全文获取类型
收费全文 | 1141篇 |
免费 | 61篇 |
专业分类
管理学 | 134篇 |
民族学 | 7篇 |
人才学 | 2篇 |
人口学 | 108篇 |
丛书文集 | 7篇 |
理论方法论 | 191篇 |
综合类 | 4篇 |
社会学 | 556篇 |
统计学 | 193篇 |
出版年
2023年 | 12篇 |
2021年 | 9篇 |
2020年 | 28篇 |
2019年 | 36篇 |
2018年 | 29篇 |
2017年 | 53篇 |
2016年 | 50篇 |
2015年 | 34篇 |
2014年 | 35篇 |
2013年 | 183篇 |
2012年 | 35篇 |
2011年 | 44篇 |
2010年 | 33篇 |
2009年 | 36篇 |
2008年 | 32篇 |
2007年 | 39篇 |
2006年 | 38篇 |
2005年 | 34篇 |
2004年 | 28篇 |
2003年 | 24篇 |
2002年 | 29篇 |
2001年 | 32篇 |
2000年 | 20篇 |
1999年 | 23篇 |
1998年 | 14篇 |
1997年 | 14篇 |
1996年 | 10篇 |
1995年 | 14篇 |
1994年 | 10篇 |
1993年 | 25篇 |
1992年 | 14篇 |
1991年 | 13篇 |
1990年 | 11篇 |
1989年 | 6篇 |
1988年 | 11篇 |
1987年 | 10篇 |
1986年 | 6篇 |
1985年 | 7篇 |
1984年 | 5篇 |
1983年 | 9篇 |
1982年 | 8篇 |
1981年 | 7篇 |
1980年 | 8篇 |
1979年 | 14篇 |
1978年 | 9篇 |
1977年 | 13篇 |
1976年 | 6篇 |
1975年 | 15篇 |
1974年 | 8篇 |
1973年 | 5篇 |
排序方式: 共有1202条查询结果,搜索用时 609 毫秒
241.
Worldwide data on terrorist incidents between 1968 and 2004 gathered by the RAND Corporation and the Oklahoma City National Memorial Institute for the Prevention of Terrorism (MIPT) were assessed for patterns and trends in morbidity/mortality. Adjusted data analyzed involve a total of 19,828 events, 7,401 "adverse" events (each causing >or= 1 victim), and 86,568 "casualties" (injuries), of which 25,408 were fatal. Most terror-related adverse events, casualties, and deaths involved bombs and guns. Weapon-specific patterns and terror-related risk levels in Israel (IS) have differed markedly from those of all other regions combined (OR). IS had a fatal fraction of casualties about half that of OR, but has experienced relatively constant lifetime terror-related casualty risks on the order of 0.5%--a level 2 to 3 orders of magnitude more than those experienced in OR that increased approximately 100-fold over the same period. Individual event fatality has increased steadily, the median increasing from 14% to 50%. Lorenz curves obtained indicate substantial dispersion among victim/event rates: about half of all victims were caused by the top 2.5% (or 10%) of harm-ranked events in OR (or IS). Extreme values of victim/event rates were approximated fairly well by generalized Pareto models (typically used to fit to data on forest fires, sea levels, earthquakes, etc.). These results were in turn used to forecast maximum OR- and IS-specific victims/event rates through 2080, illustrating empirically-based methods that could be applied to improve strategies to assess, prevent, and manage terror-related risks and consequences. 相似文献
242.
Cindy Simon Rosenthal James A. Rosenthal & Jocelyn Jones 《Social science quarterly》2001,82(3):633-646
Objective. We ask: How do socialization experiences shape adolescent perceptions of and the performance of gender in political leadership roles? We examine a political simulation, Model United Nations, which attracts academically motivated students aspiring to elite roles in politics and government. Methods. Using observational and survey data, we explore adolescent behavior in the simulation as both a learning experience and as a reflection of students' perceptions of leadership behavior. Results. Three critical observations emerge. First, the Model United Nations is a domain in which young women do not play an equal part. Female delegates take far fewer speaking turns. However, contextual factors, including membership on a committee that deals with less masculine issues and on a committee with a female chair, increase the likelihood of female turn‐taking. Second, though participants come to the event with very similar motivations, young women leave less satisfied with their personal effectiveness than do young men. Finally, female delegates are judged less favorably by themselves and others and thus as less successful in the simulation. Conclusions. These findings have normative implications for the recruitment of young women to politics. 相似文献
243.
A randomized experiment investigated the effect of various instructional sets on reducing agency awareness overclaiming, that is, claiming knowledge of fictitious agencies. As predicted, respondents who were warned that the list contained fake agencies exhibited less agency awareness overclaiming than respondents who were not warned. However, providing respondents a memory retrieval strategy had no effect on agency awareness overclaiming. A multivariate model, which included demographic variables, response style variables, and knowledge variables, explained 40% of the variance of agency awareness overclaiming. 相似文献
244.
