首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   177篇
  免费   1篇
管理学   17篇
人口学   6篇
理论方法论   29篇
综合类   2篇
社会学   119篇
统计学   5篇
  2023年   2篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   2篇
  2018年   2篇
  2017年   1篇
  2016年   4篇
  2015年   2篇
  2014年   2篇
  2013年   50篇
  2012年   6篇
  2011年   6篇
  2010年   1篇
  2009年   1篇
  2008年   4篇
  2007年   6篇
  2006年   10篇
  2005年   5篇
  2004年   3篇
  2003年   9篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1997年   4篇
  1996年   3篇
  1995年   4篇
  1994年   3篇
  1993年   1篇
  1992年   2篇
  1991年   3篇
  1990年   5篇
  1989年   4篇
  1988年   7篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   3篇
  1982年   1篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1975年   1篇
  1974年   2篇
  1968年   1篇
排序方式: 共有178条查询结果,搜索用时 31 毫秒
51.
52.
Children in child welfare are especially likely to have unmet mental health needs. The role of family factors in children's use of mental health services was examined in a longitudinal sample of 1075 maltreated or at-risk children. Vulnerable family environment (poor family functioning, low social support, and caregiver psychological distress) is an important predictor of children's mental health needs. It also predicts them not having these needs met.  相似文献   
53.
Most older adults prefer to live at home as long as possible, requiring supports and services to help them age in place. This study examines the relocation concerns of a group of older adults in a suburban naturally-occurring retirement community (NORC). Twenty-six percent of the 324 residents interviewed expressed concern about having to move in the next few years. Residents who were worried differed from those who did not worry on a number of demographic and biopsychosocial characteristics. Overall, residents present a profile of vulnerability that calls for preemptive action to help them stay in their homes. A NORC is an ideal setting in which to provide supportive services.  相似文献   
54.
Abstract

Fifteen advanced standing and 23 two-year program Master of Social Work (MSW) students interviewed a simulated client. Blind raters working from videotapes of these interviews reliably evaluated the students' use of three core interviewing skills: Facilitation, Questioning/Clarification, and Support/Empathy. No statistically significant differences were found between the two groups of students on these skills. These results support the Council on Social Work Education policy of offering advanced standing to graduates of accredited Bachelor of Social Work programs.  相似文献   
55.
This article reports on a study of 503 African-American, Hispanic, and White non-Hispanic adolescent girls attending public schools in Miami, Florida. The primary objectives of the study were to determine the prevalence of 13 self-reported delinquent behaviors in the sample, to compare these rates among the three groups of students, and to explore the predictive influences of several family factors that correlate with delinquency. It was found that 37.5% of the sample engaged in one or more acts of serious delinquency, with African-Americans reporting they had engaged in significantly more of these behaviors. The best predictors of theft/vandalism were low family pride and family substance abuse for Hispanics, low family communication for African-Americans, and low family pride for White non-Hispanics. The findings indicate that traditional family factors that have been used repeatedly to understand delinquency by male adolescents were not strong predictors of delinquency among the adolescent girls in the sample.  相似文献   
56.
57.
This article re-engages with the performance history of the character of Mungo, an enslaved servant from Isaac Bickerstaff and Charles Dibdin's comic opera The Padlock (1768), which premiered at London's Drury Lane Theatre during David Garrick's tenure there. In dialogue with nearly a century of criticism that has misread Mungo as solely a caricature prefiguring the codified racism of the American minstrel show, this article examines contemporary periodicals, libretti, and Jean-Jacques Rousseau's writings on music to posit that the opera's musical representation offered a more nuanced alternative to print's black and white representations of racial and status difference.  相似文献   
58.
Abstract

Objective: Researchers examined the prevalence of self-identified and researcher-identified stalking victimization among college students. Participants and Methods: A representative sample of 1,573 (70.1% female; 29.9% male) student respondents completed an online stalking questionnaire. Results: Overall, 12% self-identified as having been stalked. Additionally, 42.5% (45.4% female; 35.7% male) of students reported experiencing at least 1 behavioral indicator of stalking victimization; however, only 24.7% of those self-identified as being stalked (25.6% female; 22.0% male). Conclusions: Stalking is a serious problem in the college community. A concern that needs to be addressed is the disparity between the number of those who met the behavioral criteria for stalking victimization, but who did not self-identify as a victim. The consequences of stalking victimization are highlighted. Recommendations for addressing this issue on campus are detailed in a plan that may help improve the retention, progression, and graduation rates for stalking victims.  相似文献   
59.
The growth of the health care industry places increasing strain on available resources. As in other areas of social policy, health statisticians and health data are increasingly expected to provide keys to rational decision making. To accomplish this goal, the statistician and decision-maker need to interact to an increasing degree. The current issues in health policy and the statistician's contribution to policy analysis are discussed in the context of the National Center for Health Statistics experience. While the article focuses on health, it has implications for statisticians and policy formation in other fields.  相似文献   
60.
Criminals have at their disposal a variety of technologies for hiding communications and evidence stored on computers from law enforcement. These include encryption, passwords, digital compression, steganography, remote storage, and audit disabling. They can also hide crimes through anonymity tools and techniques such as anonymous remailers, anonymous digital cash, looping, cloned cellular phones, and cellular phone cards. This paper discusses use of these technologies by criminals and terrorists, and how that use has affected investigations and prosecutions. Options available to law enforcement for dealing with the technologies, especially encryption, are also discussed. Numerous case studies are presented for illustration.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号