全文获取类型
收费全文 | 7319篇 |
免费 | 260篇 |
国内免费 | 102篇 |
专业分类
管理学 | 215篇 |
劳动科学 | 1篇 |
民族学 | 52篇 |
人才学 | 2篇 |
人口学 | 226篇 |
丛书文集 | 932篇 |
理论方法论 | 458篇 |
综合类 | 5401篇 |
社会学 | 239篇 |
统计学 | 155篇 |
出版年
2024年 | 18篇 |
2023年 | 64篇 |
2022年 | 64篇 |
2021年 | 72篇 |
2020年 | 98篇 |
2019年 | 84篇 |
2018年 | 85篇 |
2017年 | 110篇 |
2016年 | 163篇 |
2015年 | 176篇 |
2014年 | 353篇 |
2013年 | 343篇 |
2012年 | 432篇 |
2011年 | 523篇 |
2010年 | 416篇 |
2009年 | 466篇 |
2008年 | 469篇 |
2007年 | 591篇 |
2006年 | 681篇 |
2005年 | 538篇 |
2004年 | 516篇 |
2003年 | 443篇 |
2002年 | 351篇 |
2001年 | 267篇 |
2000年 | 184篇 |
1999年 | 48篇 |
1998年 | 20篇 |
1997年 | 21篇 |
1996年 | 19篇 |
1995年 | 15篇 |
1994年 | 7篇 |
1993年 | 8篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 7篇 |
1988年 | 5篇 |
1987年 | 1篇 |
1984年 | 2篇 |
1981年 | 1篇 |
1980年 | 2篇 |
1976年 | 1篇 |
排序方式: 共有7681条查询结果,搜索用时 15 毫秒
111.
分析了80后农民工在城市的就业特征,主要从四方面提出了对策建议:建立健全80后农民工就业的社会保障机制;改革创新80后农民工就业培训模式;为农民工塑造良好的工作环境;构建农民工双向流迁就业体系。 相似文献
112.
Evan Renfro 《Cultural Studies》2017,31(4):523-542
How does the US recruit its citizen spies used to maintain and proliferate coercive power? I use an interdisciplinary approach and a framework of affect theory to argue that there is an ‘affective security curriculum’ (ASC) that assists in explaining the tendencies towards jingoism used in the recruitment and indoctrination of students – as future security workers – in certain academic disciplines. The ASC is precisely the phenomenon that works to construct this expert class and is produced by order words, the most crucial of which is ‘terrorism’, as well as larger cultural norms linked to neoliberalism that have achieved near total dominance since the 1980s. The ASC works by intensifying the (in)ability to act for those in its domain. The necessity of linguistically proficient security workers to the US’ hegemonic project makes this a question of considerable political importance. The ASC is a different approach to answering questions of how US hegemony is maintained. Whereas positivist research agendas, such as content analysis, and postpositivist approaches, such as critical discourse analysis, certainly have their uses (and to which my notion of ASC is indebted), paradigms such as these fail to focus on the engendering processes at work vis-à-vis the expert class, without which the discursive frames such methodologies analyse would simply dissipate. My overarching purpose in this paper is to develop the concept of the ASC, its quiddity, and to present at least an incipient methodology for analysing its critical duties. As my primary intent is to introduce and conceptualize the theoretical framework of the affective security curriculum, the applied segment of this endeavour will be relatively brief – and is designed as a primer for further research. 相似文献
113.
Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed. 相似文献
114.
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information‐based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. 相似文献
115.
In late 2009 China launched an innovative, voluntary programme that by 2011 had extended pension coverage to 326.4 million people in the rural sector, including contributors and beneficiaries. It requires one contribution per year and provides a flat‐rate benefit and a contributions‐related benefit through a contributory individual account, with a government guarantee that the benefit will continue for life. The programme encourages participation of persons who do not pay income taxes, and thus have no tax incentive to participate, by providing substantial government subsidies. As a further incentive, old‐age benefits are provided to older parents when all their adult children participate in the contributory programme. 相似文献
116.
117.
联盟信任与联盟困境之间存在密切关系。在双边不对称联盟中,联盟困境的"抛弃"与"牵连"对联盟信任的作用更为强烈,进而成为推动联盟转型的重要变量。在美韩联盟发展过程中,其联盟信任不断变迁。联盟初期,由战火锤炼铸就的美韩双向情绪性信任,中经"尼克松冲击"转变为情绪性—工具性信任,后冷战时代历经双方的战略调整与实力变迁影响,转为双向工具性信任。受联盟信任变迁的影响,美韩联盟也实现了由军事联盟向战略性联盟的转变,这是联盟信任下降与共有利益拓展的共同结果。 相似文献
118.
曹永俐 《重庆文理学院学报》2012,31(4):107-110
近年来,英语首字母缩略词在汉语中的广泛应用引发了部分学者对汉语言纯洁性的担忧。文章在结合相关翻译学理论、语言经济原则和语言社会属性等问题探讨的基础之上,认为英语字母缩略词的流行符合时代发展的需要,有助于保持汉语的活力,并且无碍于汉语的纯洁性。 相似文献
119.
校园网以云计算为核心架构,可以实现基础设施与实际应用的分离,解决校园网面临的资源共享、设备更新、管理统一等问题,促进教师的教学和科研工作,丰富学生的学习和生活,并为资源的存储和安全提供的保障。 相似文献
120.
The complex ways in which food security actions lead to nutrition and other health outcomes make it important to clarify what programs work and how, with theory-driven evaluation emerging as a promising approach to evaluate complex programs. However, it is unclear how and why theory-driven evaluation is applied in food security contexts. Our objective is to examine the development and use of Theory of Change and Realist Evaluation to support food security programs globally. Using a systematic search and screening process, we included studies that described a food security program, used a Theory of Change or Realist Evaluation, and presented original research or evaluations. We found a total of 59 relevant Theory of Change studies and eight Realist Evaluation studies. Based on our analysis, Theories of Change arose in response to three main problems: 1) the need to evaluate under complexity; 2) challenges with evaluation; and, 3) information gaps surrounding a program. In contrast, Realist Evaluation was reported to be developed primarily to understand a program’s outcomes. Reflecting on the problem to be addressed in the evaluation would help improve understandings of the evaluation context, which would then inform the choice and design of an evaluation approach. 相似文献