全文获取类型
收费全文 | 201篇 |
免费 | 13篇 |
专业分类
管理学 | 42篇 |
民族学 | 6篇 |
人口学 | 12篇 |
理论方法论 | 24篇 |
综合类 | 2篇 |
社会学 | 78篇 |
统计学 | 50篇 |
出版年
2024年 | 1篇 |
2023年 | 5篇 |
2022年 | 4篇 |
2021年 | 7篇 |
2020年 | 10篇 |
2019年 | 19篇 |
2018年 | 19篇 |
2017年 | 16篇 |
2016年 | 17篇 |
2015年 | 10篇 |
2014年 | 11篇 |
2013年 | 27篇 |
2012年 | 10篇 |
2011年 | 13篇 |
2010年 | 3篇 |
2009年 | 3篇 |
2008年 | 3篇 |
2007年 | 6篇 |
2006年 | 3篇 |
2005年 | 2篇 |
2004年 | 1篇 |
2003年 | 1篇 |
2002年 | 2篇 |
2001年 | 2篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1993年 | 3篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1983年 | 3篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1979年 | 2篇 |
1978年 | 1篇 |
排序方式: 共有214条查询结果,搜索用时 15 毫秒
21.
Does “buyer beware” work in migration? Contracting between brokers and migrants in Vietnam 下载免费PDF全文
Nguyen Quynh Phuong Sundar Venkatesh 《International migration (Geneva, Switzerland)》2016,54(6):94-108
This article is an attempt to open the lid a little of the “black box of migration” i.e. brokers. Analysing contracts between brokers and labour migrants, we identify four different forms of exploitation of migrants by brokers: expropriation of skill premium, risk shifting, over‐charging, and non‐refund of deposits. Opportunistic behaviour by brokers, as evidenced by such exploitation, is seen as a market failure that is explained by human attributes and transactional characteristics. Given the rigidities in the human attributes of the contracting parties and the nature of migration as a risky multi‐period transaction, proposals are made for non‐market interventions, which can lead to more equitable contracting. 相似文献
22.
Nguyen T. P. Thao 《Asian Social Work and Policy Review》2016,10(2):225-236
Married Vietnamese immigrant women often face multiple stressors related to sociocultural adaptation and new family lives in South Korea. The purpose of this paper is to identify the different influences of acculturative and family life stress on depressive symptoms among Vietnamese immigrant wives. Data were collected through a questionnaire survey of 301 married Vietnamese immigrant women residing in South Korea. The study utilized linear regression analysis to test the relationships between the variables. The findings show that both acculturative and family life stress are positively related to depressive symptoms. Family life stress influences depressive symptoms to a greater extent than acculturative stress. The study emphasizes the significance of family‐related stress on mental health among married Vietnamese immigrant women in Korea and provides some implications for research, clinical practice, and policy. 相似文献
23.
Researchers have long recognized that subjective perceptions of risk are better predictors of choices over risky outcomes than science‐based or experts’ assessments of risk. More recent work suggests that uncertainty about risks also plays a role in predicting choices and behavior. In this article, we develop and estimate a formal model for an individual's perceived health risks associated with arsenic contamination of his or her drinking water. The modeling approach treats risk as a random variable, with an estimable probability distribution whose variance reflects uncertainty. The model we estimate uses data collected from a survey given to a sample of people living in arsenic‐prone areas in the United States. The findings from this article support the fact that scientific information is essential to explaining the mortality rate perceived by the individuals, but uncertainty about the probability remains significant. 相似文献
24.
Laura Hoyt D'Anna Hannah-Hanh D. Nguyen Grace L. Reynolds Dennis G. Fisher Michael Janson Cristy Chen 《Journal of gay & lesbian social services》2013,25(2):119-139
In this article we examine the prevalence of and associations between sexual orientation–based verbal harassment and reported utilization of health services across levels of sexual orientation in a diverse sample of adult recipients of Los Angeles County–funded HIV-related health and social services. Thirty-two percent reported they had experienced verbal harassment, the majority (80.3%) of whom identified as lesbian, gay, or bisexual (LGB). Those who reported being verbally harassed received significantly more services overall than those who were not verbally harassed, and service utilization varied by sexual orientation. These findings inform future efforts to identify and assess social discrimination in health and social service settings. 相似文献
25.
