首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   805篇
  免费   31篇
管理学   107篇
民族学   12篇
人口学   66篇
丛书文集   4篇
理论方法论   107篇
综合类   5篇
社会学   453篇
统计学   82篇
  2023年   7篇
  2022年   5篇
  2020年   29篇
  2019年   30篇
  2018年   28篇
  2017年   43篇
  2016年   38篇
  2015年   21篇
  2014年   29篇
  2013年   142篇
  2012年   28篇
  2011年   28篇
  2010年   19篇
  2009年   12篇
  2008年   19篇
  2007年   19篇
  2006年   29篇
  2005年   22篇
  2004年   12篇
  2003年   15篇
  2002年   16篇
  2001年   15篇
  2000年   14篇
  1999年   18篇
  1998年   11篇
  1997年   8篇
  1996年   10篇
  1995年   5篇
  1994年   13篇
  1993年   9篇
  1992年   7篇
  1990年   6篇
  1989年   8篇
  1987年   6篇
  1986年   6篇
  1985年   7篇
  1984年   5篇
  1983年   5篇
  1982年   3篇
  1981年   5篇
  1980年   12篇
  1979年   6篇
  1978年   9篇
  1977年   6篇
  1976年   12篇
  1975年   7篇
  1974年   9篇
  1973年   3篇
  1972年   3篇
  1971年   3篇
排序方式: 共有836条查询结果,搜索用时 15 毫秒
61.
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than as members of a community. However, hackers exist within social groups that provide expertise, support, training, journals and conferences. This article outlines this community to establish the nature of hacking within ‘information societies’. To delineate a ‘sociology of hackers’, an introduction is provided to the nature of computer–mediated communication and the act of computer intrusion, the hack. Following this the hacking community is explored in three sections. First, a profile of the number of hackers and hacks is provided by exploring available demographics. Second, an outline of its culture is provided through a discussion of six different aspects of the hacking community. The six aspects are technology, secrecy, anonymity, membership fluidity, male dominance and motivations. Third, an exploration of the community's construction of a boundary, albeit fluid, between itself and its other, the computer security industry, is provided. This boundary is constructed through metaphors whose central role is to establish the ethical nature of hacking. Finally, a conclusion that rejects any pathologisation of hackers is offered.  相似文献   
62.
Objective: To understand how the Greek system uniquely influences smoking attitudes, beliefs, and behaviors among college students who belong to a social sorority or fraternity. Participants: Active members of sororities (n = 16) and fraternities (n = 17) were interviewed between February 2013 and October 2015. Methods: In-depth interviews were conducted examining the social influences of the Greek system on member smoking. Transcribed interviews were coded and analyzed for themes. Results: Sorority and fraternity members experienced different social influences on smoking. Sorority stigmatization of smoking outside bars or parties caused sorority members to hide their smoking. Fraternity members had no social penalties for smoking and allowed smoking at the fraternity house. Fraternity members influenced both fraternity members and sorority members to smoke by sharing cigarettes and smoking at parties. Conclusions: Sororities and fraternities have created social environments that both promote smoking and stigmatize it, presenting unique challenges in college student smoking prevention and cessation efforts.  相似文献   
63.
Despite increasing research into how the structural characteristics of slot machines influence gambling behaviour there have been no experimental investigations into the effect of free-spins bonus features—a structural characteristic that is commonly central to the design of slot machines. This series of three experiments investigated the free-spins feature using slot machine simulations to determine whether participants allocate more wagers to a machine with free spins, and, which components of free-spins features drive this preference. In each experiment, participants were exposed to two computer-simulated slot machines—one with a free-spins feature or similar bonus feature and one without. Participants then completed a testing phase where they could freely switch between the two machines. In Experiment 1, participants did not prefer the machine with a simple free-spins feature. In Experiment 2 the free-spins feature incorporated additional elements such as sounds, animations, and an increased win frequency; participants preferred to gamble on this machine. The Experiment 3 “bonus feature” machine resembled the free spins machine in Experiment 2 except spins were not free; participants showed a clear preference for this machine also. These findings indicate that (1) free-spins features have a major influence over machine choice and (2) the “freeness” of the free-spins bonus features is not an important driver of preference, contrary to self-report and interview research with gamblers.  相似文献   
64.
