首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11308篇
  免费   415篇
  国内免费   166篇
管理学   3125篇
劳动科学   2篇
民族学   55篇
人才学   2篇
人口学   268篇
丛书文集   542篇
理论方法论   525篇
综合类   4987篇
社会学   624篇
统计学   1759篇
  2024年   20篇
  2023年   156篇
  2022年   131篇
  2021年   156篇
  2020年   332篇
  2019年   318篇
  2018年   341篇
  2017年   404篇
  2016年   364篇
  2015年   358篇
  2014年   567篇
  2013年   1157篇
  2012年   707篇
  2011年   702篇
  2010年   570篇
  2009年   548篇
  2008年   589篇
  2007年   615篇
  2006年   601篇
  2005年   604篇
  2004年   473篇
  2003年   427篇
  2002年   349篇
  2001年   308篇
  2000年   189篇
  1999年   142篇
  1998年   86篇
  1997年   83篇
  1996年   64篇
  1995年   69篇
  1994年   71篇
  1993年   51篇
  1992年   43篇
  1991年   43篇
  1990年   46篇
  1989年   31篇
  1988年   38篇
  1987年   24篇
  1986年   21篇
  1985年   14篇
  1984年   20篇
  1983年   17篇
  1982年   20篇
  1981年   16篇
  1980年   1篇
  1979年   2篇
  1977年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
241.
《Risk analysis》2018,38(5):1070-1084
Human exposure to bacteria resistant to antimicrobials and transfer of related genes is a complex issue and occurs, among other pathways, via meat consumption. In a context of limited resources, the prioritization of risk management activities is essential. Since the antimicrobial resistance (AMR) situation differs substantially between countries, prioritization should be country specific. The objective of this study was to develop a systematic and transparent framework to rank combinations of bacteria species resistant to selected antimicrobial classes found in meat, based on the risk they represent for public health in Switzerland. A risk assessment model from slaughter to consumption was developed following the Codex Alimentarius guidelines for risk analysis of foodborne AMR. Using data from the Swiss AMR monitoring program, 208 combinations of animal species/bacteria/antimicrobial classes were identified as relevant hazards. Exposure assessment and hazard characterization scores were developed and combined using multicriteria decision analysis. The effect of changing weights of scores was explored with sensitivity analysis. Attributing equal weights to each score, poultry‐associated combinations represented the highest risk. In particular, contamination with extended‐spectrum β‐lactamase/plasmidic AmpC‐producing Escherichia coli in poultry meat ranked high for both exposure and hazard characterization. Tetracycline‐ or macrolide‐resistant Enterococcus spp., as well as fluoroquinolone‐ or macrolide‐resistant Campylobacter jejuni , ranked among combinations with the highest risk. This study provides a basis for prioritizing future activities to mitigate the risk associated with foodborne AMR in Switzerland. A user‐friendly version of the model was provided to risk managers; it can easily be adjusted to the constantly evolving knowledge on AMR.  相似文献   
242.
《Risk analysis》2018,38(1):84-98
The emergence of the complexity characterizing our systems of systems (SoS) requires a reevaluation of the way we model, assess, manage, communicate, and analyze the risk thereto. Current models for risk analysis of emergent complex SoS are insufficient because too often they rely on the same risk functions and models used for single systems. These models commonly fail to incorporate the complexity derived from the networks of interdependencies and interconnectedness (I–I) characterizing SoS. There is a need to reevaluate currently practiced risk analysis to respond to this reality by examining, and thus comprehending, what makes emergent SoS complex. The key to evaluating the risk to SoS lies in understanding the genesis of characterizing I–I of systems manifested through shared states and other essential entities within and among the systems that constitute SoS. The term “essential entities” includes shared decisions, resources, functions, policies, decisionmakers, stakeholders, organizational setups, and others. This undertaking can be accomplished by building on state‐space theory, which is fundamental to systems engineering and process control. This article presents a theoretical and analytical framework for modeling the risk to SoS with two case studies performed with the MITRE Corporation and demonstrates the pivotal contributions made by shared states and other essential entities to modeling and analysis of the risk to complex SoS. A third case study highlights the multifarious representations of SoS, which require harmonizing the risk analysis process currently applied to single systems when applied to complex SoS.  相似文献   
243.
《Risk analysis》2018,38(1):194-209
This article presents the findings from a numerical simulation study that was conducted to evaluate the performance of alternative statistical analysis methods for background screening assessments when data sets are generated with incremental sampling methods (ISMs). A wide range of background and site conditions are represented in order to test different ISM sampling designs. Both hypothesis tests and upper tolerance limit (UTL) screening methods were implemented following U.S. Environmental Protection Agency (USEPA) guidance for specifying error rates. The simulations show that hypothesis testing using two‐sample t ‐tests can meet standard performance criteria under a wide range of conditions, even with relatively small sample sizes. Key factors that affect the performance include unequal population variances and small absolute differences in population means. UTL methods are generally not recommended due to conceptual limitations in the technique when applied to ISM data sets from single decision units and due to insufficient power given standard statistical sample sizes from ISM.  相似文献   
244.
