首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   104篇
  免费   5篇
管理学   23篇
人口学   10篇
丛书文集   1篇
理论方法论   11篇
综合类   3篇
社会学   55篇
统计学   6篇
  2022年   1篇
  2021年   1篇
  2020年   4篇
  2019年   4篇
  2018年   5篇
  2017年   6篇
  2016年   3篇
  2015年   2篇
  2014年   3篇
  2013年   16篇
  2012年   6篇
  2011年   7篇
  2010年   6篇
  2009年   3篇
  2008年   4篇
  2007年   2篇
  2006年   4篇
  2005年   2篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2001年   2篇
  1999年   3篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1995年   2篇
  1991年   1篇
  1990年   2篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1985年   1篇
  1984年   2篇
  1983年   2篇
  1982年   1篇
  1980年   1篇
  1975年   1篇
  1972年   1篇
排序方式: 共有109条查询结果,搜索用时 125 毫秒
11.
12.
Patterns of conversational structure and telephone technology put a call recipient in a position where she or he is vulnerable to abuse by anonymous callers. Obscene telephone callers assault women by manipulating or violating conventions of conversational interaction and recognized categories of social relationships that have established telephone styles associated with them. Women create images of their assailants. These images reveal that they consider callers to be threatening, unpredictable outsiders, socially distant from themselves and the people they know. The opportunity exists for women to blame themselves for being victimized by callers. Call recipients judge whether their handling of a call has significance for their conceptions of themselves as women of good moral character. The treatment of call activity by agencies charged with controlling it as well as the responses of people whom women tell about their experiences create conflict over the definition that these acts are unambiguously wrong. The fact that it is women who are offended by gender-related harassment while the perpetrators are, ordinarily, more socially powerful men is a condition of this conflict.Special thanks to Howard S. Becker and Clinton R. Sanders for their helpful comments on earlier versions of this article.  相似文献   
13.
14.
15.
16.
Six multi‐decade‐long members of SRA reflect on the 1983 Red Book in order to examine the evolving relationship between risk assessment and risk management; the diffusion of risk assessment practice to risk areas such as homeland security and transportation; the quality of chemical risk databases; challenges from other groups to elements at the core of risk assessment practice; and our collective efforts to communicate risk assessment to a diverse set of critical groups that do not understand risk, risk assessment, or many other risk‐related issues. The authors reflect on the 10 recommendations in the Red Book and present several pressing challenges for risk assessment practitioners.  相似文献   
17.
The North American Free Trade Agreement (NAFTA) and the General Agreement on Tariffs and Trade (GATT) have focused attention on risk assessment of potential insect, weed, and animal pests and diseases of livestock. These risks have traditionally been addressed through quarantine protocols ranging from limits on the geographical areas from which a product may originate, postharvest disinfestation procedures like fumigation, and inspections at points of export and import, to outright bans. To ensure that plant and animal protection measures are not used as nontariff trade barriers, GATT and NAFTA require pest risk analysis (PRA) to support quarantine decisions. The increased emphasis on PRA has spurred multiple efforts at the national and international level to design frameworks for the conduct of these analyses. As approaches to pest risk analysis proliferate, and the importance of the analyses grows, concerns have arisen about the scientific and technical conduct of pest risk analysis. In January of 1997, the Harvard Center for Risk Analysis (HCRA) held an invitation-only workshop in Washington, D.C. to bring experts in risk analysis and pest characterization together to develop general principles for pest risk analysis. Workshop participants examined current frameworks for PRA, discussed strengths and weaknesses of the approaches, and formulated principles, based on years of experience with risk analysis in other setting and knowledge of the issues specific to analysis of pests. The principles developed highlight the both the similarities of pest risk analysis to other forms of risk analysis, and its unique attributes.  相似文献   
18.
19.
The language of EU rural development policy appears more interested in social inclusion and that of US policy more interested in market competitiveness. We seek to determine why policies directed at rural development in the EU and the USA differ. In both contexts new rural development policies emphasize partnership and participation but we find local participation is used to promote social inclusion in the EU and market competitiveness in the USA. An examination of these dimensions illustrates important transcontinental differences and similarities in rural development policies. We explore the socio‐historical reasons for differences in the commitment to social inclusion, while also noting similarities in the priority of market competitiveness.  相似文献   
20.
Guided by Erikson's as well as Grotevant and colleagues’ identity theorizing, three studies were conducted to assess the validity and reliability of the Adoptive Identity Work Scale (AIWS), a self-report measure of the identity work contributing to one's adoptive identity. Adult adoptees were solicited in a series of surveys (study 1: N = 196; study 2: N = 119; study 3: N = 217) to complete existing measures of adoptive identity and well-being as well as the newly formed AIWS. The studies reported here provide concurrent, construct, and predictive validity for the AIWS, consisting of five items measuring reflective exploration and five items measuring preoccupation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号