全文获取类型
收费全文 | 154篇 |
免费 | 1篇 |
专业分类
管理学 | 7篇 |
民族学 | 3篇 |
人才学 | 2篇 |
人口学 | 15篇 |
丛书文集 | 3篇 |
理论方法论 | 31篇 |
综合类 | 2篇 |
社会学 | 83篇 |
统计学 | 9篇 |
出版年
2023年 | 1篇 |
2021年 | 2篇 |
2020年 | 1篇 |
2019年 | 4篇 |
2018年 | 6篇 |
2017年 | 3篇 |
2016年 | 5篇 |
2015年 | 2篇 |
2014年 | 4篇 |
2013年 | 30篇 |
2012年 | 4篇 |
2011年 | 6篇 |
2010年 | 1篇 |
2009年 | 2篇 |
2008年 | 5篇 |
2007年 | 4篇 |
2006年 | 7篇 |
2005年 | 6篇 |
2004年 | 2篇 |
2003年 | 5篇 |
2002年 | 4篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1979年 | 3篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1976年 | 1篇 |
1974年 | 1篇 |
1971年 | 4篇 |
1970年 | 1篇 |
1969年 | 3篇 |
1968年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有155条查询结果,搜索用时 46 毫秒
61.
62.
Chad M. Coren Sanjay R. Nath Maurice Prout 《Journal of Technology in Human Services》2013,31(4):273-286
It is well established that computer technology can be ethically, legally, usefully, and efficaciously integrated with the psychosocial treatment of mental health conditions such as anxiety and depression. There is, however, a paucity of literature regarding how these applications could be applied to sex therapy. This article will briefly review the adaptation of computer technology to mental health treatment, provide a rationale for using computer applications in sex therapy, and demonstrate how computer technology could be applied to Masters and Johnson's sensate focus technique. The Sensate Focus Prototype (an Internet-delivered therapeutic module) presented is a working application designed for use by psychotherapists and researchers. 相似文献
63.
The launching of ‘social choice and welfare’ and the creation of the ‘society for social choice and welfare’ 总被引:1,自引:1,他引:0
Maurice Salles 《Social Choice and Welfare》2005,25(2-3):557-564
64.
65.
In this article we report and reflect upon a service offered in one locality of the UK to children who have been abused. The evaluation shows the value of close working relationships between agencies, and the very positive way that such interventions are viewed by the children and those involved with their care. It is also evident that an eclectic style of therapeutic work is able to produce improvement in aspects of the children's behaviour, most particularly in the area of family life and relationships. Copyright © 2005 John Wiley & Sons, Ltd. 相似文献
66.
67.
We carried out a study to estimate the public health risk posed by dairy cattle located in New York City's Catskill/Delaware watershed, as measured by daily C. parvum-like oocyst loading. A Monte Carlo simulation model that takes into account the nature of the dairy cattle population within the target area, age-specific incidence/prevalence rates, as well as differential fecal production and oocyst-shedding intensity rates was used to address the objectives. Additionally, the model was designed to distinguish between zoonotic and nonzoonotic species/genotypes of Cryptosporidium. Total estimated daily C. parvum-like oocyst shedding across all age/production categories was estimated at 4.15 x 10(10). The zoonotic C. parvum comprised 93.5% of this load. It was estimated that preweaned calves produce 99.5% of the total daily C. parvum ocyst burden. The recently described nonzoonotic C. bovis was estimated to have a daily load of 2.2 x 10(9) oocysts across all age/production strata. C. parvum deer-like genotype was estimated to have a total daily load of 1.3 x 10(9) oocysts. The results of this study support earlier assertions that strategies aimed at reducing the cryptosporidial risk posed by dairy cattle to public health will be most efficacious if aimed at preweaned calves. 相似文献
68.
69.
This article examines the socioeconomic and sociocultural status of the second‐generation Turkish young people in the Netherlands, comparing them to their Moroccan counterparts. The comparative perspective can better highlight the characteristic features of the Turkish second generation. The educational status of both the Turkish and the Moroccan young people is still weak, especially by comparison with their ethnic Dutch peers. The obstacles that second‐generation migrants encounter in their educational careers are many and diverse, and these derive both from inside their own groups and from institutional structures and other forces in Dutch society. Among the latter has been the delay in introducing professional second‐language training, which resulted in Dutch language deficiencies and poor primary school achievements. This, in combination with early school selection mechanisms at age 12, has consigned the vast majority of second‐generation children to short, dead‐end lower vocational or secondary school tracks. Unemployment is extremely high among the second‐generation migrants with short educational tracks, and discrimination in the labor market hits this group especially hard. Despite all this, the number of second‐generation young people who have succeeded in getting a better education is growing, and they are now well equipped to seek employment. An important factor in their success has been the mutual help and support they have received from family and community networks. 相似文献
70.
This paper proposes a new measure for a group's ability to lead society to adopt their standard of behavior, which in particular takes account of the time the group takes to convince the whole society to adopt their position. This notion of a group's power to initiate action is computed as the reciprocal of the resistance against it, which is in turn given by the expected absorption time of a related finite state partial Markov chain that captures the social dynamics. The measure is applicable and meaningful in a variety of models where interaction between agents is formalized through (weighted) binary relations. Using Percolation Theory, it is shown that the group power is monotonic as a function of groups of agents. We also explain the differences between our measure and those discussed in the literature on Graph Theory, and illustrate all these concerns by a thorough analysis of two particular cases: the Wolfe Primate Data and the 11S hijackers’ network. 相似文献