首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1691篇
  免费   31篇
管理学   281篇
民族学   9篇
人口学   112篇
丛书文集   6篇
理论方法论   198篇
综合类   16篇
社会学   827篇
统计学   273篇
  2023年   12篇
  2022年   5篇
  2021年   10篇
  2020年   32篇
  2019年   52篇
  2018年   44篇
  2017年   59篇
  2016年   43篇
  2015年   45篇
  2014年   58篇
  2013年   273篇
  2012年   67篇
  2011年   58篇
  2010年   54篇
  2009年   45篇
  2008年   59篇
  2007年   54篇
  2006年   52篇
  2005年   52篇
  2004年   48篇
  2003年   44篇
  2002年   43篇
  2001年   40篇
  2000年   33篇
  1999年   37篇
  1998年   30篇
  1997年   31篇
  1996年   15篇
  1995年   22篇
  1994年   24篇
  1993年   11篇
  1992年   11篇
  1991年   17篇
  1990年   15篇
  1989年   7篇
  1988年   24篇
  1987年   15篇
  1986年   17篇
  1985年   14篇
  1984年   18篇
  1983年   15篇
  1982年   11篇
  1981年   21篇
  1980年   16篇
  1979年   13篇
  1978年   11篇
  1977年   6篇
  1976年   8篇
  1975年   9篇
  1974年   7篇
排序方式: 共有1722条查询结果,搜索用时 15 毫秒
121.
Who do farmers trust? Irrigators in the High Plains are confronted with a wide range of information sources with respect to water-saving practices. From a survey of 709 irrigators in 10 countries the most widely accepted sources are identified, regional variability of information is examined, the role of irrigator characteristics on source selection is determined, and the level of association between adoption and source preference is analyzed. Differences in irrigators' reliance on specific sources are more associated with location than irrigator characteristics. Information sources viewed as important by many irrigators frequently influence adoption decisions less than sources having a wide range of preference among irrigators. Mass media and advisor-oriented sources are much more significantly linked to adoption than inter-personal sources such as friends and neighbors. The three sources that best discriminate adoption behavior are private agricultural consulting firms, university research stations, and trade magazines.  相似文献   
122.
The emphasis in class research remains on the structural aspects of class, class processes are neglected. This paper focuses upon some relational and normative aspects of class through an examination of social divisions produced and constructed within middle class families’ choices of childcare. Working with data from two contrasting settings in London (Battersea and Stoke Newington) three issues are addressed in the paper; the extent to which childcare arrangements both substantively and structurally position children differently within long term educational careers; the ways in which the use of choice in a market system of child care and education, works to produce patterns of social closure that quietly discriminate via the collectivist criterion of class and racial membership; and the ways in which child care choices also point‐up and perpetuate subtle distinctions and tensions of values and lifestyle within the middle class, between class factions. Concepts drawn from the work of Bourdieu are deployed throughout.  相似文献   
123.
124.
Issue Framing and Citizen Apathy Toward Local Environmental Contamination   总被引:1,自引:0,他引:1  
We adapt the frame-alignment perspective in order to demonstrate how institutional framing shapes media coverage of a toxic crisis. This framing activity is described as a new approach to managing public responses to contamination that differs from the approach characterizing contamination episodes at Love Canal and Woburn, MA. Our analysis focuses on the process by which actors responsible for managing toxic crises carefully construct and manage a coordinated risk frame. We refer to this as institutional framing and illustrate how it shapes media framing of a toxic event. We conclude by proposing further research to identify the causal relationship between institutional framing and the absence of mobilization.  相似文献   
125.
This study investigated child welfare practitioners’ ratings of the severity of parental discipline practices. Ratings varied by the type of act, age of the child, and by chronicity. Exploratory investigation into changes across time found that current practitioners (N = 27) rated several practices (e.g. spanking and shaking) as more severe than did professionals (N = 24) sampled in 1977. Results underscore the complexity of defining child maltreatment and offer implications for practitioners, applied researchers, and child welfare policy makers.The authors Stephen D. Whitney, Emiko A. Tajima, Todd I. Herrenkohl, and Bu Huang are affiliated with the School of Social Work, University of Washington.Work on this project is supported by funds from the Social Work Prevention Research Center, School of Social Work, University of Washington (National Institute of Mental Health Grant R24MH56599, Lewayne Gilchrist, PI) and by the University of Washington Royalty Research Fund.  相似文献   
126.
Let G be a connected graph with n≥2 vertices. Suppose that a fire breaks out at a vertex v of G. A firefighter starts to protect vertices. At each time interval, the firefighter protects one vertex not yet on fire. At the end of each time interval, the fire spreads to all the unprotected vertices that have a neighbor on fire. Let sn(v) denote the maximum number of vertices in G that the firefighter can save when a fire breaks out at vertex v. The surviving rate ρ(G) of G is defined to be ∑ vV(G)sn(v)/n 2, which is the average proportion of saved vertices. In this paper, we show that if G is a planar graph with n≥2 vertices and having girth at least 7, then $\rho(G)>\frac{1}{301}$ .  相似文献   
127.
This paper presents a theoretical model to help managers visualise and manage confidential situations more effectively. The model metaphorically likens a confidential setting to the properties of a soap bubble, e.g. elastic expansion or contraction, minimal surface area to contain a given volume, fragility, surface tension, pressure, stress, strain and the potential for bursting thereby releasing the contents to the external environment. We explore the conceptual developments in two phases. Firstly, looking at how a bubble and confidential scenario form and grow. Secondly, we consider how a bubble may burst and map these forces to ways in which confidentiality may be breached. Many attributes are mapped, the key ones being: the embedded value within the system, the criticality of maintaining confidentiality, increasing pressure, the corresponding stress/strain dynamics and the levels of trust between stakeholders. Key research propositions are derived from the model which aims to minimise the risk of a confidentiality breach.  相似文献   
128.
129.
130.
Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号