首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19604篇
  免费   349篇
  国内免费   1篇
管理学   2791篇
民族学   70篇
人才学   1篇
人口学   1887篇
丛书文集   77篇
教育普及   2篇
理论方法论   1794篇
现状及发展   1篇
综合类   258篇
社会学   9538篇
统计学   3535篇
  2021年   112篇
  2020年   279篇
  2019年   381篇
  2018年   444篇
  2017年   608篇
  2016年   477篇
  2015年   350篇
  2014年   467篇
  2013年   3139篇
  2012年   635篇
  2011年   610篇
  2010年   445篇
  2009年   374篇
  2008年   446篇
  2007年   461篇
  2006年   456篇
  2005年   440篇
  2004年   407篇
  2003年   381篇
  2002年   425篇
  2001年   523篇
  2000年   531篇
  1999年   462篇
  1998年   342篇
  1997年   310篇
  1996年   327篇
  1995年   315篇
  1994年   295篇
  1993年   297篇
  1992年   354篇
  1991年   330篇
  1990年   295篇
  1989年   293篇
  1988年   293篇
  1987年   251篇
  1986年   248篇
  1985年   277篇
  1984年   267篇
  1983年   252篇
  1982年   216篇
  1981年   181篇
  1980年   166篇
  1979年   195篇
  1978年   176篇
  1977年   163篇
  1976年   135篇
  1975年   159篇
  1974年   119篇
  1973年   117篇
  1972年   94篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
931.
Public Organization Review - Budget cuts in public sector organizations create additional strain for employees, often contributing to uncertainty, rumors, and low morale. This study examines the...  相似文献   
932.
933.
934.
Understanding the risk of biological invasions associated with particular transport pathways and source regions is critical for implementing effective biosecurity management. This may require both a model for physical connectedness between regions, and a measure of environmental similarity, so as to quantify the potential for a species to be transported from a given region and to survive at a destination region. We present an analysis of integrated biosecurity risk into Australia, based on flights and shipping data from each global geopolitical region, and an adaptation of the “range bagging” method to determine environmental matching between regions. Here, we describe global patterns of environmental matching and highlight those regions with many physical connections. We classify patterns of global invasion risk (high to low) into Australian states and territories. We validate our analysis by comparison with global presence data for 844 phytophagous insect pest species, and produce a list of high‐risk species not previously known to be present in Australia. We determined that, of the insect pest species used for validation, the species most likely to be present in Australia were those also present in geopolitical regions with high transport connectivity to Australia, and those regions that were geographically close, and had similar environments.  相似文献   
935.
This article focuses on conceptual and methodological developments allowing the integration of physical and social dynamics leading to model forecasts of circumstance‐specific human losses during a flash flood. To reach this objective, a random forest classifier is applied to assess the likelihood of fatality occurrence for a given circumstance as a function of representative indicators. Here, vehicle‐related circumstance is chosen as the literature indicates that most fatalities from flash flooding fall in this category. A database of flash flood events, with and without human losses from 2001 to 2011 in the United States, is supplemented with other variables describing the storm event, the spatial distribution of the sensitive characteristics of the exposed population, and built environment at the county level. The catastrophic flash floods of May 2015 in the states of Texas and Oklahoma are used as a case study to map the dynamics of the estimated probabilistic human risk on a daily scale. The results indicate the importance of time‐ and space‐dependent human vulnerability and risk assessment for short‐fuse flood events. The need for more systematic human impact data collection is also highlighted to advance impact‐based predictive models for flash flood casualties using machine‐learning approaches in the future.  相似文献   
936.
