首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1343篇
  免费   109篇
管理学   71篇
民族学   15篇
人口学   132篇
丛书文集   7篇
理论方法论   180篇
综合类   8篇
社会学   970篇
统计学   69篇
  2024年   3篇
  2023年   32篇
  2022年   13篇
  2021年   16篇
  2020年   60篇
  2019年   75篇
  2018年   95篇
  2017年   106篇
  2016年   81篇
  2015年   73篇
  2014年   68篇
  2013年   237篇
  2012年   81篇
  2011年   70篇
  2010年   38篇
  2009年   47篇
  2008年   51篇
  2007年   51篇
  2006年   42篇
  2005年   36篇
  2004年   25篇
  2003年   30篇
  2002年   28篇
  2001年   21篇
  2000年   12篇
  1999年   10篇
  1998年   6篇
  1997年   6篇
  1996年   3篇
  1995年   4篇
  1994年   3篇
  1993年   8篇
  1992年   3篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1987年   4篇
  1986年   1篇
  1985年   2篇
  1982年   2篇
  1980年   1篇
  1979年   1篇
  1968年   1篇
  1967年   1篇
排序方式: 共有1452条查询结果,搜索用时 453 毫秒
211.
Because marriage has been denied to same-sex couples, it is likely that the meaning and significance ascribed to non-marital cohabitation may be unique. Further, it is unclear whether same-sex couples view marriage as important to their relationships, and if they do, why. Using qualitative data from 526 individuals in cohabiting same-sex relationships across 47 states, we explored (1) the meaning and significance of cohabitation and (2) the perceived importance of legal marriage to the relationship. Participants viewed cohabitation as significant, most commonly because it indicates long-term commitment, provides emotional support, makes the couple a family, and allows them to share life together. Marriage was perceived as important to a majority (90%), most commonly because it confers financial and legal benefits, relational legitimacy, and demonstrates the same commitment as different-sex couples. Overall, findings highlight the symbolic significance of cohabitation and importance of access to legal marriage to adults in same-sex relationships.  相似文献   
212.
Critical infrastructure systems must be both robust and resilient in order to ensure the functioning of society. To improve the performance of such systems, we often use risk and vulnerability analysis to find and address system weaknesses. A critical component of such analyses is the ability to accurately determine the negative consequences of various types of failures in the system. Numerous mathematical and simulation models exist that can be used to this end. However, there are relatively few studies comparing the implications of using different modeling approaches in the context of comprehensive risk analysis of critical infrastructures. In this article, we suggest a classification of these models, which span from simple topologically‐oriented models to advanced physical‐flow‐based models. Here, we focus on electric power systems and present a study aimed at understanding the tradeoffs between simplicity and fidelity in models used in the context of risk analysis. Specifically, the purpose of this article is to compare performance estimates achieved with a spectrum of approaches typically used for risk and vulnerability analysis of electric power systems and evaluate if more simplified topological measures can be combined using statistical methods to be used as a surrogate for physical flow models. The results of our work provide guidance as to appropriate models or combinations of models to use when analyzing large‐scale critical infrastructure systems, where simulation times quickly become insurmountable when using more advanced models, severely limiting the extent of analyses that can be performed.  相似文献   
213.
The Simon's two‐stage design is the most commonly applied among multi‐stage designs in phase IIA clinical trials. It combines the sample sizes at the two stages in order to minimize either the expected or the maximum sample size. When the uncertainty about pre‐trial beliefs on the expected or desired response rate is high, a Bayesian alternative should be considered since it allows to deal with the entire distribution of the parameter of interest in a more natural way. In this setting, a crucial issue is how to construct a distribution from the available summaries to use as a clinical prior in a Bayesian design. In this work, we explore the Bayesian counterparts of the Simon's two‐stage design based on the predictive version of the single threshold design. This design requires specifying two prior distributions: the analysis prior, which is used to compute the posterior probabilities, and the design prior, which is employed to obtain the prior predictive distribution. While the usual approach is to build beta priors for carrying out a conjugate analysis, we derived both the analysis and the design distributions through linear combinations of B‐splines. The motivating example is the planning of the phase IIA two‐stage trial on anti‐HER2 DNA vaccine in breast cancer, where initial beliefs formed from elicited experts' opinions and historical data showed a high level of uncertainty. In a sample size determination problem, the impact of different priors is evaluated.  相似文献   
214.
Social interaction, particularly in older adolescents, increasingly involves computer‐mediated communication. Although studies of public computer‐mediated communication are increasingly common, studies of private text messaging remain rare. As approaches for obtaining such data evolve with technological advances, developmental scientists need designs in which to use such approaches that reduce sampling biases in both participants and text messages. In this study (n = 854; 46% male; 22% African American, 60% European American), we examined selection biases in the participant sample (i.e., factors associated with actual participation), procedural biases in the participant sample (i.e., factors related to failed data capture due to technological or procedural issues), and selection biases in the sample of text messages (i.e., based on self‐reported reasons for texting). Findings from our study suggest that studying human interaction directly through analysis of text message data is not only feasible, but also may be successfully undertaken with minimal biases regarding sample selection and text message selection among those who are engaged in research and engaged in text messaging outside of the study context. However, biases may occur depending on the type of platform (iPhone vs. Android) used by participants for texting.  相似文献   
215.
