首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19507篇
  免费   379篇
  国内免费   1篇
管理学   2822篇
民族学   69篇
人才学   2篇
人口学   1900篇
丛书文集   77篇
教育普及   2篇
理论方法论   1741篇
现状及发展   1篇
综合类   263篇
社会学   9433篇
统计学   3577篇
  2023年   108篇
  2021年   121篇
  2020年   290篇
  2019年   384篇
  2018年   443篇
  2017年   606篇
  2016年   479篇
  2015年   360篇
  2014年   462篇
  2013年   3037篇
  2012年   646篇
  2011年   613篇
  2010年   448篇
  2009年   371篇
  2008年   447篇
  2007年   469篇
  2006年   458篇
  2005年   446篇
  2004年   407篇
  2003年   378篇
  2002年   425篇
  2001年   523篇
  2000年   532篇
  1999年   465篇
  1998年   342篇
  1997年   312篇
  1996年   324篇
  1995年   303篇
  1994年   286篇
  1993年   290篇
  1992年   344篇
  1991年   319篇
  1990年   287篇
  1989年   290篇
  1988年   289篇
  1987年   254篇
  1986年   246篇
  1985年   278篇
  1984年   269篇
  1983年   254篇
  1982年   216篇
  1981年   181篇
  1980年   164篇
  1979年   194篇
  1978年   177篇
  1977年   161篇
  1976年   136篇
  1975年   159篇
  1974年   118篇
  1973年   117篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
101.
Hearing the voices of abused older women   总被引:1,自引:0,他引:1  
This paper focuses on a qualitative research process that gathered responses from 64 older women aged fifty and older on their experience of violence and abuse. What older women said about abuse in their lives supports the use of a feminist framework as well as the age based analysis of the elder abuse field. Some respondents spoke of abuse from childhood into their later years. Some spoke of partners witnessing or experiencing abuse as children. Some women express concern about possible abuse by their adult children of their own children. Abused older women like younger women need a safe environment, emotional support, advocacy, information, and peer support. While it is important to consider the perspectives and knowledge of service providers when developing policy and practice on abuse of older women, it is critical to ask the women survivors of abuse or neglect what they believe would benefit them, and others in similar situations.  相似文献   
102.
The legitimacy of government-sponsored gambling and its continued expansion depends in part on the impact that gambling has on society and the extent to which gambling revenue is derived from vulnerable individuals. The purpose of the present article is to try to establish a valid estimate of the proportion of gaming revenue derived from problem gamblers in Canada. Using recent secondary data collected in eight Canadian provinces, we estimate this proportion to be 23.1%, compared to a problem gambling prevalence rate of 4.2%. This estimate must be seen as tentative, however, as self-reported expenditures are 2.1 times higher than actual provincial gaming revenues.  相似文献   
103.
104.
The transfer of advantage and disadvantage across multiple generations is receiving increasing attention in the international literature; however, transfers of resources across multiple generations in Australian families are less well understood. Using a longitudinal dataset of Australian children, we have the opportunity to not only investigate the transfer of educational resources across three generations in Australia, but also investigate the gendered nature of these transfers, which has been a limitation of other studies. We find no evidence of individual grandparent education effects on numeracy and reading scores for grandchildren in Year 3, independent of parent educational attainment and other covariates. However, significant effects on numeracy and reading scores were observed for children in families where both the grandmother and grandfather in maternal and paternal grandparent sets had high educational attainment (a diploma or university qualification), and where either or both the mother and father had a university qualification. These results suggest that the contribution of grandparents to the academic achievement of grandchildren cannot be fully explained by the parent generation and that the concentration of human capital in families contributes to educational inequalities across multiple generations that can be observed by eight years of age.  相似文献   
105.
106.
Second-, third-, fifth-, and sixth- grade children evaluated two hypothetical target peers in three provocation scenarios which differed as to the intent of a provocative act (Ambiguous, Accidental, Hostile). In addition to age and gender, evaluator-victim relationship was manipulated with children portrayed as being in a best friend, an acquaintance, or an enemy relationship with the victim, while the agent of the provocation was an unfamiliar peer. Evaluations were assessed in terms of attributions of aggressor's intentions, behavior response of the victim, evaluator's liking for victim, and evaluator's affect. Results indicated that older children evaluated aggressor's intentions and victim's behavior response more negatively than did younger children. Further, attributions of aggressor's intent significantly predicted the victim's subsequent behavioral response. Evaluator's affect was reported to be more negative when evaluating hostile provocation compared to accidental or ambiguous provocation and evaluators in acquaintance and enemy relationships with the victim reported liking the victim more after the provocation than before it occurred. Results are discussed in terms of the social relational and social situational influences on children's evaluations of peer interactions and the need to integrate these contextual factors in children's person perception research.  相似文献   
107.
This paper examines the information processing requirements that surround the international negotiations process. General problem-solving models and generic task taxonomies are explored to provide insight into this process, a process that can be characterized as iterative options analysis. The paper also identifies a set of existing and emerging information technologies that can support the negotiation process, technologies that range from electronic mail to group decision support systems. The premise of the paper is that cost-effective information technology can support many important negotiation tasks and that existing technology has been vastly under-exploited by negotiators and their staffs. A program for introducing and evaluating information technology is also proposed.  相似文献   
108.
Alexander Wendt raises many interesting questions in this book, but to get to the answers he wants, he relies on a misunderstanding of the nature of the quantum states of macroscopic objects.  相似文献   
109.
There is little documentation in the literature of how to conduct a data audit of laboratory research. The purpose of such an audit is to verify the extent to which the published data agree with the corresponding laboratory notebook data and whether the data thus examined appear to be sufficient to justify the published conclusions. A case study is presented, which demonstrates a step by step approach towards conducting a data audit of a published research study.  相似文献   
110.
Consumer privacy is at the center of an ongoing debate among business leaders, privacy activists, and government officials. Although corporations face competitive pressures to collect and use personal information about their customers, many consumers find some methods of collection and use of their personal information unfair. We present a justice theory framework that illustrates how consumer privacy concerns are shaped by the perceived fairness of corporate information practices. We describe a set of global principles, fair information practices, which were developed to balance consumer privacy concerns with an organization's need to use personal information. We conclude by discussing three alternatives for implementing fair information practices with particular attention to the Internet: government regulation, industry self-regulation, and technological solutions .  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号