首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9713篇
  免费   287篇
  国内免费   58篇
管理学   399篇
劳动科学   1篇
民族学   88篇
人才学   1篇
人口学   530篇
丛书文集   1085篇
理论方法论   1625篇
综合类   3817篇
社会学   2412篇
统计学   100篇
  2024年   17篇
  2023年   89篇
  2022年   103篇
  2021年   149篇
  2020年   240篇
  2019年   201篇
  2018年   260篇
  2017年   283篇
  2016年   276篇
  2015年   241篇
  2014年   497篇
  2013年   1136篇
  2012年   774篇
  2011年   843篇
  2010年   624篇
  2009年   667篇
  2008年   623篇
  2007年   604篇
  2006年   584篇
  2005年   395篇
  2004年   373篇
  2003年   321篇
  2002年   226篇
  2001年   172篇
  2000年   129篇
  1999年   53篇
  1998年   31篇
  1997年   20篇
  1996年   17篇
  1995年   17篇
  1994年   9篇
  1993年   2篇
  1992年   7篇
  1991年   5篇
  1989年   2篇
  1988年   4篇
  1987年   2篇
  1985年   13篇
  1984年   13篇
  1983年   4篇
  1982年   5篇
  1981年   9篇
  1980年   5篇
  1979年   5篇
  1978年   4篇
  1977年   3篇
  1976年   1篇
排序方式: 共有10000条查询结果,搜索用时 614 毫秒
101.
This study investigates the egocentric networks of underrepresented minority students. Adjustment to college for underrepresented minority students often means balancing between the origin (i.e., low-status family) and host (i.e., academic) environments, requiring students to develop different coping strategies. The analysis included 124 Roma university students. We employed the contact diary method and the EgoNet program for mapping students’ egocentric networks. We explored classification among egocentric networks by cluster analysis based on the network proportion of the origin, fellow, and host groups. Three clusters were distinguished. The Host-based cluster proved to be the most advantageous, while the Balancing cluster appeared to be the most disadvantageous in terms of network resources, well-being, and trust. Partners’ ethnicity and educational attainment showed a strong connection with cluster membership. Our results highlight that small fellow communities can successfully interconnect the origin and host groups in students’ egocentric networks.  相似文献   
102.
Student anxiety is frequently discussed within social work education. Due to its potentially devastating impacts, social work educators need to have a full understanding of anxiety in this context, in order to determine the best way to support students. Research on student anxiety from a broad body of literature provides implications for social work classrooms and field education. Key underlying concepts from previous social work and related research on student anxiety inform a conceptual model to help educators develop a more complex understanding of student anxiety. Implications for further research and important next steps in the development of support strategies for social work students are identified.  相似文献   
103.
A significant proportion of young people in Australia are currently not being engaged in school and other social systems. This article presents the results of a mixed-methods study of a pilot Family Wellbeing intervention designed to enhance the social and emotional wellbeing (SEWB) of young Aboriginal men and improve engagement in education, employment, and other social participation. A questionnaire incorporating the Kessler Psychological Distress Scale and respondent self-assessment SEWB questions was administered to program participants pre and post intervention (N = 30) and qualitative data were collected from program organisers (N = 6). The results suggest that the Family Wellbeing intervention has the capacity to make a marked contribution to the SEWB of young Aboriginal men; participants experienced strong improvement in capacity to manage relationships, engagement in education and employment, and mental and physical health. The factors that enabled the program to be adapted to the target group and setting are documented.  相似文献   
104.
Missing data are often problematic when analyzing complete longitudinal social network data. We review approaches for accommodating missing data when analyzing longitudinal network data with stochastic actor-based models. One common practice is to restrict analyses to participants observed at most or all time points, to achieve model convergence. We propose and evaluate an alternative, more inclusive approach to sub-setting and analyzing longitudinal network data, using data from a school friendship network observed at four waves (N = 694). Compared to standard practices, our approach retained more information from partially observed participants, generated a more representative analytic sample, and led to less biased model estimates for this case study. The implications and potential applications for longitudinal network analysis are discussed.  相似文献   
105.
How does the US recruit its citizen spies used to maintain and proliferate coercive power? I use an interdisciplinary approach and a framework of affect theory to argue that there is an ‘affective security curriculum’ (ASC) that assists in explaining the tendencies towards jingoism used in the recruitment and indoctrination of students – as future security workers – in certain academic disciplines. The ASC is precisely the phenomenon that works to construct this expert class and is produced by order words, the most crucial of which is ‘terrorism’, as well as larger cultural norms linked to neoliberalism that have achieved near total dominance since the 1980s. The ASC works by intensifying the (in)ability to act for those in its domain. The necessity of linguistically proficient security workers to the US’ hegemonic project makes this a question of considerable political importance. The ASC is a different approach to answering questions of how US hegemony is maintained. Whereas positivist research agendas, such as content analysis, and postpositivist approaches, such as critical discourse analysis, certainly have their uses (and to which my notion of ASC is indebted), paradigms such as these fail to focus on the engendering processes at work vis-à-vis the expert class, without which the discursive frames such methodologies analyse would simply dissipate. My overarching purpose in this paper is to develop the concept of the ASC, its quiddity, and to present at least an incipient methodology for analysing its critical duties. As my primary intent is to introduce and conceptualize the theoretical framework of the affective security curriculum, the applied segment of this endeavour will be relatively brief – and is designed as a primer for further research.  相似文献   
106.
苏敏  倪赤丹 《社会工作》2012,(12):22-24
社区在一定意义上就是一个场域,社区工作展现着两个分别体现各自场域的主体人群即社会工作者和社区居民之间的相互影响。社区工作中确定谁是场域主体,有助于社会工作者对自身角色的定位及对社区工作不同阶段策略和方法的把握。社区工作准备阶段,侧重于社区居民的主体场域;社区工作预估与服务策划方案制定阶段,侧重于社区工作者的主体场域;社区工作服务策划方案执行阶段,是社区工作者场域与社区居民场域互为主体;社区工作评估阶段,则侧重于社区居民的主体场域。  相似文献   
107.
Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed.  相似文献   
108.
Social media is embedded in today's internationalization strategy. Companies extend their reach into foreign countries by posting and tweeting. Firms also enhance their mobile capabilities in foreign markets (e.g., knowledge and reputation) through user-generated content in online social networks. Levering on the capabilities-based theory of the multinational enterprise, this paper builds upon a resource-based, industry/network-based, and institution-based view framework. The study provides a comprehensive conceptual and empirical model to explain the effect of social networks on foreign direct investment. Empirical analysis in a global panel dataset of >4500 multinational enterprises suggests that online social networks' activity stimulates foreign capital expenditure and new affiliates. In addition, the article explores the relevance of customer capabilities along with sectoral and institutional moderating effects.  相似文献   
109.
我国社会政策经历过一个建构与重构的过程,但排斥性是一以贯之的主基调.随着人类从工业社会逐步迈入后工业社会,基于差异承认与平等实现而形成的二维正义观登场.而现行社会政策既无法体现对差异的尊重,也无法保证平等实现,从而呈现出对正义的偏离.只有建立起包容性社会政策,尊重个体差异,同时保证多元主体享有共同福利的机会和水平,才能实现正义.  相似文献   
110.
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information‐based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号