首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   265篇
  免费   20篇
管理学   26篇
民族学   3篇
人才学   2篇
人口学   40篇
理论方法论   43篇
综合类   1篇
社会学   161篇
统计学   9篇
  2023年   4篇
  2022年   2篇
  2021年   2篇
  2020年   13篇
  2019年   17篇
  2018年   15篇
  2017年   28篇
  2016年   16篇
  2015年   15篇
  2014年   12篇
  2013年   44篇
  2012年   11篇
  2011年   7篇
  2010年   9篇
  2009年   12篇
  2008年   13篇
  2007年   18篇
  2006年   7篇
  2005年   5篇
  2004年   5篇
  2003年   3篇
  2002年   3篇
  2001年   2篇
  2000年   4篇
  1999年   6篇
  1998年   1篇
  1997年   2篇
  1996年   3篇
  1995年   2篇
  1993年   2篇
  1989年   1篇
  1969年   1篇
排序方式: 共有285条查询结果,搜索用时 46 毫秒
31.
This paper considers some methodological aspects of collecting data from children drawing on three empirical studies carried out in home and school settings using qualitative methods. The paper begins with an overview of methodological issues before briefly describing the three studies and the range of methods used. Then it examines the merits and limitations of these methods including participant observation, small group discussions, interviews and structured activities. Finally, some concluding remarks are made about the appropriateness and effectiveness of these methods.  相似文献   
32.
33.
This paper presents a theoretical model to help managers visualise and manage confidential situations more effectively. The model metaphorically likens a confidential setting to the properties of a soap bubble, e.g. elastic expansion or contraction, minimal surface area to contain a given volume, fragility, surface tension, pressure, stress, strain and the potential for bursting thereby releasing the contents to the external environment. We explore the conceptual developments in two phases. Firstly, looking at how a bubble and confidential scenario form and grow. Secondly, we consider how a bubble may burst and map these forces to ways in which confidentiality may be breached. Many attributes are mapped, the key ones being: the embedded value within the system, the criticality of maintaining confidentiality, increasing pressure, the corresponding stress/strain dynamics and the levels of trust between stakeholders. Key research propositions are derived from the model which aims to minimise the risk of a confidentiality breach.  相似文献   
34.
35.
In complex policy decision situations where policy objectives cannot be reached alone through the aggregate actions of individual actors, the classical approaches for measuring the effects of regulatory initiatives such as cost–benefit analysis do not provide the information necessary for decision support. This paper discusses a framework for a multi-level analysis approach that could provide decision support in multi-level policy decision situations.  相似文献   
36.
Abstract Fish consumption advisories fail to adequately help communities address the benefits and risks of eating potentially contaminated fish. We engaged community members and relevant institutions in identifying and implementing more effective risk communication in Michigan's rural Upper Peninsula. In 2004–2005, we collected data in four Michigan counties through focus groups, community dinners, public meetings and angler interviews. Residents express a strong affinity toward eating Great Lakes fish, though a minority of participants have read the official fish advisory. Participants lack an understanding of how bioaccumulation affects consumption risk depending on the type of contaminant. We attribute the situation to conditions of post‐normal risk that emerge through interaction of the structural dimensions of science and bureaucracy with a strong natural resource‐based culture that affects the agency of residents. The implications loom large as Michigan's Department of Community Health no longer distributes hard copies of the Michigan Fish Advisory.  相似文献   
37.
38.
Abstract

Publicly funded innovation networks (PFINs) are an increasing form of organizing joint innovation activities. Yet, little is known about this form of organization which mixes characteristics of centralized and de-centralized innovation networks. This research investigates how processes of network formation affect its operation in PFINs as a hybrid form between centralized and de-centralized networks. Presenting rich data from a PFIN in the Scandinavian maritime industry, the findings show three patterns linking network formation and operation. The first pattern – well-aligned centralized and de-centralized approaches – in network formation resulted in well-functioning network operation. The second pattern – misalignment between centralized and de-centralized approaches in network formation resulted in stagnating innovation activities during network operation. The third pattern – a pre-dominant de-centralized approach during network formation resulted in unconnected sub-activities during network operation. This research contributes by showing the importance of utilizing both centralized and de-centralized approaches and aligning them to enable well-functioning network formation and operation.  相似文献   
39.
Using social cognitive career theory as a framework, we examined the longitudinal effects of proximal parental contextual influences on career aspirations and actions in a collectivist context. We used a sample of 954 Indonesian high school students and measured parental career expectations, adolescent‐parent career congruence, self‐efficacy, outcome expectations, career aspirations, planning and exploration, twice, 6 months apart. The best‐fitting model was reciprocal, with the results showing that parental career expectations predicted subsequent career aspirations and planning, and aspirations and congruence with parents regarding career matters predicted future exploration. Self‐efficacy and outcome expectations were reciprocally related over time. Self‐efficacy served as an across‐time predictor of both parental contextual variables. Career exploration predicted future self‐efficacy and planning predicted later outcome expectations.  相似文献   
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号