This study considers key value differences between leaders of two types of social ventures: for-profit social benefit corporations and nonprofit organizations. The research question asks to what degree the value sets of leaders of benefit corporations are congruent with those of similarly situated individuals in nonprofit organizations. The results show the values of leaders working in benefit corporations and nonprofit organizations are in many ways aligned, but there are notable statistical differences. A sectoral association of values is also present with employees in both types of organization, especially when the previous work experience of employees is considered.  相似文献   
65.
There is a general consistency across the research literature regarding the definition of bullying. This has filtered down into the construction of governmental and school anti-bullying policies around the world. However, research suggests that children and adolescents are failing to accurately identify cases of bullying. This in turn has implications upon the accuracy of our perception of the extent of the problem of bullying within schools. The current study aimed to investigate how 11–17 year olds understand and differentiate between terms relating to interpersonal peer aggression, violence and bullying. Fifty-seven (twenty male, thirty-seven female) participants were recruited via an opportunity sample. Participants took part in focus group interviews within which they were asked to provide a definition for a list of words relating to both traditional and cyber forms of aggression, bullying and violence. Thematic analysis revealed that the participants held a shared understanding of the terms relating to aggression, bullying and violence. Participants defined each term by describing the behaviors involved, their perception of the level of control the perpetrators of each type of negative peer interaction have and the perception of those involved. The implications of these findings for both policy and future research are discussed.  相似文献   
66.
A Theory of Time Preference   总被引:2,自引:0,他引:2  
This article proposes that people generally prefer present consumption to future consumption because their expected utility from consumption (eventually) falls as their mental and physical abilities (eventually) decline with age. Moreover, contrary to the ubiquitous intertemporal formulation with a constant rate of time preference and contrary to three recent theories of time preference that predict decreasing discounting as people age, this article asserts that discounting increases over the life cycle. This hypothesis is supported by data from the Panel Study of Income Dynamics as well as evidence from numerous previous studies.  相似文献   
67.
This article offers an analysis of family homelessness in Britain and makes suggestions for change and development in both policy and practice. In Britain, family homelessness too often has been defined solely as a housing issue. The author asserts that this approach ignores the evidence that it is a complex problem in which not only economic and political, but also personal and social, factors play significant roles. The widespread failure to recognize the broad range of needs and problems experienced by homeless families seriously limits British vision and creativity in developing potential solutions. The article sets forth a number of policy recommendations, including developing comprehensive housing and service programs for homeless families; adding an intensive service component to existing homeless-at-home programs; emphasizing homelessness prevention; better utilizing persistently vacant housing; better utilizing the private rental sector; and exchanging Britain's present national commitment to temporary accommodation for an ongoing commitment to build sufficient affordable housing. These recommendations are based on the author's experience as an Atlantic Fellow in Public Policy at the Department of Social Policy and Social Work at the University of Oxford and on her 10 years of work with homeless families in the United States.  相似文献   
68.
Research on polyamorous relationships has increased substantially over the past decade. This work has documented how polyamory is practiced and why individuals might pursue such arrangements. However, there is a lack of a systematic investigation of who is in polyamorous relationships and how they might differ from individuals in monogamous relationships. The present study is one of the first to address this by comparing the demographic backgrounds of individuals in polyamorous (N = 2,428) and monogamous (= 539) relationships in the United States. Compared to participants in monogamous relationships, those in polyamorous relationships were more likely to report minority sexual identities. Despite similar age distributions, individuals in polyamorous relationships were more likely to report being in a civil union, being divorced, and earning less than $40,000 per year compared to individuals in monogamous relationships. People in polyamorous relationships were also more likely to select “other” options for most demographic characteristics, suggesting that they tend to choose less traditional response options in general. The current research highlights several demographic differences that need to be considered and potentially controlled for in future comparisons of polyamorous and monogamous relationships.  相似文献   
69.
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号