首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13828篇
  免费   418篇
  国内免费   15篇
管理学   1705篇
民族学   81篇
人才学   1篇
人口学   1249篇
丛书文集   157篇
理论方法论   1291篇
综合类   702篇
社会学   7326篇
统计学   1749篇
  2023年   71篇
  2021年   110篇
  2020年   215篇
  2019年   259篇
  2018年   345篇
  2017年   496篇
  2016年   337篇
  2015年   273篇
  2014年   331篇
  2013年   2177篇
  2012年   499篇
  2011年   482篇
  2010年   411篇
  2009年   347篇
  2008年   420篇
  2007年   424篇
  2006年   427篇
  2005年   396篇
  2004年   301篇
  2003年   265篇
  2002年   291篇
  2001年   351篇
  2000年   297篇
  1999年   288篇
  1998年   210篇
  1997年   185篇
  1996年   167篇
  1995年   179篇
  1994年   164篇
  1993年   175篇
  1992年   200篇
  1991年   205篇
  1990年   196篇
  1989年   171篇
  1988年   187篇
  1987年   197篇
  1986年   156篇
  1985年   169篇
  1984年   185篇
  1983年   156篇
  1982年   164篇
  1981年   132篇
  1980年   118篇
  1979年   133篇
  1978年   102篇
  1977年   90篇
  1976年   101篇
  1975年   119篇
  1974年   90篇
  1972年   64篇
排序方式: 共有10000条查询结果,搜索用时 187 毫秒
51.
52.
Boundary Spaces     
While shows like The X-Files and 24 have merged conspiracy theories with popular science (fictions), some video games have been pushing the narrative even further. Electronic Art's Majestic game was released in July 2001 and quickly generated media buzz with its unusual multi-modal gameplay. Mixing phone calls, faxes, instant messaging, real and "fake' websites, and email, the game provides a fascinating case of an attempt at new directions for gaming communities. Through story, mode of playing, and use of technology, Majestic highlights the uncertain status of knowledge, community and self in a digital age; at the same time, it allows examination of alternative ways of understanding games' role and purpose in the larger culture. Drawing on intricate storylines involving government conspiracies, techno-bio warfare, murder and global terror, players were asked to solve mysteries in the hopes of preventing a devastating future of domination. Because the game drew in both actual and Majestic-owned/-designed websites, it constantly pushed those playing the game right to borders where simulation collides with " factuality'. Given the wide variety of "legitimate' conspiracy theory, alien encounters and alternative science web pages, users often could not distinguish when they were leaving the game's pages and venturing into " real' World Wide Web sites. Its further use of AOL's instant messenger system, in which gamers spoke not only to bots but to other players, pushed users to evaluate constantly both the status of those they were talking to and the information being provided. Additionally, the game required players to occupy unfamiliar subject positions, ones where agency was attenuated, and which subsequently generated a multi-layered sense of unease among players. This mix of authentic and staged information in conjunction with technologically mediated roles highlights what are often seen as phenomenon endemic to the Internet itself; that is, the destabilization of categories of knowing, relating, and being.  相似文献   
53.
To prepare for the complexities of family formation, 78 prospective adoptive parents participated in Pre-Adopt, a psychosocial educational orientation program offered by one private nonprofit agency. The five-session curriculum included an overview of adoption policies and procedures, discussion of the child placement process, exploration of couples' adoption concerns and expectations about child characteristics, information about adoption laws and birth-parent/child searches, and examination of anticipatory fantasies about birth parents. Program evaluation yielded statistically significant and clinically meaningful findings about changes in emotional readiness to adopt, parenting knowledge, and satisfaction with group participation, adoption policies and agency practices. Practice implications are considered.  相似文献   
54.
55.
Determining the size and demographiccharacteristics of substance abuse populationsis extremely important for implementing publicpolicies aimed at the control of substanceabuse. Such information not only assists in theallocation of limited treatment resources bythe state, but also in the monitoring ofsubstance abuse trends over time and in theevaluation of innovative policy initiatives. Inthis study, we develop three composite measuresof treatment need. We then use these measuresto estimate treatment need for alcohol abuseand for controlled substance abuse within eachof Florida's 67 counties. This study providesan important empirical component of communityplanning, quantifying and, to a limited degree,specifying the level of need for the substanceabuse treatment of community residents. Anadditional benefit is the development of a costeffective and unobtrusive methodology fordetermining empirically when levels of need arechanging so that treatment levels can beadjusted accordingly. With proper use,policymakers can readily employ the methodologydeveloped in this study in Florida andelsewhere to make better-informed decisions inthe allocation of finite substance abusetreatment resources.  相似文献   
56.
57.
58.
Philadelphia, then and still one of the worst governed of America’s badly governed cities, was having one of its periodic spasms of reform. A thorough study of causes was called for. Not but what the underlining cause was evident to most white Philadelphians: the corrupt semi-criminal vote of the Negro Seventh Ward…. Would it not be well, to elucidate the known causes by a scientific investigation?… With my bride of three months, I settled in one room over a cafeteria run by a College Settlement, in the worst part of the Seventh Ward. We lived there a year, in the midst of an atmosphere of dirt, drunkenness, poverty and crime. Murder sat on our doorstep, police were our government, and philanthropy dropped in with periodic advice. (DuBois, 1968/1975: 194–5 also in Logan, ed. 1944: 42) What had been borne into me during my book studies was my utter ignorance of the manual-working class, that is, of four-fifths of my countrymen…. How was I to get an opportunity of watching, day by day, in their homes and in their workshops, a sufficient number of normal manual-working families to enable me to visualize the class as a whole; to understand what was meant by chronic poverty and insecurity of livelihood. (Webb, 1926: 146–7)  相似文献   
59.
Rapid advances in sociological computing are changing virtually every aspect of scholarly sociological work. These changes offer an opportunity for sociologists to improve the quality of their work and bring new insights and approaches to bear on important sociological problems. Nevertheless, sociologists display a profound ambivalence toward computer work by other sociologists. Left unchecked, this ambivalence threatens to turn sociological computing into an opportunity missed. Inadequate rewards, lack of training, and a general failure to understand the importance of computing in sociology threaten to stifle the development of quality soft-ware, push sociologists competent in computing into other fields, and jeopardize the quality of sociological scholarship. This article documents these ambivalent tendencies and proposes reasonable steps the discipline should take to assure that sociological computing does not become an opportunity missed.  相似文献   
60.
Veneziano, Veneziano and LeGrand (2000) found support for the victim to victimizer hypothesis of sexual aggression with 74 sexually abusive youth. This project, a further step in examining this theory (Burton, 2000, Burton, Miller, & Shill, 2002) builds on their ideas with data from 179 adolescent sexual abusers, and supports their findings. In an examination of relationships, gender, modus operandi, and acts, the sexually abused youth were likely to repeat what was done to them. This project also offers a further analysis of how victimization accounts for a significant portion of the variance in perpetration by these youth. Implications for research and practice are offered.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号