首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3064篇
  免费   170篇
  国内免费   50篇
管理学   129篇
劳动科学   1篇
民族学   12篇
人口学   38篇
丛书文集   204篇
理论方法论   43篇
综合类   1870篇
社会学   237篇
统计学   750篇
  2025年   4篇
  2024年   190篇
  2023年   158篇
  2022年   106篇
  2021年   90篇
  2020年   66篇
  2019年   88篇
  2018年   81篇
  2017年   115篇
  2016年   71篇
  2015年   59篇
  2014年   110篇
  2013年   410篇
  2012年   148篇
  2011年   111篇
  2010年   92篇
  2009年   112篇
  2008年   109篇
  2007年   125篇
  2006年   116篇
  2005年   114篇
  2004年   113篇
  2003年   99篇
  2002年   89篇
  2001年   65篇
  2000年   66篇
  1999年   51篇
  1998年   33篇
  1997年   34篇
  1996年   51篇
  1995年   45篇
  1994年   32篇
  1993年   18篇
  1992年   25篇
  1991年   5篇
  1990年   19篇
  1989年   11篇
  1988年   17篇
  1987年   2篇
  1986年   1篇
  1985年   6篇
  1984年   7篇
  1983年   5篇
  1982年   5篇
  1981年   2篇
  1980年   1篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1975年   3篇
排序方式: 共有3284条查询结果,搜索用时 15 毫秒
941.
Since its inception, the Web has been described as a liberating technology permitting individuals with disabilities to surmount barriers that otherwise prevent full societal engagement. Subsequent studies of Web-based communication have instead reported that disabling conditions are reproduced rather than challenged online. This paper uses interviews with 25 para-sport participants to provide an empirical account of how the affordances of the Web are leveraged in disability sport networks. Our findings suggest that individuals with disabilities are using blogs, Facebook, Twitter, and other forms of online communication to find information, engage in advocacy and outreach projects, and form strong networks that extend online and offline. We discuss our findings in light of Putnam’s conceptualization of bridging and bonding social capital, and describe how individuals and groups use weak ties to disseminate information and strong ties to foster a sense of belonging.  相似文献   
942.
This paper examines the temporal and ethical affordances of commercial social media platforms, such as Twitter, as tools for engaging in social research and knowledge exchange. Drawing on activity that took place during the New Frontiers in Qualitative Longitudinal Research seminar series, the article reports on using Twitter and other social media platforms to document, share and archive ‘data’ from a series of research events. It also experiments with new modes of research writing, using fragments of ‘data’ from Twitter to distil research knowledge and ideas, whilst also capturing the pace and form of this live method of social documentation and knowledge exchange. Bringing together conversations within digital sociology about how to ‘do’ time in digital research, with methodological debates among qualitative longitudinal researchers about how to research social and biographical continuity and change, the paper argues that the presentist focus in digital research is far from inevitable. Attending to time in digital media demands that we are alert to questions of authorship, audience and co-production, recognizing the labour of research and the provenance of research knowledge, ‘data’ and ideas.  相似文献   
943.
This article starts from the recognition that digital social movements studies have progressively disregarded collective identity and the importance of internal communicative dynamics in contemporary social movements, in favour of the study of the technological affordances and the organizational capabilities of social media. Based on a two-year multimodal ethnography of the Mexican #YoSoy132 movement, the article demonstrates that the concept of collective identity is still able to yield relevant insights into the study of current movements, especially in connection with the use of social media platforms. Through the appropriations of social media, Mexican students were able to oppose the negative identification fabricated by the PRI party, reclaim their agency and their role as heirs of a long tradition of rebellion, generate collective identification processes, and find ‘comfort zones’ to lower the costs of activism, reinforcing their internal cohesion and solidarity. The article stresses the importance of the internal communicative dynamics that develop in the backstage of social media (Facebook chats and groups) and through instant messaging services (WhatsApp), thus rediscovering the pivotal linkage between collective identity and internal communication that characterized the first wave of research on digital social movements. The findings point out how that internal cohesion and collective identity are fundamentally shaped and reinforced in the social media backstage by practices of ‘ludic activism’, which indicates that social media represent not only the organizational backbone of contemporary social movements, but also multifaceted ecologies where a new, expressive and humorous ‘communicative resistance grammar’ emerges.  相似文献   
944.
