首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   696篇
  免费   17篇
管理学   114篇
民族学   7篇
人口学   76篇
丛书文集   2篇
理论方法论   125篇
综合类   9篇
社会学   273篇
统计学   107篇
  2023年   3篇
  2022年   3篇
  2021年   8篇
  2020年   17篇
  2019年   23篇
  2018年   18篇
  2017年   23篇
  2016年   27篇
  2015年   13篇
  2014年   17篇
  2013年   109篇
  2012年   30篇
  2011年   26篇
  2010年   22篇
  2009年   16篇
  2008年   21篇
  2007年   26篇
  2006年   26篇
  2005年   13篇
  2004年   28篇
  2003年   20篇
  2002年   18篇
  2001年   12篇
  2000年   17篇
  1999年   14篇
  1998年   13篇
  1997年   10篇
  1996年   17篇
  1995年   12篇
  1994年   8篇
  1993年   8篇
  1992年   8篇
  1991年   9篇
  1990年   7篇
  1988年   3篇
  1987年   4篇
  1986年   3篇
  1985年   7篇
  1983年   8篇
  1982年   7篇
  1981年   2篇
  1980年   2篇
  1978年   3篇
  1977年   3篇
  1976年   6篇
  1975年   2篇
  1974年   7篇
  1973年   2篇
  1972年   2篇
  1970年   3篇
排序方式: 共有713条查询结果,搜索用时 0 毫秒
31.
Using expected values to simplify decision making under uncertainty   总被引:2,自引:0,他引:2  
Ian N. Durbach  Theodor J. Stewart   《Omega》2009,37(2):312-330
A simulation study examines the impact of a simplification strategy that replaces distributional attribute evaluations with their expected values and uses those expectations in an additive value model. Several alternate simplified forms and approximation approaches are investigated, with results showing that in general the simplified models are able to provide acceptable performance that is fairly robust to a variety of internal and external environmental changes, including changes to the distributional forms of the attribute evaluations, errors in the assessment of the expected values, and problem size. Certain of the simplified models are shown to be highly sensitive to the form of the underlying preference functions, and in particular to extreme non-linearity in these preferences.  相似文献   
32.
33.
34.
Adapted from the weed risk assessment (WRA) of Pheloung, Williams, and Halloy, the fish invasiveness scoring kit (FISK) was proposed as a screening tool for freshwater fishes. This article describes improvements to FISK, in particular the incorporation of confidence (certainty/uncertainty) ranking of the assessors' responses, and reports on the calibration of the score system, specifically: determination of most appropriate score thresholds for classifying nonnative species into low-, medium-, and high-risk categories, assessment of the patterns of assessors' confidences in their responses in the FISK assessments. Using receiver operating characteristic (ROC) curves, FISK was demonstrated to distinguish accurately (and with statistical confidence) between potentially invasive and noninvasive species of nonnative fishes, with the statistically appropriate threshold score for high-risk species scores being ≥19. Within the group of species classed as high risk using this new threshold, a "higher risk" category could be visually identified, at present consisting of two species (topmouth gudgeon Pseudorasbora parva and gibel carp Carassius gibelio ). FISK represents a useful and viable tool to aid decision- and policymakers in assessing and classifying freshwater fishes according to their potential invasiveness.  相似文献   
35.
Mergers and acquisitions are extremely sensitive, both within and outside the organizations involved. Confidentiality agreements are therefore essential for allowing teams the ‘space’ to develop potential scenarios for future integration. Despite the importance of confidentiality in practice, the subject has received little coverage in the management literature. By adopting a case‐study approach, this research explores aspects of confidentiality in a four‐year post‐acquisition integration programme in a FTSE100 pharmaceutical company. The paper identifies a range of personal impacts on the signatories, as well as various dimensions of information transfer despite the agreement being in place. Through the use of a metaphor, the research suggests that a confidentiality agreement has many similarities with the properties and characteristics of a bubble. This bubble trope is used to enhance conceptual understanding of confidentiality constraints in an organizational‐change context. The paper concludes by suggesting some ‘key learnings’ in relation to using confidentiality agreements in strategic change programmes such as a merger or acquisition.  相似文献   
36.
