首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3061篇
  免费   105篇
管理学   547篇
民族学   25篇
人才学   4篇
人口学   210篇
丛书文集   18篇
理论方法论   342篇
综合类   22篇
社会学   1523篇
统计学   475篇
  2023年   23篇
  2022年   12篇
  2021年   15篇
  2020年   57篇
  2019年   89篇
  2018年   78篇
  2017年   101篇
  2016年   90篇
  2015年   74篇
  2014年   84篇
  2013年   489篇
  2012年   111篇
  2011年   91篇
  2010年   92篇
  2009年   90篇
  2008年   109篇
  2007年   88篇
  2006年   104篇
  2005年   126篇
  2004年   84篇
  2003年   92篇
  2002年   90篇
  2001年   71篇
  2000年   52篇
  1999年   62篇
  1998年   52篇
  1997年   33篇
  1996年   33篇
  1995年   27篇
  1994年   50篇
  1993年   45篇
  1992年   36篇
  1991年   44篇
  1990年   39篇
  1989年   33篇
  1988年   34篇
  1987年   34篇
  1986年   24篇
  1985年   42篇
  1984年   38篇
  1983年   28篇
  1982年   30篇
  1981年   19篇
  1980年   14篇
  1979年   13篇
  1978年   16篇
  1977年   16篇
  1976年   15篇
  1975年   12篇
  1974年   16篇
排序方式: 共有3166条查询结果,搜索用时 539 毫秒
251.
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than as members of a community. However, hackers exist within social groups that provide expertise, support, training, journals and conferences. This article outlines this community to establish the nature of hacking within ‘information societies’. To delineate a ‘sociology of hackers’, an introduction is provided to the nature of computer–mediated communication and the act of computer intrusion, the hack. Following this the hacking community is explored in three sections. First, a profile of the number of hackers and hacks is provided by exploring available demographics. Second, an outline of its culture is provided through a discussion of six different aspects of the hacking community. The six aspects are technology, secrecy, anonymity, membership fluidity, male dominance and motivations. Third, an exploration of the community's construction of a boundary, albeit fluid, between itself and its other, the computer security industry, is provided. This boundary is constructed through metaphors whose central role is to establish the ethical nature of hacking. Finally, a conclusion that rejects any pathologisation of hackers is offered.  相似文献   
252.
Interest organizations are hypothesized to strongly affect public policy, but the evidence that they do so is mixed. This article argues that one reason for the disparity is a gap between theory and research: theory suggests that information provided by interest organizations should strongly influence elected officials, but there is no systematic research on its impact. We examine a potentially important source of information for members of the U.S. Congress—testimony at committee hearings—to ascertain if it affects the enactment of policy proposals. The data, based on content analysis of almost 1,000 testimonies on a stratified random sample of policy proposals, describe who testifies, their arguments, and the evidence they provide. Supporters of a proposal emphasize the importance of the problem being addressed, while opponents claim the proposed policy will be ineffective and try to reframe the debate. Information—particularly information regarding policy effectiveness—does affect the likelihood that a policy proposal will be enacted.  相似文献   
253.
This paper provides insights into the dynamics of attention to TV commercials via an analysis of the length of time that commercials are viewed before being 'zapped'. The model, which incorporates a flexible baseline hazard rate and captures unobserved heterogeneity across both consumers and commercials using a hierarchical Bayes approach, is estimated on two datasets in which commercial viewing is captured by a passive online device that continually monitors a household's TV viewing. Consistent with previous findings in psychology about the nature of attentional engagement in TV viewing, baseline hazard rates are found to be non-monotonic. In addition, the data show considerable ad-to-ad and household-to-household heterogeneity in zapping behavior. While one of the datasets contains some information on characteristics of the ads, these data do not reveal any firm links between the ad heterogeneity and the ad characteristics. A number of methodological and computational issues arise in the hierarchical Bayes analysis.  相似文献   
254.
Risk,Media, and Stigma at Rocky Flats   总被引:1,自引:0,他引:1  
Flynn  James  Peters  Ellen  Mertz  C. K.  Slovic  Paul 《Risk analysis》1998,18(6):715-727
Public responses to nuclear technologies are often strongly negative. Events, such as accidents or evidence of unsafe conditions at nuclear facilities, receive extensive and dramatic coverage by the news media. These news stories affect public perceptions of nuclear risks and the geographic areas near nuclear facilities. One result of these perceptions, avoidance behavior, is a form of "technological stigma" that leads to losses in property values near nuclear facilities. The social amplification of risk is a conceptual framework that attempts to explain how stigma is created through media transmission of information about hazardous places and public perceptions and decisions. This paper examines stigma associated with the U.S. Department of Energy's Rocky Flats facility, a major production plant in the nation's nuclear weapons complex, located near Denver, Colorado. This study, based upon newspaper analyses and a survey of Denver area residents, finds that the social amplification theory provides a reasonable framework for understanding the events and public responses that took place in regard to Rocky Flats during a 6-year period, beginning with an FBI raid of the facility in 1989.  相似文献   
255.
Implementation of a full Bayesian non-parametric analysis involving neutral to the right processes (apart from the special case of the Dirichlet process) has been difficult for two reasons: first, the posterior distributions are complex and therefore only Bayes estimates (posterior expectations) have previously been presented; secondly, it is difficult to obtain an interpretation for the parameters of a neutral to the right process. In this paper we extend Ferguson & Phadia (1979) by presenting a general method for specifying the prior mean and variance of a neutral to the right process, providing the interpretation of the parameters. Additionally, we provide the basis for a full Bayesian analysis, via simulation, from the posterior process using a hybrid of new algorithms that is applicable to a large class of neutral to the right processes (Ferguson & Phadia only provide posterior means). The ideas are exemplified through illustrative analyses.  相似文献   
256.
Archival data on over 15,000 contributors to 33management journals are used to examine productivitydifferences among scholars in different areas ofmanagement. The results suggest that a fragmentedpublication network offers specialists from different areasdissimilar publication opportunities and experiences,and may contribute to varying levels of publicationproductivity among authors. The implications of our results for future research and facultyevaluation processes are explored.  相似文献   
257.
This paper explores methods to study trust. In a variety of settings, answers to survey questions and choices in a trust game are obtained from student sample pools. Some subjects are approached by mail and execute their task at home whereas others participate in classroom experiments. No differences between the results obtained by these methods are observed. Furthermore, one additional group plays the trust game with purely hypothetical payments, and another receives random lottery payments. This changes trust behavior dramatically, whereas trustworthiness is unaffected. Subjects without any financial incentives exhibit less trust and their trust choices are significantly correlated with survey trust answers. There is no such correlation for the corresponding choices with real payments.  相似文献   
258.
259.
Regression Modelling of Disease Risk in Relation to Point Sources   总被引:1,自引:0,他引:1  
We describe a class of models for the investigation of possible raised risk of disease around putative sources of environmental pollution. An adaptation of the point process method suggested by Diggle and Rowlingson is presented, allowing the use of routinely available aggregated data and incorporating the more general distance–risk model suggested by Elliott and co-workers. An application to data on cancers of the stomach around municipal solid waste incinerators is presented.  相似文献   
260.
The authors propose a semiparametric approach to modeling and forecasting age‐specific mortality in the United States. Their method is based on an extension of a class of semiparametric models to time series. It combines information from several time series and estimates the predictive distribution conditional on past data. The conditional expectation, which is the most commonly used predictor in practice, is the first moment of this distribution. The authors compare their method to that of Lee and Carter.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号