全文获取类型
收费全文 | 11340篇 |
免费 | 333篇 |
国内免费 | 15篇 |
专业分类
管理学 | 1534篇 |
民族学 | 75篇 |
人才学 | 3篇 |
人口学 | 973篇 |
丛书文集 | 231篇 |
理论方法论 | 1102篇 |
综合类 | 630篇 |
社会学 | 5502篇 |
统计学 | 1638篇 |
出版年
2021年 | 56篇 |
2020年 | 157篇 |
2019年 | 256篇 |
2018年 | 269篇 |
2017年 | 380篇 |
2016年 | 275篇 |
2015年 | 215篇 |
2014年 | 277篇 |
2013年 | 1786篇 |
2012年 | 376篇 |
2011年 | 377篇 |
2010年 | 316篇 |
2009年 | 301篇 |
2008年 | 280篇 |
2007年 | 332篇 |
2006年 | 295篇 |
2005年 | 310篇 |
2004年 | 270篇 |
2003年 | 225篇 |
2002年 | 298篇 |
2001年 | 334篇 |
2000年 | 265篇 |
1999年 | 218篇 |
1998年 | 172篇 |
1997年 | 160篇 |
1996年 | 156篇 |
1995年 | 149篇 |
1994年 | 154篇 |
1993年 | 156篇 |
1992年 | 155篇 |
1991年 | 149篇 |
1990年 | 156篇 |
1989年 | 148篇 |
1988年 | 135篇 |
1987年 | 148篇 |
1986年 | 116篇 |
1985年 | 147篇 |
1984年 | 156篇 |
1983年 | 142篇 |
1982年 | 123篇 |
1981年 | 90篇 |
1980年 | 111篇 |
1979年 | 113篇 |
1978年 | 102篇 |
1977年 | 86篇 |
1976年 | 88篇 |
1975年 | 99篇 |
1974年 | 94篇 |
1973年 | 69篇 |
1972年 | 61篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
993.
Lois E. Horton 《Sociological inquiry》1985,55(2):182-199
This paper uses data from an intensive study of Boston's antebellum black community to demonstrate how sustained social activism is embedded in the formal and informal institutions of the community. The social networks of cooperative institutions were primary factors in this community's ability to mobilize and sustain protest actions and to call attention to social injustice. This examination of antebellum black Boston indicates that the issue of slavery was crucial to social activism. This suggests that the presence of a salient issue which links the everyday lives of participants with a public issue may be an important factor in building a social movement based in a poor, relatively powerless community. 相似文献
994.
995.
996.
Principal component and correspondence analysis can both be used as exploratory methods for representing multivariate data in two dimensions. Circumstances under which the, possibly inappropriate, application of principal components to untransformed compositional data approximates to a correspondence analysis of the raw data are noted. Aitchison (1986) has proposed a method for the principal component analysis of compositional data involving transformation of the raw data. It is shown how this can be approximated by a correspondence analysis of appropriately transformed data. The latter approach may be preferable when there are zeroes in the data. 相似文献
997.
998.
Robert C. Reardon Emily E. Bullock Katie E. Meyer 《The Career development quarterly》2007,55(3):262-274
The authors analyze civilian occupations and employment data collected by the U.S. Census Bureau in 1960, 1970, 1980, 1990, and 2000 with respect to 6 kinds of work (Holland's RIASEC [Realistic, Investigative, Artistic, Social, Enterprising, Conventional] classification), employment, and gender. For the 1990 and 2000 censuses, kinds of work, gender, and income are analyzed, and for the 2000 census, kinds of work, age, and gender are examined. Past employment trends developed from census data are further analyzed with respect to Bureau of Labor Statistics employment projections through 2012. Implications for further research, employment policy, and career services are offered. 相似文献
999.
机构股东积极主义发展中存在的主要争论 总被引:3,自引:0,他引:3
20世纪 80年代以来 ,机构股东积极主义得到了很大的发展 ,而其发展不仅成为理论研究和公司治理实践的热点问题 ,而且也引起了非常广泛的争论。这些争论主要体现在机构投资者是否应该参与公司治理、机构积极主义行为是否能改善公司治理、应以什么方式参与公司治理三个方面。本文根据机构股东积极主义的发展 ,对这些争论进行了评价和分析 ,并对我国实践的启示进行分析 相似文献
1000.
A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism 总被引:4,自引:0,他引:4
The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex and interdependent. Protecting the critical infrastructures from terrorism presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify and prioritize the vulnerabilities in these infrastructures. This article presents a methodology for the identification and prioritization of vulnerabilities in infrastructures. We model the infrastructures as interconnected digraphs and employ graph theory to identify the candidate vulnerable scenarios. These scenarios are screened for the susceptibility of their elements to a terrorist attack, and a prioritized list of vulnerabilities is produced. The prioritization methodology is based on multiattribute utility theory. The impact of losing infrastructure services is evaluated using a value tree that reflects the perceptions and values of the decisionmaker and the relevant stakeholders. These results, which are conditional on a specified threat, are provided to the decisionmaker for use in risk management. The methodology is illustrated through the presentation of a portion of the analysis conducted on the campus of the Massachusetts Institute of Technology. 相似文献