This study evaluates and synthesizes qualitative evidence addressing factors affecting a child’s decision to disclose an experience of sexual abuse. Childhood sexual abuse is a devastating crime, with long-term negative impacts. Understanding the factors that affect a child’s decision to disclose is vital. Disclosure enables access to support and protection, both therapeutically and legally. A systematic review was conducted focusing on factors affecting a child’s decision to disclose an experience of sexual abuse. Seven studies were identified, quality appraisal undertaken, and meta-ethnography used to synthesize the studies. Six new super-ordinate themes were developed: Fear of what will happen; Others’ reactions: fear of disbelief; Emotions and impact of the abuse; An opportunity to tell; Concern for self and others; and Feelings toward the abuser. Themes indicated the importance of support, structure, and opportunity to facilitate disclosure and should be utilized by agencies to develop practices that facilitate disclosures.  相似文献   
216.
Resistance to women’s public voice and visibility via street harassment and workplace sexual harassment have long constrained women’s use of and comfort in physical public spaces; this gender-based resistance now extends into digital arenas. Women face extreme hostility in the form of digital sexism in discussion rooms, comment sections, gaming communities, and on social media platforms. Reflecting on two years of in-depth interviews with women who have been on the receiving end of gender-based digital abuse (n?=?38), conversations with industry professionals working in content moderation and digital safety, the extant literature, and news stories about digital attacks against women, I offer a lens to think through the prominent patterns in digital sexism, showing (1) that aggressors draw upon three overlapping strategies – intimidating, shaming, and discrediting – to limit women’s impact in digital publics, (2) the way femininity and femaleness are used to undermine women’s contributions, and (3) men call attention to women’s physicality as a way to pull gender – and the male advantage that comes with it – to the fore in digital exchanges. Finally, I argue that when digital sexism succeeds in pressing women out of digital spaces, constrains the topics they address publicly, or limits the ways they address them, we must consider the democratic costs of gender-based harassment, in addition to the personal ones.  相似文献   
217.
This annotated bibliography summarizes journal articles on verbal behavior published outside of The Analysis of Verbal Behavior, the primary journal for scholarship in this area. Seventeen such articles were published in 2014 and are annotated as a resource for practitioners, researchers, and educators.  相似文献   
218.
This paper develops and examines a framework ofdownsizing processes at the organizational level. Itbuilds on previous frameworks and literature byintroducing new variables found to be important in a field study and by bringing empirical evidenceto bear on conceptual underpinnings related toorganizational downsizing and change. The frameworkdeveloped identifies two general approaches thatorganizations use when undergoing downsizing and redesign, aswell as patterns of activities and changes thataccompany them. Downsizing driving redesign involvesincremental and low-level change, and is associated with less communication and systematic analysis,narrow participation in change efforts, and lowermagnitude change in other organizational attributes.Redesign driving downsizing involves more fundamentalorganizational change, and is associated with high-levelchanges that involve restructuring, more communication,broad participation in change efforts, advancesystematic analysis, and the use of interorganizationalrelationships to further downsizing efforts.  相似文献   
219.
This paper examines the processes by which the senior police officers in England and Wales are chosen and prepared for their role. Based upon research interviews with a sample of chief constables and assistant chief constables, it develops a critical assessment of the quality of each of the three key stages in this respect: the selection of those considered to have the potential to become senior officers, senior management training, and the appointments process at police authority level. In the light of the assessments made, the paper considers alternative schemes to those which currently operate at each stage of the process.  相似文献   
220.
Evidence from household surveying in December 2005 in Harare and Bulawayo, Zimbabwe, indicates that a wide network of international migrant remitters are ameliorating the economic crisis in Zimbabwe by sending monetary and in-kind transfers to over 50 per cent of urban households. The research combines quantitative measurement of scale and scope, with demographic and qualitative narrative to build a holistic picture of the typography of receiving and non-receiving households. A complex set of interrelated variables helps to explain why some households do and others do not receive income and goods from people who are away, and the economic and social extent of their subsequent benefit from them. Moreover, the mixed methods approach is designed to capture inter-household and likely macroeconomic effects of how households receive their goods and money; and of how they subsequently exchange (if applicable), store and spend it. Evidence emerges of a largely informal, international social welfare system, but one which is not without adverse inter-household effects for some. These include suffering exclusion from markets suffering from inflationary pressures, not least as a result of other people’s remittances. This paper explores the role of remittances, within this internationalised informal welfare system which we can map from our household survey, in reframing vulnerability and marginalization differentially among and between our subject households.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号