全文获取类型
收费全文 | 859篇 |
免费 | 20篇 |
专业分类
管理学 | 131篇 |
民族学 | 9篇 |
人口学 | 51篇 |
丛书文集 | 2篇 |
理论方法论 | 161篇 |
综合类 | 10篇 |
社会学 | 392篇 |
统计学 | 123篇 |
出版年
2023年 | 3篇 |
2022年 | 3篇 |
2021年 | 10篇 |
2020年 | 20篇 |
2019年 | 30篇 |
2018年 | 24篇 |
2017年 | 26篇 |
2016年 | 33篇 |
2015年 | 18篇 |
2014年 | 23篇 |
2013年 | 127篇 |
2012年 | 40篇 |
2011年 | 28篇 |
2010年 | 26篇 |
2009年 | 16篇 |
2008年 | 41篇 |
2007年 | 26篇 |
2006年 | 33篇 |
2005年 | 18篇 |
2004年 | 36篇 |
2003年 | 25篇 |
2002年 | 21篇 |
2001年 | 13篇 |
2000年 | 22篇 |
1999年 | 13篇 |
1998年 | 17篇 |
1997年 | 14篇 |
1996年 | 21篇 |
1995年 | 13篇 |
1994年 | 8篇 |
1993年 | 9篇 |
1992年 | 12篇 |
1991年 | 10篇 |
1990年 | 9篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1987年 | 6篇 |
1986年 | 3篇 |
1985年 | 10篇 |
1983年 | 9篇 |
1982年 | 8篇 |
1980年 | 4篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 8篇 |
1975年 | 4篇 |
1974年 | 8篇 |
1973年 | 3篇 |
1972年 | 2篇 |
1970年 | 3篇 |
排序方式: 共有879条查询结果,搜索用时 15 毫秒
71.
Peter B. Shaw 《Researches on Population Ecology》1985,27(1):1-23
Summary A detailed sensitivity analysis of a model of a predator-prey system comprised ofTetranychus urticae andPhytoseiulus persimilis was performed. The aim was to assess the relative importance of the life history parameters of both species, the functional
response, and the components of the numerical response. In addition, the impact of the initial predator-prey ratio and the
timing of predator introduction were tested. Results indicated that the most important factors in the system were relative
rates of predator and prey development, the time of onset of predator oviposition, and the mode of the predator's oviposition
curve. The total oviposition of the predator, the effect of prey consumption on predator oviposition, and predator searching
were important under some conditions. Factors of moderate importance were the adult female predator's functional response,
total prey oviposition, the mode of the prey's oviposition curve, abiotic mortality of the pre-adult predator, and the effect
of prey consumption on predator development and on the immature predator's mortality. Factors of least importance were the
variances of the predator's and prey's oviposition curves, the abiotic mortality of the adult predator, the abiotic mortality
of the pre-adult and adult prey, the functional response of the nymphal and adult male predators, and the effect of prey consumption
on adult predator mortality. The sex ratios had little effect, except when the proportion of female predators was very low.
The initial predator-prey ratio and time of predator introduction had significant impacts on system behavior, though the patterns
of impact were different. 相似文献
72.
When Ian Wilson and Carlos Barahona of the Statistical Services Centre at the University of Reading were asked to review an evaluation of the effectiveness of an aid package in Malawi, they expected a simple enough task. But few things in the developing world are simple. Where aid for the poorest is concerned, is evidence collected and analysed with enough rigour to enable well-informed decisions to be made? 相似文献
73.
Ian Smillie 《Voluntas: International Journal of Voluntary and Nonprofit Organizations》1994,5(2):155-192
Northern NGOs live with an increasing level of insecurity and change. Governmental pressures to professionalise contribute
to bureaucratisation, while inadequate overheads, an outdated project approach and lengthy approval procedures work against
professionalism. Although they spend tens of millions of dollars annually through NGOs, few OECD governments have taken evaluation
seriously. Northern NGO survival, theorefore, has been largely de-linked from performance. More fundamental is the growing
identity crisis that Norther NGOs have in relation to their iincreasingly crisis that Northern NGOs have in relation to their
increasingly effective Southern counterparts.
Recession and faltering public support have pushed governments into reduced aid budgets and new concepts of accountability,
participation and the role of ‘civil society’. Adding to the burden these shifts place on NGOs, many governments now deal
directly with Southern NGOs. Many governments have also restricted their matching or ‘responsive’ NGO funding programmes,
while providing massive funding increases — on highly favourable terms — for emergency and refugee work. Most OECD governments
have also initiated special funds for AIDS, women, democracy and special geographical troublesports, channelling NGOs towards
governmental priorities.
Some basic principles are proposed for remedying the problems and for treating NGOs as important elements of civil society
rather than as delivery mechanisms for governments.
