首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   239篇
  免费   5篇
管理学   34篇
民族学   3篇
人口学   27篇
丛书文集   1篇
理论方法论   20篇
综合类   1篇
社会学   129篇
统计学   29篇
  2023年   4篇
  2022年   1篇
  2021年   1篇
  2020年   12篇
  2019年   13篇
  2018年   7篇
  2017年   14篇
  2016年   12篇
  2015年   8篇
  2014年   5篇
  2013年   44篇
  2012年   12篇
  2011年   12篇
  2010年   4篇
  2009年   8篇
  2008年   6篇
  2007年   2篇
  2006年   6篇
  2005年   8篇
  2004年   6篇
  2003年   10篇
  2002年   3篇
  2001年   4篇
  2000年   3篇
  1999年   2篇
  1998年   3篇
  1997年   1篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
  1991年   4篇
  1990年   1篇
  1988年   1篇
  1986年   3篇
  1985年   2篇
  1984年   1篇
  1983年   2篇
  1982年   1篇
  1981年   1篇
  1980年   2篇
  1979年   4篇
  1976年   1篇
  1975年   2篇
  1974年   2篇
  1973年   2篇
  1966年   1篇
排序方式: 共有244条查询结果,搜索用时 15 毫秒
241.
Real-time tracking of tool and equipment inventories is a critical function of many organizations and sectors. For prisons and correctional facilities, tracking and monitoring of assets such as cookware, hardware, keys, janitorial equipment, vocational/technical specialty tools, etc., is essential for safety, security, trust, efficiency, education, etc. The performance of automated systems for this purpose can be diminished by a variety of emergent and future sociotechnical factors alone and in combination. This article introduces a methodology for contractor evaluation and selection in acquisition of innovative asset management systems, with an emphasis on evolving system requirements under uncertainty. The methodology features a scenario-based preferences analysis of emergent and future conditions that are disruptive to the performance of the asset-control system. The conditions are across technologies, operating environments, regulations, workforce behaviors, offender behaviors, prices and markets, organizations, cyber threats, etc. The methodology addresses the influence and interaction of the conditions to disrupt system priorities. Examples include: (i) infectious disease disrupting priorities among requirements and (ii)  radio-frequency identification (RFID) and wireless-technology innovations disrupting priorities among stakeholders. The combinations of conditions that most and least matter for the system acquisition are characterized. The methodology constitutes a risk register for monitoring sources of risk to project performance, schedule, and cost throughout the system lifecycle. The results will be of interest to both practitioners and scholars engaged in systems acquisition as the pandemic interacts with other factors to affect risk, uncertainty, and resilience of organizational missions and operations.  相似文献   
242.
This paper establishes the asymptotic distribution of an extremum estimator when the true parameter lies on the boundary of the parameter space. The boundary may be linear, curved, and/or kinked. Typically the asymptotic distribution is a function of a multivariate normal distribution in models without stochastic trends and a function of a multivariate Brownian motion in models with stochastic trends. The results apply to a wide variety of estimators and models. Examples treated in the paper are: (i) quasi-ML estimation of a random coefficients regression model with some coefficient variances equal to zero and (ii) LS estimation of an augmented Dickey-Fuller regression with unit root and time trend parameters on the boundary of the parameter space.  相似文献   
243.
With the global penetration of Internet technologies, individuals may now cross organizational boundaries to communicate efficiently with others regardless of time and space. Thus, when looking for help in solving work tasks, knowledge workers may just as easily contact individuals in rival firms across the globe as a coworker sitting at the next desk. As a result, management faces questions such as (1) How should firms manage employees' knowledge‐sourcing activities when they span both intra‐organizational and extra‐organizational boundaries, and (2) What is the relationship between different knowledge‐sourcing activities and individual performance? Grounded in the knowledge‐based view of the firm, we investigate these questions using data from Europe's largest information technology (IT) services and management consulting company. Our results provide evidence that organizations should support boundary spanning and knowledge sourcing from both internal and external sources. Results suggest (1) a positive relationship between boundary spanning communication and creativity and general performance, and (2) a negative relationship between a reliance on colocated coworkers as knowledge sources and creativity.  相似文献   
244.
Teachers are instrumental in antibullying efforts given their position of authority in the classroom context, yet teachers can only be effective at reducing victimization and bullying in their classrooms if they are aware of who is involved. Consequently, teachers’ attunement to bullies and victims is a critical component of social dynamics management and antibullying practices. Given the importance of teacher attunement, there is a pressing need to identify relevant factors related to the degree to which teachers are attuned to bullies and victims. The major objective of the current investigation was to examine student- (gender, popularity status), classroom- (average bullying, norm salience of bullying, popularity hierarchy, class size), and teacher-level (gender, teaching experience) factors associated with teachers’ attunement to bullies and victims. Using a sample of students in 5th-grade classrooms, we analyzed the likelihood of teachers being attuned to 267 bullies (76.8% boys) nested in 112 classrooms and 343 victims (55.1% boys) nested in 120 classrooms using multilevel mixed-effects generalized linear models. Results indicated that teachers were more likely to be attuned to boy bullies and victims but less likely to be attuned to bullies and victims with higher popularity status. No classroom or teacher level factors related significantly to the likelihood of teachers’ attunement. Implications for social dynamics management and bullying intervention efforts are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号