全文获取类型
收费全文 | 1707篇 |
免费 | 40篇 |
国内免费 | 11篇 |
专业分类
管理学 | 284篇 |
民族学 | 5篇 |
人才学 | 2篇 |
人口学 | 21篇 |
丛书文集 | 138篇 |
理论方法论 | 55篇 |
综合类 | 820篇 |
社会学 | 351篇 |
统计学 | 82篇 |
出版年
2024年 | 1篇 |
2023年 | 13篇 |
2022年 | 16篇 |
2021年 | 58篇 |
2020年 | 45篇 |
2019年 | 32篇 |
2018年 | 26篇 |
2017年 | 45篇 |
2016年 | 42篇 |
2015年 | 51篇 |
2014年 | 89篇 |
2013年 | 151篇 |
2012年 | 121篇 |
2011年 | 127篇 |
2010年 | 98篇 |
2009年 | 94篇 |
2008年 | 92篇 |
2007年 | 83篇 |
2006年 | 98篇 |
2005年 | 57篇 |
2004年 | 71篇 |
2003年 | 90篇 |
2002年 | 70篇 |
2001年 | 72篇 |
2000年 | 34篇 |
1999年 | 25篇 |
1998年 | 7篇 |
1997年 | 7篇 |
1996年 | 8篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1988年 | 2篇 |
1987年 | 4篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1981年 | 2篇 |
1980年 | 3篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有1758条查询结果,搜索用时 15 毫秒
991.
《Omega》2016
We present in this paper a general network DEA approach to deal with efficiency assessments in multi-stage processes. Our approach complies with the composition paradigm, where the efficiencies of the stages are estimated first and the overall efficiency of the system is obtained ex post. We use multi-objective programming as modeling framework. This provides us the means to assess unique and unbiased efficiency scores and, if required, to drive the efficiency assessments effectively in line with specific priorities given to the stages. A direct comparison with the multiplicative decomposition approach on data drawn from the literature brings into light the advantages of our method and some critical points that one should be concerned about when using the multiplicative efficiency decomposition. 相似文献
992.
焦美玲 《上海理工大学学报(社会科学版)》2001,23(3):71-73
本文主要介绍了多功能与多媒体教室建设的具体实施及运用的具体情况,同时说明了远程教育中异地实时教育的实现,体现了教育技术在高等教育中的作用. 相似文献
993.
随着社会和经济的飞速发展 ,人们的收入和生活水平大幅度提高。现今我国人口平均寿命由 1 963年 61 .7岁、1 981年 67.9岁到 1 991年 70岁。但知识分子阶层平均寿命增长幅度低于平均值 ,英年早逝及患病比例增大的现象日益突出。通过对我院全体教职工的健康状况和健身活动进行调查 ,结果发现有 64 .9%人患有 73种不同疾病 ,死亡原因中癌症死亡率过高 ,健身活动过少。一方面降低了教职工的生活质量 ,同时又严重的影响教学和其它工作 ,还需要国家和家庭大量医疗费用的支出。通过分析其中的原因 ,使我们找出了相应的对策。 相似文献
994.
决定企业边界演进的因素主要有两个:技术和制度,不同的理论流派往往只是偏重论述其中的一个方面,而使得分析失于全面,所以也无法解释企业边界的长期变动趋势.本文通过"技术"和"行为"两种分类标准对技术、制度和不确定性进行分类,进而将技术和制度纳入到不确定性的不同类别中,从而得到一个综合的分析框架. 相似文献
995.