In this paper we give solution to a conjecture appearing in Christensen (1997, p. 360) in relation to the definitions of standardized
residuals in loglinear models.
Work done when he was visiting as the Distinguished Lukacs Professor on leave from the Complutense University of Madrid.
An erratum to this article is available at . 相似文献
26.
27.
Using qualitative interview data gathered from 28 Hmong adolescents, we examined the meaning ascribed to language and style and how language and style behaviors are used to distinguish identity. We found that the participants used language and style to define their own ethnic group membership and cultural identities. Moreover they inferred meaning from these identity behaviors to discern which peer groups are desirable (those who wear American style clothing and are bilingual) and which are of low social status (“fobby” style clothing and monolingual). The cultural identity symbols used by participants reveal heterogeneity among Hmong adolescent peer groups and evolving definitions of what it means to be Hmong in America. 相似文献
28.
Nam-Ky Nguyen 《Australian & New Zealand Journal of Statistics》2001,43(3):367-374
Most experimental material in agriculture and industry is heterogeneous in nature and therefore its statistical analysis benefits from blocking. Many experiments are restricted in time or space, and again blocking is useful. This paper adopts the idea of orthogonal blocking of Box & Hunter (1957) and applies it to optimal blocking designs. This approach is then compared with the determinant-based approach described in the literature for constructing block designs. 相似文献
29.
Yilin Shen Thang N. Dinh My T. Thai Hien T. Nguyen 《Journal of Combinatorial Optimization》2014,28(1):186-217
As an imperative channel for fast information propagation, online social networks (OSNs) also have their defects. One of them is the information leakage, i.e., information could be spread via OSNs to the users whom we are not willing to share with. Thus the problem of constructing a circle of trust to share information with as many friends as possible without further spreading it to unwanted targets has become a challenging research topic but still remained open. Our work is the first attempt to study the Maximum Circle of Trust problem seeking to share the information with the maximum expected number of poster’s friends such that the information spread to the unwanted targets is brought to its knees. First, we consider a special and more practical case with the two-hop information propagation and a single unwanted target. In this case, we show that this problem is NP-hard, which denies the existence of an exact polynomial-time algorithm. We thus propose a Fully Polynomial-Time Approximation Scheme (FPTAS), which can not only adjust any allowable performance error bound but also run in polynomial time with both the input size and allowed error. FPTAS is the best approximation solution one can ever wish for an NP-hard problem. We next consider the number of unwanted targets is bounded and prove that there does not exist an FPTAS in this case. Instead, we design a Polynomial-Time Approximation Scheme (PTAS) in which the allowable error can also be controlled. When the number of unwanted targets are not bounded, we provide a randomized algorithm, along with the analytical theoretical bound and inapproximaibility result. Finally, we consider a general case with many hops information propagation and further show its #P-hardness and propose an effective Iterative Circle of Trust Detection (ICTD) algorithm based on a novel greedy function. An extensive experiment on various real-world OSNs has validated the effectiveness of our proposed approximation and ICTD algorithms. Such an extensive experiment also highlights several important observations on information leakage which help to sharpen the security of OSNs in the future. 相似文献
30.
While Markov chain Monte Carlo (MCMC) methods are frequently used for difficult calculations in a wide range of scientific disciplines, they suffer from a serious limitation: their samples are not independent and identically distributed. Consequently, estimates of expectations are biased if the initial value of the chain is not drawn from the target distribution. Regenerative simulation provides an elegant solution to this problem. In this article, we propose a simple regenerative MCMC algorithm to generate variates for any distribution. 相似文献