首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4012篇
  免费   196篇
  国内免费   59篇
管理学   139篇
劳动科学   1篇
民族学   38篇
人口学   220篇
丛书文集   473篇
理论方法论   363篇
综合类   2770篇
社会学   237篇
统计学   26篇
  2025年   1篇
  2024年   40篇
  2023年   53篇
  2022年   44篇
  2021年   59篇
  2020年   74篇
  2019年   64篇
  2018年   63篇
  2017年   77篇
  2016年   127篇
  2015年   120篇
  2014年   226篇
  2013年   233篇
  2012年   274篇
  2011年   324篇
  2010年   251篇
  2009年   290篇
  2008年   261篇
  2007年   305篇
  2006年   347篇
  2005年   275篇
  2004年   225篇
  2003年   183篇
  2002年   131篇
  2001年   105篇
  2000年   62篇
  1999年   19篇
  1998年   9篇
  1997年   5篇
  1996年   8篇
  1995年   5篇
  1994年   1篇
  1992年   3篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
排序方式: 共有4267条查询结果,搜索用时 0 毫秒
21.
The purpose of this article is to analyse the economic and social implications of the privatisation of social security in Chile and to draw some lessons from the Chilean experience. The focus of the analysis is on the costs and benefits of the privatised system and its impact on social equity. Thus, the main section of the article is devoted to the analysis of the 20-year-old Chilean experience. This section is followed by a discussion of privatisation in other Latin American countries and the impact that World Bank's policies have had on the region. The last section looks at the lessons for the United States and argues against the establishment of a partially private plan in the USA.  相似文献   
22.
加入世贸以后,我国参与国际商贸竞争将日趋激烈,而知识产权保护对科技创新、社会进步以及提高企业、国家的竞争力有着不可替代的作用。但是我国知识产权边境保护也存在一些问题,所以中国海关应在边境线上为知识产权筑起一道更加坚固的保护屏障,使侵权产品无法逾越。  相似文献   
23.
近年来,环境问题日益恶化,成为影响国家安全和人类社会可持续发展的重大问题,因而环境安全上升为国际政治领域的焦点问题。作为国际政治的新领域,学者们对环境安全的由来、性质、概念、特点及其国际政治效应的认识方面还存在诸多差异,辩明这种差异对于深刻把握环境安全对国际政治的影响具有重要意义。  相似文献   
24.
针对网络系统不同的脆弱性,通过建模分析了网络暴露程度、黑客攻击概率、黑客入侵概率、安全投资效率等因素对企业的网络安全投资策略的影响,研究了一定预算约束下的企业网络安全投资策略。研究表明:在企业网络系统防御随机攻击能力较强,防御定向攻击能力较弱的情况下,当安全投资总额非常大的时候,对随机攻击类型的投资分配应随着安全投资总额的增大而增大,对定向攻击类型的投资分配应随着安全投资总额的增大而减小;当安全投资总额非常小时,投资分配情况视网络暴露程度的大小而定。  相似文献   
25.
A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information‐based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions.  相似文献   
26.
The presence of strategic attackers has become an important factor in the security and protection of systems, especially since the 9/11/2001 attacks, and considerable efforts have been dedicated to its study. When defending against the strategic attacker, many existing studies assume that the attacker would seek to minimize the defender's utility, which implies that the defender and attacker have symmetric utilities. However, the attacker's objective is determined by its own valuation of the system and target of the attack, which is not necessarily consistent with the defender's utility. If the attacker unexpectedly targets a different utility, then the defense strategy might no longer be optimal. In particular, the defense strategy could be inferior if the attacker's utility is not known to the defender. This study considers a situation where the defender's utility is the system survivability and the attacker's utility is the expected number of destroyed elements in the system. We investigate possible attack strategies under these two different utilities and compare (a) the conservative defense strategy when the attack utility is unknown to the defender with (b) the optimal defense strategy when the attack utility is known to the defender. We show that the conservative protection strategy is still optimal under asymmetric utilities when the contest intensity is smaller than one.  相似文献   
27.
We study interdependent risks in security, and shed light on the economic and policy implications of increasing security interdependence in presence of reactive attackers. We investigate the impact of potential public policy arrangements on the security of a group of interdependent organizations, namely, airports. Focusing on security expenditures and costs to society, as assessed by a social planner, to individual airports and to attackers, we first develop a game-theoretic framework, and derive explicit Nash equilibrium and socially optimal solutions in the airports network. We then conduct numerical experiments mirroring real-world cyber scenarios, to assess how a change in interdependence impact the airports' security expenditures, the overall expected costs to society, and the fairness of security financing. Our study provides insights on the economic and policy implications for the United States, Europe, and Asia.  相似文献   
28.
本文从城市低保人口医疗卫生需求被排斥与地位边缘化的产生原因入手,分析了“因贫致病”与“因病致贫”的危害,并结合国家目前正在探索的关于建立城市医疗救助制度试点工作的意见,提出了要培养城市低保人口医疗救助的中间力量,推进救助的多元化和社会化,关键是要使其拥有的健康权有稳定和明确的法律保证。处理好物质、能力、权利三者之间的关系,强调建立和完善后的城市医疗救助制度应该是一种人性化的制度。  相似文献   
29.
The purpose of this study is to examine attitudes regarding who should be included in wills following divorce and remarriage. Respondents were 268 men and 439 women. In mailed vignettes, they indicated whom they thought should be included in an elder's will. Three variables were examined: (a) family closeness, (b) contact after divorce, and (c) remarriage. Three factors were associated with inheritance obligations: (a) genetic ties, (b) patriarchal lineage, and (c) family ties, which were defined more broadly than genetic relationships. Few respondents mentioned factors such as family closeness and reciprocity. There was little agreement regarding who is and who is not in the family, but inheritance clearly was limited to family. Obligation to include the next of kin in the will supersedes obligations based upon closeness and frequency of contact.  相似文献   
30.
近年来随着无线网络的快速发展,无线网络替代传统有线网络的趋势日益明显。与此同时,无线网络的安全机制也需要得到同步完善,从而进一步实现人们安全通信的要求。论述了计算机无线网络安全所面临的主要问题,提出了解决这些无线网络安全问题的措施。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号