首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   201篇
  免费   5篇
  国内免费   11篇
管理学   10篇
人口学   1篇
丛书文集   19篇
理论方法论   18篇
综合类   134篇
社会学   25篇
统计学   10篇
  2023年   1篇
  2022年   5篇
  2021年   2篇
  2020年   7篇
  2019年   6篇
  2018年   7篇
  2017年   2篇
  2016年   3篇
  2015年   5篇
  2014年   5篇
  2013年   29篇
  2012年   8篇
  2011年   16篇
  2010年   12篇
  2009年   13篇
  2008年   9篇
  2007年   12篇
  2006年   15篇
  2005年   8篇
  2004年   17篇
  2003年   13篇
  2002年   11篇
  2001年   4篇
  2000年   2篇
  1999年   3篇
  1993年   1篇
  1990年   1篇
排序方式: 共有217条查询结果,搜索用时 421 毫秒
31.
Underdeveloped theory about educational credentialing flies in the face of the immense practice of educational degree attainment by ever increasing proportions of each new generation, and the ensuing pervasive belief in the power of degrees to both allocate individuals in the labor market and to serve as job requirements throughout the occupational structure. Considering educational credentialing at the center of the educational revolution in postindustrial society, a new theoretical argument is developed from the premise that education as an institution provides the logic by which educational credentialing becomes evermore legitimate, more so than from forces outside the institution itself such as the economy and labor market demand. In support of the proposed theory of credentialing, multiple sets of new findings about education, occupations, and work show that the common negative notion of run-away educational credentialism does not fit empirical trends. Second, as a function of widely held beliefs about education in postindustrial society, four institutional processes by which educational credentialing has deeply integrated into the occupational structure are described and illustrated with empirical observations and analyses. Lastly, consequences of the rapid and robust educational transformation of occupational credentialing for future sociological inquiry into social stratification and mobility are discussed.  相似文献   
32.
金融诈骗罪破坏国家金融管理秩序,侵犯财产所有权。其犯罪构成与刑法规定的其他犯罪一样,必须同时具备犯罪客体、客观、主体、主观四个要件。金融诈骗罪的行为人主观上是否必须具备“非法占有目的”以及金融诈骗罪的主观罪过形式是认定此类犯罪必须正确把握的问题。“非法占有目的”是所有金融诈骗罪必备的主观要件,而不是选择要件。金融诈骗罪行为人的主观罪过形式只能是直接故意,不能是过失,也不能是间接故意。  相似文献   
33.
贪污罪的客观方面在我国刑法理论及司法实践中有很多问题都存在着争议。对利用职务上的便利的理解,应当把握公务性、直接性、内容的特定性三个特点。侵吞是指行为人利用职务上的便利,将业已持有的公共财物非法变更为自己或者第三人所有。窃取是指以秘密的方式获取行为人与他人共同管理或者经手的财物。骗取是指采取欺骗手段将处于他人主管、经手的或者是行为人与他人共同主管、经手的公共财物非法占有的行为。  相似文献   
34.
北京市民众关于电信诈骗防御能力研究   总被引:2,自引:0,他引:2  
2009年,北京市民众遭遇电信诈骗的损失高达3.2亿元。本研究的数据来源于"北京市民众对电信诈骗的防御能力评估调查"。通过研究发现:青年人和中年人,随着年龄的增长,防御能力增强,40~49岁达到顶峰;50岁之后年龄越大,防御能力反而越差。人们的防御能力与受教育程度及收入均成正比。防骗知识与信息的欠缺容易给犯罪分子留下可乘之机。建议有关部门下一步的预防工作重点应放在防骗知识的普及方面,以巩固前期取得的良好成果,使得民众在思想上、知识上都具有抵御诈骗行为的"免疫"能力。  相似文献   
35.
恶意串通诉讼行为不仅对司法机关正常活动有严重的危害,而且侵害了他人的财产权益,因而我国刑法应当增设恶意串通诉讼罪.恶意串通诉讼罪应属于妨害司法罪的一个具体犯罪,侵犯的客体具有双重性,既侵犯国家司法机关的正常活动,又侵犯公私财产所有权,但有主次之分;客观方面表现民事诉讼双方当事人暗中勾结,虚构民事法律关系和案件事实,提供虚假证据,在法院面前相互配合进行表演,蒙蔽法院,情节严重的行为;主体为一般主体,包括自然人和单位;主观方面是故意.在刑罚配置上,恶意串通诉讼罪的最低刑不应低于普通诈骗罪,而最高刑不应高于妨害司法的犯罪.  相似文献   
36.
