首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13693篇
  免费   261篇
  国内免费   2篇
管理学   1990篇
民族学   87篇
人才学   7篇
人口学   1162篇
丛书文集   86篇
理论方法论   1397篇
综合类   247篇
社会学   6935篇
统计学   2045篇
  2023年   67篇
  2020年   203篇
  2019年   332篇
  2018年   335篇
  2017年   464篇
  2016年   347篇
  2015年   271篇
  2014年   335篇
  2013年   2196篇
  2012年   457篇
  2011年   422篇
  2010年   358篇
  2009年   348篇
  2008年   359篇
  2007年   371篇
  2006年   361篇
  2005年   387篇
  2004年   323篇
  2003年   267篇
  2002年   301篇
  2001年   340篇
  2000年   280篇
  1999年   267篇
  1998年   218篇
  1997年   188篇
  1996年   184篇
  1995年   169篇
  1994年   195篇
  1993年   193篇
  1992年   185篇
  1991年   190篇
  1990年   191篇
  1989年   178篇
  1988年   166篇
  1987年   180篇
  1986年   139篇
  1985年   188篇
  1984年   191篇
  1983年   169篇
  1982年   152篇
  1981年   108篇
  1980年   124篇
  1979年   125篇
  1978年   118篇
  1977年   102篇
  1976年   103篇
  1975年   109篇
  1974年   109篇
  1973年   75篇
  1972年   70篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
31.
The most popular methodology used by the US International Trade Commission (USITC) commissioners to determine whether dumped and/or subsidized imports injure competing domestic industries has been rejected by reviewing bodies because it does not distinguish injury caused by unfairly traded imports from other demand or supply changes. We estimate injury to the domestic industry due to changes in unfairly traded import price and to other causes for 44 USITC dumping and/or subsidy investigations. Change in unfairly traded import price was typically not the most important cause of injury to the domestic industry. (JEL F13 )  相似文献   
32.
Outsourcing of IT functions has become a widespread corporate practice, which has naturally led to concerns among IT works about how this affects their jobs. The issue is complex, and many companies are bringing their IT functions back inhouse. In light of this complexity, what skills do IT workers need to be com-petitive? We address this question first by reviewing the literature and then by examining two corporate case studies that have dealt with outsourcing issues. Based on this view of outsourcing, we discuss the skills that can provide a com-petitive advantage in the current environment.  相似文献   
33.
D. E. Super's (1957) theory of career development has long been of interest to careers researchers (M. Savickas, 1994; S. C. Whiston & B. K. Brecheisen, 2002). Its insightful illustration of career stages has made it widely applied by careers practitioners. Image norms may influence the career decisions and developmental tasks inherent in each stage. An image norm is the belief that individuals must present or possess a certain image, consistent with occupational, organizational, or industry standards, in order to achieve career success. Understanding the effects of image norms across D. E. Super's (1957) career stages has important implications for individuals, organizations, and career counseling professionals.  相似文献   
34.
This article provides an overview of social trust, examining its various aspects and components. Trust is best understood in a sociological sense by focusing on its important relational characteristic. Following this lead, the article discusses briefly how social trust relates to social capital and examines factors that shape the development of social trust, along with outcomes related to variations in trust, classifying them by analytical level (i.e., individual, community, group, organizational, and societal). The article concludes by assessing the strengths and weaknesses of existing research and by identifying some important questions that have not yet been adequately addressed.  相似文献   
35.
36.
Longitudinal data often contain missing observations, and it is in general difficult to justify particular missing data mechanisms, whether random or not, that may be hard to distinguish. The authors describe a likelihood‐based approach to estimating both the mean response and association parameters for longitudinal binary data with drop‐outs. They specify marginal and dependence structures as regression models which link the responses to the covariates. They illustrate their approach using a data set from the Waterloo Smoking Prevention Project They also report the results of simulation studies carried out to assess the performance of their technique under various circumstances.  相似文献   
37.
Boundary Spaces     
While shows like The X-Files and 24 have merged conspiracy theories with popular science (fictions), some video games have been pushing the narrative even further. Electronic Art's Majestic game was released in July 2001 and quickly generated media buzz with its unusual multi-modal gameplay. Mixing phone calls, faxes, instant messaging, real and "fake' websites, and email, the game provides a fascinating case of an attempt at new directions for gaming communities. Through story, mode of playing, and use of technology, Majestic highlights the uncertain status of knowledge, community and self in a digital age; at the same time, it allows examination of alternative ways of understanding games' role and purpose in the larger culture. Drawing on intricate storylines involving government conspiracies, techno-bio warfare, murder and global terror, players were asked to solve mysteries in the hopes of preventing a devastating future of domination. Because the game drew in both actual and Majestic-owned/-designed websites, it constantly pushed those playing the game right to borders where simulation collides with " factuality'. Given the wide variety of "legitimate' conspiracy theory, alien encounters and alternative science web pages, users often could not distinguish when they were leaving the game's pages and venturing into " real' World Wide Web sites. Its further use of AOL's instant messenger system, in which gamers spoke not only to bots but to other players, pushed users to evaluate constantly both the status of those they were talking to and the information being provided. Additionally, the game required players to occupy unfamiliar subject positions, ones where agency was attenuated, and which subsequently generated a multi-layered sense of unease among players. This mix of authentic and staged information in conjunction with technologically mediated roles highlights what are often seen as phenomenon endemic to the Internet itself; that is, the destabilization of categories of knowing, relating, and being.  相似文献   
38.
In this article I examine some of the problems that ‘modern’ legal theory poses for a consideration of the extended reach of social actors and institutions in time and space. While jurisprudence has begun to engage with the concept of globalization, it has done so in a relatively limited manner. Thus legal theory's encounters with highly visible transnational practices have, for the most part, resulted not in challenging the prevailing formal legal paradigm, but in a renewed if slightly modified search for a general jurisprudence that ultimately takes little account of the manner in which the work of law is carried out transnationally. In the first part of this article I examine how legal theory's concern to maintain its own integrity places limitations on its ability to examine the permeability of social boundaries. In the latter part I draw on critical human geography, post–structuralism and actor–network theory (ANT), to examine the manner in which transnational actors have been able to mobilize law, and in particular intellectual property rights (IPRs), as a necessary strategy for both maintaining the meanings of bio–technologies through time and space, and enrolling farmers into particular social networks.  相似文献   
39.
40.
Determining the size and demographiccharacteristics of substance abuse populationsis extremely important for implementing publicpolicies aimed at the control of substanceabuse. Such information not only assists in theallocation of limited treatment resources bythe state, but also in the monitoring ofsubstance abuse trends over time and in theevaluation of innovative policy initiatives. Inthis study, we develop three composite measuresof treatment need. We then use these measuresto estimate treatment need for alcohol abuseand for controlled substance abuse within eachof Florida's 67 counties. This study providesan important empirical component of communityplanning, quantifying and, to a limited degree,specifying the level of need for the substanceabuse treatment of community residents. Anadditional benefit is the development of a costeffective and unobtrusive methodology fordetermining empirically when levels of need arechanging so that treatment levels can beadjusted accordingly. With proper use,policymakers can readily employ the methodologydeveloped in this study in Florida andelsewhere to make better-informed decisions inthe allocation of finite substance abusetreatment resources.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号