The author, who takes full responsibility for all errors, omissions and opinions, is very grateful to Elena Borghese, Tim
Brodhead, Sharon Capeling-Alakija, Tim Draimin, Ian Filewod, Anna Foca, Henny Helmich and Terry Mooney for helpful comments
on an early draft. An earlier version of the paper appeared in Smillie and Helmich (1993). 相似文献
74.
Technologies of the Self: Habitus and Capacities 总被引:1,自引:0,他引:1
Ian Burkitt 《Journal for the theory of social behaviour》2002,32(2):219-237
75.
Ian McAllister 《The Australian journal of social issues》1991,26(3):163-190
Modern theories of political representation assume that there will be little congruence between the views of political elites and the voters they govern. This paper uses survey data collected among candidates and voters at the 1987 Australian federal election to examine the extent of elite-mass differences on a range of 33 issues. The results show that Labor candidates and Labor voters are more likely to disagree on political issues, while Liberal-National candidates and voters are more likely to agree. Candidates of all parties are more liberal on issues such as Asian immigration, law enforcement and the protection of the environment, compared to their voters, while Senate candidates are more liberal than House of Representatives candidates. Finally, as other studies have found, candidates with constituency responsibilities, in this case those standing for the House of Representatives and incumbents, are more likely to be closer to the views of their party's voters than Senate and non-incumbent candidates. 相似文献
76.
Most of the existing literature on the implications of new technology focuses on either its ‘impact’ or the social choices that lie behind strategies for its introduction into work organisations. The problems of managing the implementation of new technology have yet to be extensively examined despite this being one of the most critical aspects in the process of technological change. The findings from two case studies are presented which show how managers in the organisations concerned developed contrasting approaches to the problem of implementation in the context of opportunities and constraints presented by product markets and technological advance. Similarities between the two approaches are identified, in particular the role played by top management support in facilitating the acceptance of the new technology. The argument that management is able to develop a single unitary strategy towards the introduction of new technology is rejected in favour of a view of managerial actions as a series of flexible and changing sub-strategies associated with different stages in the process of change. 相似文献
77.
This paper presents a theoretical model to help managers visualise and manage confidential situations more effectively. The model metaphorically likens a confidential setting to the properties of a soap bubble, e.g. elastic expansion or contraction, minimal surface area to contain a given volume, fragility, surface tension, pressure, stress, strain and the potential for bursting thereby releasing the contents to the external environment. We explore the conceptual developments in two phases. Firstly, looking at how a bubble and confidential scenario form and grow. Secondly, we consider how a bubble may burst and map these forces to ways in which confidentiality may be breached. Many attributes are mapped, the key ones being: the embedded value within the system, the criticality of maintaining confidentiality, increasing pressure, the corresponding stress/strain dynamics and the levels of trust between stakeholders. Key research propositions are derived from the model which aims to minimise the risk of a confidentiality breach. 相似文献
78.
Studies have examined effects of various personality variables, including extraversion and neuroticism, as well as age, on driver stress. However, the effect of the morningness-eveningness dimension (circadian type) on reported driver stress among commuters has not been investigated. This study aimed to assess the influence of circadian type as well as extraversion, neuroticism and age on driver stress. Participants were 101 Australian university administrative staff who completed the Eysenck Personality Questionnaire-Revised, the Morningness-Eveningness Questionnaire, and also morning and evening driving diaries as a state measure of driver stress each weekday for one week. Two standard multiple regressions assessed whether neuroticism, extraversion, circadian type and age predicted reported driver stress for morning and evening drives. Neuroticism, circadian type, and age predicted reported driver stress in the mornings but age mainly predicted driver stress in the evenings. A repeated measures ANOVA isolated differences between circadian types for weekday mornings and evenings. Reported driver stress differed for day of week and time of day according to circadian type. The three-way interaction suggested that driver stress is influenced by circadian type and that factors influence driver stress differentially between mornings and evenings. Circadian type appears to influence when driver stress affects individuals. 相似文献
79.
80.
The accelerated failure time (AFT) models have proved useful in many contexts, though heavy censoring (as for example in cancer survival) and high dimensionality (as for example in microarray data) cause difficulties for model fitting and model selection. We propose new approaches to variable selection for censored data, based on AFT models optimized using regularized weighted least squares. The regularized technique uses a mixture of \(\ell _1\) and \(\ell _2\) norm penalties under two proposed elastic net type approaches. One is the adaptive elastic net and the other is weighted elastic net. The approaches extend the original approaches proposed by Ghosh (Adaptive elastic net: an improvement of elastic net to achieve oracle properties, Technical Reports 2007) and Hong and Zhang (Math Model Nat Phenom 5(3):115–133 2010), respectively. We also extend the two proposed approaches by adding censoring observations as constraints into their model optimization frameworks. The approaches are evaluated on microarray and by simulation. We compare the performance of these approaches with six other variable selection techniques-three are generally used for censored data and the other three are correlation-based greedy methods used for high-dimensional data. 相似文献