This article sets the organizational scene for the symposium. It does this by addressing statutory bodies, first in terms of their distinctive statutory foundations, and thereafter with reference to arrangements which they have in common with other types of organizations. Their distinctiveness results from the required legislative action, coupled with forms of political maneuvering and policy analysis. Their other features include their structures, ownership, work, legal power and relationships. Overall, they are legitimate, purposeful and responsible entities with a need to respond to various integration and autonomy arenas in which they are located.  相似文献   
37.
Papers in this special issue focus on sustainable corporate governance measures in the aftermath of the financial crisis, and a background environment of increased scepticism over executive pay and corporate behaviour more generally. The authors provide an overview of recent corporate governance reforms, including ‘say‐on‐pay’ and gender‐pay‐gap transparency, and explain how the research papers in the special issue contribute to understanding of corporate governance research and practice in the areas of boards of directors, corporate governance reform and corporate culture and risk‐taking.  相似文献   
38.
In the nuclear power industry, Level 3 probabilistic risk assessment (PRA) is used to estimate damage to public health and the environment if a severe accident leads to large radiological release. Current Level 3 PRA does not have an explicit inclusion of social factors and, therefore, it is not possible to perform importance ranking of social factors for risk‐informing emergency preparedness, planning, and response (EPPR). This article offers a methodology for adapting the concept of social vulnerability, commonly used in natural hazard research, in the context of a severe nuclear power plant accident. The methodology has four steps: (1) calculating a hazard‐independent social vulnerability index for the local population; (2) developing a location‐specific representation of the maximum radiological hazard estimated from current Level 3 PRA, in a geographic information system (GIS) environment; (3) developing a GIS‐based socio‐technical risk map by combining the social vulnerability index and the location‐specific radiological hazard; and (4) conducting a risk importance measure analysis to rank the criticality of social factors based on their contribution to the socio‐technical risk. The methodology is applied using results from the 2012 Surry Power Station state‐of‐the‐art reactor consequence analysis. A radiological hazard model is generated from MELCOR accident consequence code system, translated into a GIS environment, and combined with the Center for Disease Control social vulnerability index (SVI). This research creates an opportunity to explicitly consider and rank the criticality of location‐specific SVI themes based on their influence on risk, providing input for EPPR.  相似文献   
39.
This paper presents a theoretical model to help managers visualise and manage confidential situations more effectively. The model metaphorically likens a confidential setting to the properties of a soap bubble, e.g. elastic expansion or contraction, minimal surface area to contain a given volume, fragility, surface tension, pressure, stress, strain and the potential for bursting thereby releasing the contents to the external environment. We explore the conceptual developments in two phases. Firstly, looking at how a bubble and confidential scenario form and grow. Secondly, we consider how a bubble may burst and map these forces to ways in which confidentiality may be breached. Many attributes are mapped, the key ones being: the embedded value within the system, the criticality of maintaining confidentiality, increasing pressure, the corresponding stress/strain dynamics and the levels of trust between stakeholders. Key research propositions are derived from the model which aims to minimise the risk of a confidentiality breach.  相似文献   
40.
This paper assesses the extent to which the new public management (NPM) project has succeeded in replacing the custodial mode of professional work supervision with a more bureaucratic approach. The paper conceptualizes the key components of each mode within two ideal types of professional work supervision. It then draws on findings from a study of local‐authority social service departments to consider current arrangements against these ideal type configurations. The findings demonstrate that elements of the bureaucratic mode have emerged unevenly. So far, they have not displaced the emphasis that the supervisors of professional work place on protecting autonomy and limiting management control systems. This suggests that custodial approaches to the supervision of professional work may be more resilient than has been assumed within previous analyses of NPM.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号