Faye Mishna Mona Khoury-KassabriTahany Gadalla Joanne Daciuk 《Children and youth services review》2012,34(1):63-70
Objectives
The purpose of the current study was to examine the frequency of cyber bullying among youth by distinguishing among the three categories of involvement in cyber bullying: victims, bullies, and bully-victims, to compare these to a fourth category of students who are not involved in the three categories of cyber bullying and to explore the factors that contribute to involvement in cyber bullying.Method
This study utilized a large and diverse sample of 2186 middle and high school students, who completed self report questionnaires during class time. We performed a Multinomial Logistic Regression to examine the relationship between the cyber bullying categories and our independent variables (gender, age, technology use, parental involvement and safety).Results
Over 30% of the students in this study identified as involved in cyber bullying, as victims or perpetrators, and one in four of the students (25.7%) reported having been involved in cyber bullying as both bully and victim during the previous three months. Students who were involved in cyber bullying were more likely than others to report perpetration of violence toward peers, to use computers for more hours a day, and to give their password to friends. Other risk factors, such as gender, age and safety, were found to be specific only for one category of cyber bullying.Conclusion
The findings revealed that students are highly involved in cyber bullying. Several unique characteristics emerged regarding the frequency and risk factors of students' involvement in cyber bullying. In traditional bullying the category of bully-victims represents the smallest and most vulnerable group of children, whereas in the current study the bully-victims category emerged as common. In addition, females were more likely than males to be bully-victims, in contrast to research on traditional bullying, in which more males than females are typically involved as bully-victims. In addition, several risk factors were common among the three groups of children, including the amount of hours per day students use the computer, and giving passwords to a friend. These results point to the need for further examination and to focus on the risk factors for students' cyber bullying involvement in each of the three categories. 相似文献996.
What is the effect of (1) popular individuals, and (2) community structures on the retransmission of socially contagious behavior? We examine a community of Twitter users over a five month period, operationalizing social contagion as ‘retweeting’, and social structure as the count of subgraphs (small patterns of ties and nodes) between users in the follower/following network. 相似文献
997.
This paper introduces and tests a novel methodology for measuring networks. Rather than collecting data to observe a network or several networks in full, which is typically costly or impossible, we randomly sample a portion of individuals in the network and estimate the network based on the sampled individuals’ perceptions on all possible ties. We find the methodology produces accurate estimates of social structure and network level indices in five different datasets. In order to illustrate the performance of our approach we compare its results with the traditional roster and ego network methods of data collection. Across all five datasets, our methodology outperforms these standard social network data collection methods. We offer ideas on applications of our methodology, and find it especially promising in cross-network settings. 相似文献
998.
The technology acceptance model was created to measure the public's attitudes toward and acceptance of new technologies. Text messaging has been used in the public relations domain for crisis communication alerts, but there have been few attempts to use it in other domains. Through an electronic survey of previous American Red Cross donors, donors to the “Text for Haiti” campaign had more favorable attitudes than those who did not donate via text messaging. However, the survey participants did not completely reflect the technology acceptance model. Although they perceived that text message campaigns were easy to participate in, the path analysis revealed that these thoughts resulted in less desirable attitudes toward participating in the campaigns. 相似文献
999.
随着社会变迁的加速、社会转型的加剧以及信息技术的日新月异,我国高校的内外部生态环境发生了巨大变化,高校网络群体性事件时有发生,且有增多增强的趋势,其社会关注程度高,传播扩散快,且容易向社会波及,不仅影响高校的正常教学、科研秩序,而且还会影响社会稳定。要充分认识当前工作形势,加强高校网络群体性事件管理,增强对新媒体、群体性事件管理工作重要性的认识,积极地、妥善地做好网络群体性事件的预防与应对处置工作,在工作体制机制、舆情分析研判、网络文化建设等相关研究方面取得更多实质性进展。 相似文献
1000.
Institutions of higher education have embraced online formats as a new form of teaching in order to reach more students. Like other disciplines, social work pedagogy has embraced the use of online technology in higher education. As a professional and ethical responsibility, it is imperative that social work online courses are of high quality and that they meet the stated objectives. The study presented here describes students' perceptions and experiences in online and in-classroom sections in the Theories and Practice with Communities and Agencies course at a large public university in Southeastern USA. A survey was administered to the students at the end of the semester. Qualitative themes show that method of instruction as it related to course content, comfort with the level of instruction, and role of instructor in online courses affected students' perceptions of both the course and method of instruction. Discussions are directed toward improving online instruction in social work education. 相似文献