首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   584篇
  免费   32篇
管理学   26篇
民族学   5篇
人口学   69篇
丛书文集   7篇
理论方法论   82篇
综合类   9篇
社会学   393篇
统计学   25篇
  2024年   1篇
  2023年   15篇
  2022年   2篇
  2021年   12篇
  2020年   26篇
  2019年   41篇
  2018年   32篇
  2017年   47篇
  2016年   32篇
  2015年   26篇
  2014年   33篇
  2013年   99篇
  2012年   37篇
  2011年   42篇
  2010年   17篇
  2009年   15篇
  2008年   23篇
  2007年   21篇
  2006年   15篇
  2005年   13篇
  2004年   11篇
  2003年   5篇
  2002年   6篇
  2001年   8篇
  2000年   4篇
  1999年   5篇
  1998年   4篇
  1997年   5篇
  1996年   3篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1984年   2篇
  1983年   1篇
  1982年   2篇
  1980年   1篇
  1975年   1篇
排序方式: 共有616条查询结果,搜索用时 31 毫秒
51.
Globalization and contemporary technology have made international virtual teamwork a routine aspect of daily business. The requirements are very complex; the results often disappointing. We have identified nine critical success factors that are crucial to successful international cooperation. Our Internet survey tool, the Team Power Profiler, analyzes both the strengths and weaknesses of international virtual teams, and in doing so offers a framework for effective coaching.  相似文献   
52.
53.
Aggressive behavior in pet dogs is a serious problem for dog owners across the globe, with bite injuries representing a serious risk to both people and other dogs. The effective management of aggressive behavior in dogs represents a challenging and controversial issue. Although positive reinforcement training methods are now considered to be the most effective and humane technique to manage the risk of aggression, punishment‐based methods continue to be used. Unfortunately, there has been little scientific study into the various factors influencing whether dog owners choose to use positive reinforcement techniques to manage aggression in their dogs. As such, current understanding of how best to encourage and support dog owners to use these methods remains extremely limited. This article uses a survey methodology based on protection motivation theory (PMT) to investigate the factors that influence owner use of positive reinforcement methods to manage aggressive behavior, in an attempt to understand potential barriers and drivers of use. In addition, the article provides an initial exploration of the potential role of wider psychological factors, including owner emotional state, social influence, and cognitive bias. Findings show that the perceived efficacy of positive reinforcement methods and the perceived ability of owners to effectively implement the technique are both key factors predicting future intentions and current reported use. Future interventions should focus on enhancing owner confidence in the effective use of positive reinforcement techniques across multiple scenarios, as well as helping owners manage their own emotional responses when they encounter challenging situations and setbacks.  相似文献   
54.
In the event of contamination of a water distribution system, decisions must be made to mitigate the impact of the contamination and to protect public health. Making threat management decisions while a contaminant spreads through the network is a dynamic and interactive process. Response actions taken by the utility managers and water consumption choices made by the consumers will affect the hydraulics, and thus the spread of the contaminant plume, in the network. A modeling framework that allows the simulation of a contamination event under the effects of actions taken by utility managers and consumers will be a useful tool for the analysis of alternative threat mitigation and management strategies. This article presents a multiagent modeling framework that combines agent‐based, mechanistic, and dynamic methods. Agents select actions based on a set of rules that represent an individual's autonomy, goal‐based desires, and reaction to the environment and the actions of other agents. Consumer behaviors including ingestion, mobility, reduction of water demands, and word‐of‐mouth communication are simulated. Management strategies are evaluated, including opening hydrants to flush the contaminant and broadcasts. As actions taken by consumer agents and utility operators affect demands and flows in the system, the mechanistic model is updated. Management strategies are evaluated based on the exposure of the population to the contaminant. The framework is designed to consider the typical issues involved in water distribution threat management and provides valuable analysis of threat containment strategies for water distribution system contamination events.  相似文献   
55.
In July 2004, Cindy Hepfer asked friends and colleagues: “What question would you like to ask Clifford Lynch if you had the chance?” As a result, Clifford Lynch discusses a wide variety of topics and issues impacting the serials community from Open Access, institutional repositories, what we can learn from Google and Amazon, and Shibboleth to where his favorite places are to travel and how he prepares for presentations.  相似文献   
56.
57.
Since social networking sites, such as MySpace and Facebook, began allowing organizations to create profiles and become active members, organizations have started incorporating these strategies into their public relations programming. For-profit organizations have used these sites to help launch products and strengthen their existing brands; however, little is known about how nonprofit organizations are taking advantage of the social networking popularity. Through a content analysis of 275 nonprofit organization profiles on Facebook, this study examines how these new social networking sites are being used by the organizations to advance their organization's mission and programs. Solely having a profile will not in itself increase awareness or trigger an influx of participation. Instead careful planning and research will greatly benefit nonprofits as they attempt to develop social networking relationships with their stakeholders.  相似文献   
58.
59.
In New South Wales, Australia, a cost-effectiveness evaluation was conducted of an adult drug court (ADC) program as an alternative to jail for criminal offenders addicted to illicit drugs. This article describes the program, the cost-effectiveness analysis, and the results. The results of this study reveal that, for the 23-month period of the evaluation, the ADC was as cost-effective as were conventional sanctions in delaying the time to the first offense and more cost-effective in reducing the frequency of offending for those outcome measures selected. Although the evaluation was conducted using the traditional steps of a cost-effectiveness analysis, because of the complexity of the program and data limitations it was not always possible to adhere to textbook procedures. As such, each step involved in undertaking the cost-effectiveness analysis is discussed, highlighting the key issues faced in the evaluation.  相似文献   
60.
The Internet has become a commonly used venue for seeking healthcare information. Young adults search the Internet for health information more than any other group, yet little is known about use patterns among community college students. The authors surveyed a diverse community college to assess students' use of the Internet for health-related information. More than 80% had home Internet access, regardless of race or gender. Men and women searched for health information in almost equal numbers. Most students were interested in searching for diet/nutrition topics, and least interested in smoking information. Although the digital divide appears to be closing, varying levels of interest in a variety of important health topics remain. Understanding these differences could guide the design of more effective Web-based health interventions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号