《Risk analysis》2018,38(8):1559-1575
Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game‐theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost‐effective decisions than selfish nonrational or semirational players.  相似文献   
245.
《Risk analysis》2018,38(8):1529-1533
In the field of risk analysis, the normative value systems underlying accepted methodology are rarely explicitly discussed. This perspective provides a critique of the various ethical frameworks that can be used in risk assessments and risk management decisions. The goal is to acknowledge philosophical weaknesses that should be considered and communicated in order to improve the public acceptance of the work of risk analysts.  相似文献   
246.
《Risk analysis》2018,38(8):1634-1655
The work in the article presents the development of an application guide based on feedback and comments stemming from various railway actors on their practices of SIL allocation to railway safety‐related functions. The initial generic methodology for SIL allocation has been updated to be applied to railway rolling stock safety‐related functions in order to solve the SIL concept application issues. Various actors dealing with railway SIL allocation problems are the intended target of the methodology; its principles will be summarized in this article with a focus on modifications and precisions made in order to establish a practical guide for railway safety authorities. The methodology is based on the flowchart formalism used in CSM (common safety method) European regulation. It starts with the use of quantitative safety requirements, particularly tolerable hazard rates (THR). THR apportioning rules are applied. On the one hand, the rules are related to classical logical combinations of safety‐related functions preventing hazard occurrence. On the other hand, to take into account technical conditions (last safety weak link, functional dependencies, technological complexity, etc.), specific rules implicitly used in existing practices are defined for readjusting some THR values. SIL allocation process based on apportioned and validated THR values is finally illustrated through the example of “emergency brake” subsystems. Some specific SIL allocation rules are also defined and illustrated.  相似文献   
247.
《Risk analysis》2018,38(7):1361-1377
Previous research has shown that men and women, on average, have different risk attitudes and may therefore see different value propositions in response to new opportunities. We use data from smallholder farm households in Mali to test whether risk perceptions differ by gender and across domains. We model this potential association across six risks (work injury, extreme weather, community relationships, debt, lack of buyers, and conflict) while controlling for demographic and attitudinal characteristics. Factor analysis highlights extreme weather and conflict as eliciting the most distinct patterns of participant response. Regression analysis for Mali as a whole reveals an association between gender and risk perception, with women expressing more concern except in the extreme weather domain; however, the association with gender is largely absent when models control for geographic region. We also find lower risk perception associated with an individualistic and/or fatalistic worldview, a risk‐tolerant outlook, and optimism about the future, while education, better health, a social orientation, self‐efficacy, and access to information are generally associated with more frequent worry—with some inconsistency. Income, wealth, and time poverty exhibit complex associations with perception of risk. Understanding whether and how men's and women's risk preferences differ, and identifying other dominant predictors such as geographic region and worldview, could help development organizations to shape risk mitigation interventions to increase the likelihood of adoption, and to avoid inadvertently making certain subpopulations worse off by increasing the potential for negative outcomes.  相似文献   
248.
《Risk analysis》2018,38(9):1820-1829
Ethical analysis is often needed in the preparation of policy decisions on risk. A three‐step method is proposed for performing an ethical risk analysis (eRA). In the first step, the people concerned are identified and categorized in terms of the distinct but compatible roles of being risk‐exposed, a beneficiary, or a decisionmaker. In the second step, a more detailed classification of roles and role combinations is performed, and ethically problematic role combinations are identified. In the third step, further ethical deliberation takes place, with an emphasis on individual risk‐benefit weighing, distributional analysis, rights analysis, and power analysis. Ethical issues pertaining to subsidiary risk roles, such as those of experts and journalists, are also treated in this phase. An eRA should supplement, not replace, a traditional risk analysis that puts emphasis on the probabilities and severities of undesirable events but does not cover ethical issues such as agency, interpersonal relationships, and justice.  相似文献   
249.
250.
《Risk analysis》2018,38(10):2193-2207
Social diffusion of information amplifies risk through processes of birth, death, and distortion of message content. Dread risk—involving uncontrollable, fatal, involuntary, and catastrophic outcomes (e.g., terrorist attacks and nuclear accidents)—may be particularly susceptible to amplification because of the psychological biases inherent in dread risk avoidance. To test this, initially balanced information about high or low dread topics was given to a set of individuals who then communicated this information through diffusion chains, each person passing a message to the next. A subset of these chains were also reexposed to the original information. We measured prior knowledge, perceived risk before and after transmission, and, at each link, number of positive and negative statements. Results showed that the more a message was transmitted the more negative statements it contained. This was highest for the high dread topic. Increased perceived risk and production of negative messages was closely related to the amount of negative information that was received, with domain knowledge mitigating this effect. Reexposure to the initial information was ineffectual in reducing bias, demonstrating the enhanced danger of socially transmitted information.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号