Aggressive behavior in pet dogs is a serious problem for dog owners across the globe, with bite injuries representing a serious risk to both people and other dogs. The effective management of aggressive behavior in dogs represents a challenging and controversial issue. Although positive reinforcement training methods are now considered to be the most effective and humane technique to manage the risk of aggression, punishment‐based methods continue to be used. Unfortunately, there has been little scientific study into the various factors influencing whether dog owners choose to use positive reinforcement techniques to manage aggression in their dogs. As such, current understanding of how best to encourage and support dog owners to use these methods remains extremely limited. This article uses a survey methodology based on protection motivation theory (PMT) to investigate the factors that influence owner use of positive reinforcement methods to manage aggressive behavior, in an attempt to understand potential barriers and drivers of use. In addition, the article provides an initial exploration of the potential role of wider psychological factors, including owner emotional state, social influence, and cognitive bias. Findings show that the perceived efficacy of positive reinforcement methods and the perceived ability of owners to effectively implement the technique are both key factors predicting future intentions and current reported use. Future interventions should focus on enhancing owner confidence in the effective use of positive reinforcement techniques across multiple scenarios, as well as helping owners manage their own emotional responses when they encounter challenging situations and setbacks.  相似文献   
937.
Perceptions of infectious diseases are important predictors of whether people engage in disease‐specific preventive behaviors. Having accurate beliefs about a given infectious disease has been found to be a necessary condition for engaging in appropriate preventive behaviors during an infectious disease outbreak, while endorsing conspiracy beliefs can inhibit preventive behaviors. Despite their seemingly opposing natures, knowledge and conspiracy beliefs may share some of the same psychological motivations, including a relationship with perceived risk and self‐efficacy (i.e., control). The 2015–2016 Zika epidemic provided an opportunity to explore this. The current research provides some exploratory tests of this topic derived from two studies with similar measures, but different primary outcomes: one study that included knowledge of Zika as a key outcome and one that included conspiracy beliefs about Zika as a key outcome. Both studies involved cross‐sectional data collections that occurred during the same two periods of the Zika outbreak: one data collection prior to the first cases of local Zika transmission in the United States (March–May 2016) and one just after the first cases of local transmission (July–August). Using ordinal logistic and linear regression analyses of data from two time points in both studies, the authors show an increase in relationship strength between greater perceived risk and self‐efficacy with both increased knowledge and increased conspiracy beliefs after local Zika transmission in the United States. Although these results highlight that similar psychological motivations may lead to Zika knowledge and conspiracy beliefs, there was a divergence in demographic association.  相似文献   
938.
Abstract

This paper explores the network synergies available from the configuration of highly dispersed, global production networks (GPNs). Synergy theory from the literature on intra-firm and inter-firm GPNs is examined in terms of drivers, mechanisms and outcomes. An explanatory model is developed and enriched via a series of extended case studies of firms undertaking re-configuration of their GPNs during the period 2003–2014. The primary finding is that firms create synergy in their GPNs by selecting specific configuration mechanisms, in response to a certain set of external drivers, in order to achieve certain synergistic outcomes. The paper classifies the main types of drivers, mechanisms and outcomes in terms of key variables and discusses their inter-connections and relationships.  相似文献   
939.
Semi-on-line algorithms for the bin-packing problem allow, in contrast to pure on-line algorithms, the use of certain types of additional operations for each step. Examples include repacking, reordering or lookahead before packing the items. Here we define and analyze a semi-on-line algorithm where for each step at most k items can be repacked, for some positive integer k. We prove that the upper bound for the asymptotic competitive ratio of the algorithm is a decreasing function of k, which tends to 3/2 as k goes to infinity. We also establish lower bounds for this ratio and show that the gap between upper and lower bounds is relatively small.  相似文献   
940.
Harassment is a major deterrent for productivity, loyalty, and commitment to one’s job and organization. Unfortunately, many employees tend to experience various forms of harassment in the workplace. The focus in this article is to understand the extent to which the law protects a person from harassment, first based on the explication and application laws in the United Kingdom. The article then provides comparative discussion of laws and practices against workplace harassment in the United States. A major objective of this article is to help employers and managers become more expert in preventing and correcting harassment.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号