首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   396篇
  免费   19篇
管理学   57篇
民族学   1篇
人口学   36篇
理论方法论   84篇
综合类   2篇
社会学   210篇
统计学   25篇
  2023年   3篇
  2022年   1篇
  2021年   1篇
  2020年   15篇
  2019年   11篇
  2018年   15篇
  2017年   20篇
  2016年   17篇
  2015年   10篇
  2014年   10篇
  2013年   55篇
  2012年   9篇
  2011年   17篇
  2010年   13篇
  2009年   13篇
  2008年   19篇
  2007年   14篇
  2006年   16篇
  2005年   13篇
  2004年   18篇
  2003年   6篇
  2002年   7篇
  2001年   6篇
  2000年   6篇
  1999年   9篇
  1998年   9篇
  1997年   3篇
  1996年   7篇
  1995年   8篇
  1994年   6篇
  1993年   4篇
  1992年   6篇
  1991年   4篇
  1990年   5篇
  1989年   8篇
  1988年   3篇
  1987年   2篇
  1986年   3篇
  1985年   3篇
  1984年   3篇
  1983年   1篇
  1982年   2篇
  1981年   5篇
  1980年   1篇
  1979年   2篇
  1976年   1篇
  1975年   2篇
  1974年   2篇
  1971年   1篇
排序方式: 共有415条查询结果,搜索用时 15 毫秒
31.
32.
Illicit computer intruders, or hackers, are often thought of as pathological individuals rather than as members of a community. However, hackers exist within social groups that provide expertise, support, training, journals and conferences. This article outlines this community to establish the nature of hacking within ‘information societies’. To delineate a ‘sociology of hackers’, an introduction is provided to the nature of computer–mediated communication and the act of computer intrusion, the hack. Following this the hacking community is explored in three sections. First, a profile of the number of hackers and hacks is provided by exploring available demographics. Second, an outline of its culture is provided through a discussion of six different aspects of the hacking community. The six aspects are technology, secrecy, anonymity, membership fluidity, male dominance and motivations. Third, an exploration of the community's construction of a boundary, albeit fluid, between itself and its other, the computer security industry, is provided. This boundary is constructed through metaphors whose central role is to establish the ethical nature of hacking. Finally, a conclusion that rejects any pathologisation of hackers is offered.  相似文献   
33.
What is the case for and how would one begin to construct a sociology of impairment? This paper argues that the realignment of the disability/impairment distinction is vital for the identity politics of the disability movement. The body is at the heart of contemporary political and theoretical debate, yet the social model of disability makes it an exile. The transformation of the body from a reactionary to an emancipatory concept implies a sociology of impairment. This paper explores the contribution that post-structuralism and phenomenology might make to this end.  相似文献   
34.
35.
36.
If politics is the art of the possible, then determining what the public will tolerate is an important step in the design of prevention strategies. In this random survey of 1205 residents of country and urban areas in Western Australia, attitudes towards drinking and driving, drink-driving behaviour, and opinions of countermeasures were examined. Drink-driving was seen as an important issue for the community and there was a perception that something needed to be done. Drinking and driving was a well-established behaviour, but there was evidence that for many people ‘other’ people constitute the drink-driving problem. There were popular and unpopular preventives, but, interestingly, those that were deemed popular were often believed to be less effective than those that were less popular. The policy implications of these findings are considered, particularly in the light of the current implementation of random breath testing in Western Australia.  相似文献   
37.
38.
In the absence of a clinical definition of Behaviour Disorder, those termed ‘Behaviourally Disordered’ are often considered unsuitable for psychiatric servicing and many end up inappropriately contained by the correctional system. The working definitions of 213 South Australian health and welfare professionals from six client areas (child/adolescent, psychiatric, intellectually disabled, brain-damaged, correctional and general) were surveyed. Respondents generally saw Behaviour Disorder as a recognisable disorder, involving both aggressive, disruptive behaviour and deficits in social adaptation. Perceptions of its presentation varied across client groups and across professional roles. The results highlighted a need for specialised community servicing for this group.  相似文献   
39.
This paper concentrates on the issues of merit and diversityin social work. The principal focus is ethnic diversity, usedas an example to illustrate a wider point about diversity. Itis clear that ethnic diversity in particular has become a majorpolitical objective across the public sector as part of the‘community cohesion’ initiative. Several benefitshave been identified and linked to the achievement of ethnicdiversity in the workforce; many of these have appeared in socialwork debate. The argument here is that while diversity has transformativepotential, it must be located within a more radical agenda ifit is to be successful. As a profession with a radical threadto its pedigree, social work is well placed to take this agendaforward.  相似文献   
40.
Field theory was central to Kurt Lewin's work yet, after his death, interest in it declined significantly until the 1990s when a variant, force field analysis, became widely used. This paper examines the origins, purpose and continuing relevance of field theory. It especially looks at the influences of gestalt psychology, topology and Ernst Cassirer's philosophy of science on its development. It argues that Lewin's attempt to replace conventional topology with his own Lewinian mathematics‐based topology in pursuit of scientific rigour resulted in the undermining of its relevance. The paper also compares force field analysis with Lewin's original conception of field theory and shows that it has significant weaknesses in terms of rigour. It concludes that a return to Lewin's original conception of field theory, based on gestalt psychology and conventional topology, can provide academics and practitioners with a valuable and much‐needed approach to managing change.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号