Mark A. Ownbey Robert J. Jones Bonnie L. Judkins Julie A. Everidge Gary D. Timbers 《Child and Adolescent Social Work Journal》2001,18(6):417-436
Few treatment programs exist for very young children with serious sexual behavior problems. Fewer still have produced data relating to their effectiveness, and the sparse data that have emerged have focused on global social adjustment or improvement rather than on sexual behavior- specific changes. This study tracked both frequency of problem sexual behaviors and care giver estimates of the propensity to re-offend of six initial clients referred to a treatment-intensive foster care program for sexually reactive children and pre-adolescent sexual offenders. A simple pre-post (basepoint-treatment) design was used, and in-treatment data gathered over a two-year interval are presented. Initial results indicate that the problem sexual behaviors of most of these youthful clients were effectively and immediately suppressed in the context of their treatment intensive foster placements, but that the program's impact on the clients' propensity to re-offend given the opportunity—a crude measure of treatment internalization—was much less immediate, less pronounced, and less predictable across clients. Recommendations based on these data are offered concerning the viability of foster care intervention for sexualized and offending children, as well as optimal durations for such treatments. The strengths and weaknesses of the novel progress tracking method are discussed. 相似文献
245.
Self-awareness is generally considered core to effective social work education and professional practice. This paper examines student reflections on personal vulnerability and self-awareness in social, educational, and professional contexts. Ethics approval and student consent was obtained to analyse entries from the online learning component of a second year interpersonal skills course. The week 7 workshop, which focused on the concept of self-awareness, was contextualised and triggered by an online viewing of a relevant TED talk on the power of vulnerability. Qualitative analysis of student entries from this week revealed three core themes: (a) a provocative stimulus, which emphasised the usefulness and challenging nature of the TED talk in the context of workshop learning; (b) vulnerability, scarcity, and blame, which highlighted student identification with stimuli material and their emerging self-awareness; and (c) the importance of self-awareness and connection, which illuminated the students’ beginning applications of theory to practice.
IMPLICATIONS
Interpersonal skills courses can be well supported by a diverse range of online and classroom stimuli.
The intentional scaffolding of self-reflective activities can support early skills development and promote self-awareness.
The analysis of student reflections can contribute to effective and responsive curriculum design.
246.
ABSTRACTIn this article, life history methodology and principles of counterstorytelling are used to examine moments when one Black male preservice social studies teacher and three Black male social studies teachers challenge Black masculinist visions of leadership, and moments when they seem complicit in perpetuating these visions. Findings indicate that these educators’ understandings of Blackness, maleness, and the pursuit of Black masculine recognition are fluid, developing and sometimes contradictory. We argue that while necessary across disciplines, interrogations of Black masculinity are uniquely imperative in social studies teacher education due to how assumptions about Blackness and maleness have shaped struggles for Black civic recognition. 相似文献
247.
Both the increase in traveler numbers and the heightened threat posed by terrorism in recent years represent significant challenges to airport security measures. To ensure that a high level of security is maintained, randomized security checks have been proposed as a promising alternative to traditional security approaches. The use of randomized checks means that only a specific number of people are selected for security screening. However, the likely effects of such a change in security procedures on travelers’ security perceptions and on the deterrence of criminal activities remain unclear. Thus, the present study examines how varying the percentage of people screened during security checks influences people's security perceptions. In two online experiments, the participants were asked to imagine that they sought to smuggle an explosive dummy past an airport security check. The only information provided was the number of people screened during security checks, which was manipulated between-subjects in the first experiment and within-subjects in the second experiment. The participants then had to rate their security perception (i.e., the perceived likelihood of successfully smuggling the explosive dummy). The findings show that people perceive traditional security checks to be safer than randomized checks, irrespective of whether 90% or 30% of people are screened. Hence, if randomized security checks would indeed be implemented, it would automatically lead to a decreased perception of security. Furthermore, this decreased security perception might lead to an actual reduction in security, as the deterrence of criminal activities could also be reduced. 相似文献
248.
Abstract Between 2018 and 2019, two librarians at the College of Charleston Libraries incorporated cloud-based technologies into their collection management workflows. The following paper was derived from a presentation they prepared for the 2020 North Carolina Serials Conference, which was to be held on March 27, 2020 in Chapel Hill, North Carolina but was canceled due to the COVID-19 pandemic. The paper highlights which cloud technologies they use and provides an overview of the literature that has been published on project management and cloud-based technologies in libraries. It includes an explanation of how they use each tool, and provides examples for setting up each tool in different scenarios so that other collection management librarians may implement them into their own routines. The paper ends with an exploration of the advantages and disadvantages of integrating these tools into collection management workflows. Although the librarians had not prepared to discuss the role these technologies may play when working remotely, they have both found them invaluable during this unprecedented time when many librarians are working from home. 相似文献
249.
In this paper we share our collaborative experience of making a video in which disabled women present their lives as they wish to portray them. We undertook what we hope will be perceived as emancipatory research, in which disabled and non-disabled women work together to create audio-visual teaching materials. We include a preliminary discussion about the representation of disability on British television broadcasts between October 1991 and March 1992. We look at negative imagery, charity fund raising, and positive images. The paper uses comments by disabled broadcasters and disabled academics, and reflects on their work. 相似文献
250.