, these findings also suggest that future communications should address perceived response costs and target specific problem behaviors. Cross‐national similarities in response suggest this advice is suitable for adaptation in other countries.  相似文献   
4.
L. Elbakidze  Y. H. Jin 《Risk analysis》2015,35(8):1520-1535
Using transnational terrorism data from 1980 to 2000, this study empirically examines the relationships between frequency of participation in transnational terrorism acts and economic development and education improvement. We find an inverse U‐shaped association between the frequency of various nationals acting as perpetrators in transnational terrorism acts and per capita income in their respective home countries. As per capita incomes increase from relatively low levels, frequencies of participation in transnational terrorism increase. However, at sufficiently higher levels of per capita income, further increase in per capita income is negatively associated with the rate of participation in transnational terrorism. Education improvement from elementary to secondary is positively correlated with frequency of participation in transnational terrorism events, whereas further improvement from secondary to tertiary level is negatively correlated with participation in transnational terrorism. We also find that citizens of countries with greater openness to international trade, lower degree of income inequality, greater economic freedom, larger proportion of population with tertiary education, and less religious prevalence participate in transnational terrorism events less frequently.  相似文献   
5.
Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity.  相似文献   
6.
This article considers all 87 attacks worldwide against air and rail transport systems that killed at least two passengers over the 30‐year period of 1982–2011. The data offer strong and statistically significant evidence that successful acts of terror have “gone to ground” in recent years: attacks against aviation were concentrated early in the three decades studied whereas those against rail were concentrated later. Recent data are used to make estimates of absolute and comparative risk for frequent flyers and subway/rail commuters. Point estimates in the “status quo” case imply that mortality risk from successful acts of terror was very low on both modes of transportation and that, whereas risk per trip is higher for air travelers than subway/rail commuters, the rail commuters experience greater risk per year than the frequent flyers.  相似文献   
7.
This article presents an asset‐level security risk management framework to assist stakeholders of critical assets with allocating limited budgets for enhancing their safety and security against terrorist attack. The proposed framework models the security system of an asset, considers various threat scenarios, and models the sequential decision framework of attackers during the attack. Its novel contributions are the introduction of the notion of partial neutralization of attackers by defenders, estimation of total loss from successful, partially successful, and unsuccessful actions of attackers at various stages of an attack, and inclusion of the effects of these losses on the choices made by terrorists at various stages of the attack. The application of the proposed method is demonstrated in an example dealing with security risk management of a U.S. commercial airport, in which a set of plausible threat scenarios and risk mitigation options are considered. It is found that a combination of providing blast‐resistant cargo containers and a video surveillance system on the airport perimeter fence is the best option based on minimum expected life‐cycle cost considering a 10‐year service period.  相似文献   
8.
9.
Research on UK government counter‐terrorism measures has claimed that Muslims are treated as a ‘suspect community’. However, there is limited research exploring the divisive effects that membership of a ‘suspect community’ has on relations within Muslim communities. Drawing from interviews with British Muslims living in Leeds or Bradford, I address this gap by explicating how co‐option of Muslim community members to counter extremism fractures relations within Muslim communities. I reveal how community members internalize fears of state targeting which precipitates internal disciplinary measures. I contribute the category of ‘internal suspect body’ which is materialized through two intersecting conditions within preventative counter‐terrorism: the suspected extremist for Muslims to look out for and suspected informer who might report fellow Muslims. I argue that the suspect community operates through a network of relations by which terrors of counter‐terrorism are reproduced within Muslim communities with divisive effects.  相似文献   
10.
Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号