首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   525篇
  免费   34篇
管理学   40篇
民族学   8篇
人口学   47篇
丛书文集   5篇
理论方法论   74篇
综合类   3篇
社会学   341篇
统计学   41篇
  2023年   1篇
  2022年   5篇
  2021年   11篇
  2020年   19篇
  2019年   20篇
  2018年   32篇
  2017年   33篇
  2016年   31篇
  2015年   29篇
  2014年   21篇
  2013年   82篇
  2012年   40篇
  2011年   26篇
  2010年   21篇
  2009年   18篇
  2008年   21篇
  2007年   26篇
  2006年   22篇
  2005年   20篇
  2004年   14篇
  2003年   12篇
  2002年   13篇
  2001年   7篇
  2000年   8篇
  1999年   6篇
  1998年   4篇
  1997年   2篇
  1996年   1篇
  1995年   2篇
  1994年   1篇
  1993年   1篇
  1991年   1篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1984年   2篇
  1979年   2篇
  1977年   1篇
  1976年   1篇
排序方式: 共有559条查询结果,搜索用时 31 毫秒
111.
While many IT security incidents result in relatively minor operational disruptions or minimal recovery costs, occasionally high-impact security breaches can have catastrophic effects on the firm. Unfortunately, measuring security risk and planning for countermeasures or mitigation is a difficult task. Past research has suggested risk metrics which may be beneficial in understanding and planning for security incidents, but most of these metrics are aimed at identifying expected overall loss and do not directly address the identification of, or planning for, sparse events which might result in high-impact loss. The use of an upper percentile value or some other worst-case measure has been widely discussed in the literature as a means of stochastic optimization, but has not been applied to this decision domain. A key requirement in security planning for any threat scenario, expected or otherwise, is the ability to choose countermeasures optimally with regard to tradeoffs between countermeasure cost and remaining risk. Most of the planning models in the literature are qualitative, and none that we are aware of allow for the optimal determination of these tradeoffs. Therefore, we develop a model for optimally choosing countermeasures to block or mitigate security attacks in the presence of a given threat level profile. We utilize this model to examine scenarios under both expected threat levels and worst-case levels, and develop budget-dependent risk curves. These curves demonstrate the tradeoffs which occur if decision makers divert budgets away from planning for ordinary risk in an effort to mitigate the effects of potential high-impact outcomes.  相似文献   
112.
Identifying codes in the Cartesian product of a complete graph and a path are considered. After proving a set of sufficient conditions for a set in such a graph to be an identifying code, we then construct minimum identifying codes when the complete graph is of order three or at least five, and when the path is of order at least three.  相似文献   
113.
Preferences,the Agenda Setter,and the Distribution of Power in the EU   总被引:1,自引:1,他引:0  
In this paper, we present a generalization of power indices which includes the preferences of the voters. Using a Multilinear Extension perspective (Owen in Manage Sci 18:p64–p72, 1972a) we measure the probability of the players’ voting “yes” for a particular political issue. Further, we randomize the issues and show the influence that the Agenda Setter can have on a player’s power. We demonstrate these results using data from the European Union to show how the power distribution may shift after enlargement and under the new Constitutional Treaty.  相似文献   
114.
Performativity and helping professions: social theory, power and practice   总被引:1,自引:0,他引:1  
Drawing on Judith Butler's conception of 'performativity', we would argue that the notion has important implications for contemporary debates in international social welfare over agency, subjection and 'resistance'. Professional social workers embedded in discursive institutions function according to particular expectations around performativity. In addition, this organisational context is complex with multiple demands. In light of technologies of surveillance and control in contemporary social work, performativity offers a response to the pressing need to expand notions of worker opposition beyond traditional forms of organised dissent towards the production of subjective space.  相似文献   
115.
Objective: To pilot test the feasibility of implementing an elder abuse (EA) screening tool (DETECT) designed for medics.

Methods: Testing occurred between September 17th, 2015 and October 26th, 2015. MedStar Mobile Healthcare medics completed the DETECT tool when responding to calls for community-dwelling patients 65 years of age or older.

Results: The DETECT tool was used 1,248 times by 97% of medics responding to an eligible 911 call. Medics responded affirmatively to at least one screening item on 209 of the completed screenings (16.8%). Immediately following the introduction of the DETECT tool, there was an increase of 5.4 (226% above baseline) reports per month (p = 0.0056).

Conclusions: The DETECT tool was easily incorporated into medic’s field-based practice and resulted in an increase in medic generated reports of EA to APS. Future research designed to evaluate the tool’s validity and reliability are warranted.  相似文献   

116.
117.
118.
Based on prior literature, this article offers a reconciliation of the core roles of nonprofit boards and aligns these role‐sets with organizational theories. A survey instrument was developed and validated to measure each of four role‐sets (monitoring, supporting, partnering, and representing) to assess whether emphasis on specific roles affects board members’ perception of performance. Our study of nonprofit boards in a midsized midwestern city found that balance across the role‐sets was associated with effective organizational performance. Furthermore, when board members describe any of the four role‐sets as deficient, they perceive the organization as less effective. The results of the study provide practitioners with a validated survey tool that provides nonprofit boards with a method to identify which roles their board emphasizes.  相似文献   
119.
120.
A gap exists between empirical evidence demonstrating the risks posed by domestic violence (DV) and the weight that evidence is given by custody evaluators. This gap may result from common beliefs about DV that diminish or deny its seriousness, which include that mothers often make false allegations to gain advantage and that DV and high conflict are synonymous and do not require differential approaches. Using a multiple segment factorial vignette design, we systematically assessed how these beliefs influenced custody evaluators' (N = 603) recommendations and judgments of the believability of allegations. Mother's demeanor (i.e., hostile vs. pleasant) was the most consistent predictor of evaluators' recommendations and judgments of credibility. Findings have implications for providing research-based education and training for evaluators.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号