虽然处分行为是区分盗窃与诈骗的关键性要素,但只需认识到财物外形上的占有转移即可,因而“处分意思不要说”相对合理;三角诈骗与盗窃罪间接正犯的根本区别在于,受骗者是否具有处分他人财产的权限和地位,此应以阵营说为基础,结合社会的一般观念进行判断;盗窃罪与诈骗罪不仅可能形成想象竞合,还可能存在法条竞合,同时符合两罪构成要件时,应以盗窃罪定罪处罚;承认二罪之间存在竞合关系,有助于认识错误和共犯问题的处理。  相似文献   
37.
Abstract

The revised Law on the Protection of the Rights and Interests of Consumers (Consumer Protection Law), which sums up nearly twenty years of the evolution of Chinese punitive damages regulations, sets out a model system of punitive damages. These are in essence a special kind of penalty under a dual public-private legal system in which the punitive and deterrent functions of public law are realized through the mechanism of private law. Their application should be guided by the public law principle that the penalty should be proportionate to the offence. The question of whether the penalty is appropriate arises in the application of the two forms of punitive damages prescribed in the Consumer Protection Law—whether used separately or together, or in conjunction with or independently of fines or financial awards. The application of the new punitive damages regulations may overlap with the application of China’s Food Safety Law and Tort Liability Law.  相似文献   
38.
The problem of inaccurate, misapplied or fraudulent scientific data could be addressed by government regulations, or by self‐regulation from within science itself. To many, self‐regulation implies the grounding of research activities in some “neutral”; standard of “ethics”; acceptable in a “pluralistic”; society. Yet, there is no such thing as a “neutral ethics”; and many “contemporary”; theories contain such serious theoretical deficiencies and contradictions that they are practically inapplicable. As a viable alternative to these theoretical and practical problems, an objectively based realistic framework of ethics is considered, and used to ground both the individual scientific and the collective public policy decision making processes. This is an ethics of properly integrated relationships. It is then applied to an analysis of many of the causes of incorrect scientific data, as well as of many of the internal and external pressures and abuses often experienced by scientists today. This approach respects the integrity of each decision maker as a human being and a moral agent—which in turn better insures the integrity of the protocol, the data, and the public policy decisions which follow—and ultimately, the integrity of the scientific enterprise itself. The alternative is government regulations.  相似文献   
39.
Research misconduct is frequently in the media headlines. There is consensus among leading experts on research integrity that the prevalence of misconduct in research is at least 1%, and shoddy work may even go over 5%. Unfortunately, misconduct in research impacts all walks of life from drugs to human subject protections, innovations, economy, policy, and even our national security. The main method of detecting research misconduct depends primarily on whistleblowers. The current regulations are insufficient since dependence on whistleblowers manifests itself as an accidental hit or miss. No other endeavor in our society depends on such a poor system of discovery of misconduct to remedy it. Nearly a quarter of a century ago, I proposed data audit as a means to prevent/contain research misconduct. The audit has to protect the creative process and be non-obtrusive. Data audit evaluates the degree of correspondence of published data with the source data. The proposed data audit does not require any changes in the way researchers carry out their work.  相似文献   
40.
郑海超  侯文华 《管理学报》2011,8(2):233-240
困扰网上创新竞争发展的一个重要因素是发布者作弊问题,它降低了解答者对发布者的信任,网络平台也采取各种方法监督作弊行为。为此,研究2个紧密关联的问题:①影响解答者对发布者信任的因素;②网络平台如何设定合适的监督水平。对问题①,基于信任理论构建研究模型,通过大样本问卷调研检验假设,结果表明:现有的信誉机制作用不显著,而网络平台本身的信誉和解答者满意度对信任有显著影响。实证研究结果凸显了网络平台服务水平的重要性,也是研究问题②的驱动因素。问题②的研究方法是博弈论,通过逆向求解,分析网络平台如何平衡成本和信誉来制定监督水平。最后,给出了主要结论以及未来的研究方向。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号