Quick response (QR) codes on gravestones are a relatively new global phenomenon, and the actual number of them is unknown. The placement of a digital gateway on a physical stone is a new form of mediated middle region and a challenge to the classic public–private dichotomy, and this study discusses in detail the implications of the QR-coded gravestones. While some cemetery visitors might consider the gravestone and the digital content private, the visible QR code is also an invitation to the broader public in the shared physical space. Building on privacy as a contextualized matter, the business interests of gravestone makers as well as 30 Danish memorials are analyzed. In a general shift toward the digital in contemporary memorial culture and a growing tendency to online sharing of the emotionally important, QR codes on gravestones are but one example of the ongoing negotiations of privacy and sharing in our digital society.  相似文献   
945.
Drawing from interviews and focus groups with teens in a low-income and ethnically diverse high school in central Texas, this paper explores the unique social privacy challenges and strategies of low-income and non-dominant youth. Situating the research in a broader context in which non-dominant teens are increasingly surveilled, I demonstrate how teens manage social privacy in at least three ways. First, they negotiate liminal boundaries of what constitutes a communal or shareable mobile device, which are structured around financial constraints. Second, through nonuse, they actively resist the ways mobile and social media reconfigure social and physical spaces. Third, they deliberately use multiple platforms as a way to cope with evolving privacy settings, social norms, and technological affordances; this is a deliberate strategy intended to resist social convergence. Because low-income and non-dominant youth are increasingly surveilled by adults, peers, and institutions, it is imperative that they find spaces that afford greater freedom of expression, interest-based communities, and privacy.  相似文献   
946.
A cluster methodology, motivated by a robust similarity matrix is proposed for identifying likely multivariate outlier structure and to estimate weighted least-square (WLS) regression parameters in linear models. The proposed method is an agglomeration of procedures that begins from clustering the n-observations through a test of ‘no-outlier hypothesis’ (TONH) to a weighted least-square regression estimation. The cluster phase partition the n-observations into h-set called main cluster and a minor cluster of size n?h. A robust distance emerge from the main cluster upon which a test of no outlier hypothesis’ is conducted. An initial WLS regression estimation is computed from the robust distance obtained from the main cluster. Until convergence, a re-weighted least-squares (RLS) regression estimate is updated with weights based on the normalized residuals. The proposed procedure blends an agglomerative hierarchical cluster analysis of a complete linkage through the TONH to the Re-weighted regression estimation phase. Hence, we propose to call it cluster-based re-weighted regression (CBRR). The CBRR is compared with three existing procedures using two data sets known to exhibit masking and swamping. The performance of CBRR is further examined through simulation experiment. The results obtained from the data set illustration and the Monte Carlo study shows that the CBRR is effective in detecting multivariate outliers where other methods are susceptible to it. The CBRR does not require enormous computation and is substantially not susceptible to masking and swamping.  相似文献   
947.
948.
文章从电信通信为农牧区提供信息接入手段这一视角出发,分析西藏农牧区发展电信、消除数字鸿沟的实践,探究农牧区数字鸿沟的表现及成因,认为发展电信通信是缩小西藏农牧区数字鸿沟的基础工程,政府主管部门应制定针对数字鸿沟的农牧区电信发展经济、技术政策,遵循普遍服务原则,沿着基础设施建设和基础信息提供两条主线,保证为农牧民提供最低数量和基本质量的信息服务。  相似文献   
949.
Abstract

Twitter is becoming a discursive but also contested space for articulations of feminist protest. A hashtag that collected experiences with everyday sexism in the German-speaking world was #aufschrei, which became the 2013 hashtag of the year. In exploring the role of online feminist protest in the construction of alternative meanings, this paper draws on theories of the public sphere. Specifically, we build upon a communication studies model that refers to mutually permeating spheres of discourse in three layers, the simple, intermediate, and complex, each of which exhibits its own communication forms and forums. The methodology includes both a quantitative and a qualitative content analysis of #aufschrei tweets and of feminist blogs in order to comprehend argumentation patterns and networking practices. We argue that Twitter adopts the function of a simple public, where values and norms are negotiated at an everyday level. Feminist blogs create an intermediate public, in that they generalize experiences and are oriented towards networking. However, the persistent number of anti-feminist and sexist messages on Twitter likewise shows that online debates on gender topics have been increasingly infiltrated by these positions. Against this backdrop, in the conclusion, we discuss the feminist activist potential of #aufschrei.  相似文献   
950.
根据矩阵特征值分布范围,讨论了连续时间Hopfield神经网络模型的渐近稳定性,给出了目前最优的结果,这对于实际网络设计有重要的指导作用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号