首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1221篇
  免费   28篇
  国内免费   45篇
管理学   81篇
民族学   2篇
人口学   1篇
丛书文集   114篇
理论方法论   18篇
综合类   948篇
社会学   70篇
统计学   60篇
  2024年   2篇
  2023年   4篇
  2022年   6篇
  2021年   7篇
  2020年   21篇
  2019年   12篇
  2018年   24篇
  2017年   26篇
  2016年   34篇
  2015年   29篇
  2014年   61篇
  2013年   93篇
  2012年   53篇
  2011年   68篇
  2010年   46篇
  2009年   63篇
  2008年   72篇
  2007年   69篇
  2006年   81篇
  2005年   95篇
  2004年   75篇
  2003年   94篇
  2002年   86篇
  2001年   59篇
  2000年   37篇
  1999年   11篇
  1998年   6篇
  1997年   13篇
  1996年   12篇
  1995年   13篇
  1994年   5篇
  1993年   5篇
  1992年   3篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   3篇
  1987年   1篇
排序方式: 共有1294条查询结果,搜索用时 15 毫秒
81.
通过对电子病历质量管理存在的问题进行探讨,并对改进管理提出编程控制复制功能、网上实时监控、加强法律知识和职业道德教育、严格手工签名、严格奖惩措施等。  相似文献   
82.
电子商务立法的国际比较及对我国的启示   总被引:1,自引:0,他引:1  
电子商务的迅速发展实质性地改变了传统市场交易的形式。而作为法律调整和规范的主要对象之一,交易形式的变化要求有新的法律规定与之相适应。在国际上,关于电子商务的立法活动已经形成了一种浪潮。而我国的电子商务立法工作却一直进展缓慢。其中有认识上的问题,更主要的是立法经验的不足。借鉴有关国家电子商务立法的先进经验,我国应当尽快建立和完善电子商务法制,这其中包括应当建立关于电子签名、电子商务认证、电子合同、电子支付等方面的法律规则与制度。  相似文献   
83.
基于RSA的电子商务信息加密技术研究   总被引:1,自引:0,他引:1  
21世纪是网络信息时代,电子商务的迅猛发展和普及打破了人们传统的经营和消费理念,网上消费已成为一种新的消费形式,但随之而来的便是电子商务赖以生存和发展的安全问题。文章主要通过对电子商务安全隐患的分析,论证了数据加密技术在电子商务安全中的作用,重点探讨了RSA公钥加密算法,并通过实例对其加密原理、计算复杂性等安全性问题作了详尽的分析和阐述。  相似文献   
84.
网络环境下 ,高校图书馆的信息服务模式发生了新的变化 ,电子阅览室的作用日益突显。因此 ,图书馆的建设应重视对电子阅览室的认识 ,加强电子览阅室的信息服务 ,以推动图书馆事业的发展  相似文献   
85.
针对目前电子商务专业教学中师资队伍、教学方向定位,教学实践及教材这几个问题进行了分析和探讨,并提出了相应的一些建议,以期能有助于电子商务专业教学质量的改善或提高.  相似文献   
86.
Abstract

In her presentation entitled “No Mind Reading Necessary: Conducting Evidence-Based Electronic Resource Marketing and Outreach” at the North Carolina Serials Conference April 2019, Kate Hill discussed marketing research strategies and outreach tools used to increase online users’ access to electronic resources and primary resources. In an effort to connect users to seldom-used resources, Jackson Library collaborated with university partners to develop surveys to identify the information-seeking behavior of its users and apply the gathered marketing research to strategically plan outreach activities.  相似文献   
87.
介绍了普通分立元件式荧光灯交流电子镇流器的结构,指出它普遍存在的问题,并提出改进方法。  相似文献   
88.
Harm-minimization strategies reduce the experience of gambling-related harms for individuals and those close to them. Most policies and particularly discussions of tool design and implementation fail to involve end users and consider their concerns and needs. This study aimed to investigate the best way to introduce a harm-minimization tool for electronic gaming machines (EGMs) that will maximize the perceived value and subsequent uptake by the intended audience of gamblers. Focus groups were conducted with 31 Australian regular EGM gamblers experiencing a range of gambling problems. Participants were asked their perspectives of a pre-commitment system (features including accessing activity statements, setting limits, viewing dynamic messages, taking breaks), including concerns, and how to enhance perceived value and usefulness. Positive attitudes about the system were expressed; however, many gamblers saw the tool as relevant only for problem gamblers. Participants indicated that value could be enhanced by making the system flexible and customizable, but still easy to use. Design and implementation strategies such as incorporating flexibility in features, ease of use, appropriate terminology, and educational efforts may address gamblers’ concerns, particularly regarding privacy and potential stigma. This would enhance user perception of harm-minimization tools as relevant and may subsequently enhance effectiveness.  相似文献   
89.
ABSTRACT

In 2013, after nearly two decades of operating in a distributed legacy Integrated Library System (ILS) environment on local servers, the Orbis Cascade Alliance, a consortium of public and private academic libraries in Washington, Oregon, and Idaho, began a two-year-long process to migrate its 37 members to a shared implementation of Ex Libris's cloud-based Alma library management system (LMS) and Primo discovery interface. Although much has been written on electronic resource management (ERM) functionality at an institution level, little has been written on serials and ERM functionality and workflows within a shared consortial environment. This article discusses the challenges and opportunities of implementing a consortial-based LMS, with particular emphasis on serials and ERM functionality. Key migration issues related to serials control, acquisitions, licensing, administration, cataloging, statistics, and interoperability are examined at the institutional and large-scale networked levels. Benefits and limitations of using a shared consortial cloud-based LMS are explored, and the overall capabilities of the Alma LMS for electronic resource management are reviewed.  相似文献   
90.
Name-altering practices are common in many creative fields—pen names in literature, stage names in the performing arts, and aliases in music. More than just reflecting artistic habits or responding to the need for distinctive brands, these practices can also serve as test devices to probe, validate, and guide the artists’ active participation in a cultural movement. At the same time, they constitute a powerful probe to negotiate the boundaries of a subculture, especially when its features are threatened by appropriation from the mass-oriented culture. Drawing evidence from electronic music, a field where name-altering practices proliferate, we outline dynamics of pseudonymity, polyonymy, and anonymity that surround the use of aliases. We argue that name-altering practices are both a tool that artists use to probe the creative environment and a device to recursively put one’s creative participation to the test. In the context of creative subcultures, name-altering practices constitute a subtle but effective form of underground testing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号