首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4228篇
  免费   945篇
  国内免费   9篇
管理学   1159篇
民族学   9篇
人才学   1篇
人口学   81篇
丛书文集   30篇
理论方法论   834篇
综合类   316篇
社会学   1657篇
统计学   1095篇
  2024年   4篇
  2023年   4篇
  2022年   10篇
  2021年   105篇
  2020年   181篇
  2019年   342篇
  2018年   218篇
  2017年   368篇
  2016年   365篇
  2015年   353篇
  2014年   389篇
  2013年   595篇
  2012年   382篇
  2011年   288篇
  2010年   287篇
  2009年   169篇
  2008年   216篇
  2007年   130篇
  2006年   121篇
  2005年   112篇
  2004年   121篇
  2003年   91篇
  2002年   97篇
  2001年   105篇
  2000年   78篇
  1999年   14篇
  1998年   7篇
  1997年   7篇
  1995年   4篇
  1994年   3篇
  1993年   3篇
  1992年   4篇
  1991年   3篇
  1990年   1篇
  1989年   1篇
  1987年   1篇
  1984年   1篇
  1981年   1篇
  1979年   1篇
排序方式: 共有5182条查询结果,搜索用时 31 毫秒
721.
After observing ostracism or social exclusion, older children, adolescents and adults report decreased satisfaction of the need for control. Attempting to regain control can motivate aggression in ostracized adults. Research has shown that the onset of ostracism’s harmful effects on children’s behavior is at preschool age. We investigated whether preschoolers would exert more control after witnessing ostracism. A sample of 53 children (Mage = 5 years, 5 months) first watched priming videos either showing ostracism or not. Subsequently, they participated in two ball games. In both of the games (order counterbalanced), children could control the flow of a ball’s motion, either live between two people (i.e., social control) or between two bars on a laptop screen (i.e., non‐social control). Overall, children understood social exclusion when it was displayed in the videos. We found an effect of observed ostracism only on social control. Four‐ to five‐year‐old boys who witnessed ostracism stopped a ball game between two persons longer than boys who did not witness ostracism. Our results suggest that observing social exclusion elevates young boys’ need for control over a social situation. Girls showed a different pattern but their responses did not differ significantly between ostracism and non‐ostracism conditions.  相似文献   
722.
In this article, a classification model based on the majority rule sorting (MR‐Sort) method is employed to evaluate the vulnerability of safety‐critical systems with respect to malevolent intentional acts. The model is built on the basis of a (limited‐size) set of data representing (a priori known) vulnerability classification examples. The empirical construction of the classification model introduces a source of uncertainty into the vulnerability analysis process: a quantitative assessment of the performance of the classification model (in terms of accuracy and confidence in the assignments) is thus in order. Three different app oaches are here considered to this aim: (i) a model–retrieval‐based approach, (ii) the bootstrap method, and (iii) the leave‐one‐out cross‐validation technique. The analyses are presented with reference to an exemplificative case study involving the vulnerability assessment of nuclear power plants.  相似文献   
723.
Since its legal inception in 1926, adoption work has been centrally concerned with the matter of the adopted child's ‘first’ or prior life, whilst also focussed on achieving a new and secure substitute family for that child. Adoptive kinship has been formed through this dual and contradictory concern, a concern that has produced diverse policies and practices over the last 90 years. Drawing on Foucault's concept of technologies of the subject, this paper is an exploration of adoptive kinship within the new context of open adoption, a set of practices that more actively promotes the involvements of the adopted child's former family. These practices both promote a radical reworking of adoptive kinship, as well as confirming its more orthodox moorings. Drawing on an adoption archive study, the paper concludes with an analysis of letterbox contact to explore how far this form of open practice transforms adoptive kinship in the contemporary era.  相似文献   
724.
Research concerning outcomes for children who have been placed in out‐of‐home care has indicated that the care may have unwanted consequences. However, there has been no coherent terminology for differentiating between different types of such unwanted consequences. In this article therefore, we attempt to disentangle different aspects of potentially harmful care for looked after children, as well as to discuss potential pathways to more systematically approach and report adverse events for this group. In this endeavour, we turn to two adjacent disciplines, medicine and psychology, where these issues have received more interest. The applicability of the concepts used in these fields is discussed, and it is concluded that although they provide some help in categorizing different aspects of harmful care, the complexity of out‐of‐home care makes existing models difficult to adopt without adjustments. This has consequences for the possibility of evaluating care in research, as well as for monitoring adverse events in practice. Importantly, the causality will often be unknown. We therefore suggest that it is essential to shed more light on how decisions should be made about when to intervene or not in out‐of‐home care, despite limited information.  相似文献   
725.
In any crisis, there is a great deal of uncertainty, often geographical uncertainty or, more precisely, spatiotemporal uncertainty. Examples include the spread of contamination from an industrial accident, drifting volcanic ash, and the path of a hurricane. Estimating spatiotemporal probabilities is usually a difficult task, but that is not our primary concern. Rather, we ask how analysts can communicate spatiotemporal uncertainty to those handling the crisis. We comment on the somewhat limited literature on the representation of spatial uncertainty on maps. We note that many cognitive issues arise and that the potential for confusion is high. We note that in the early stages of handling a crisis, the uncertainties involved may be deep, i.e., difficult or impossible to quantify in the time available. In such circumstance, we suggest the idea of presenting multiple scenarios.  相似文献   
726.
Major accident risks posed by chemical hazards have raised major social concerns in today's China. Land‐use planning has been adopted by many countries as one of the essential elements for accident prevention. This article aims at proposing a method to assess major accident risks to support land‐use planning in the vicinity of chemical installations. This method is based on the definition of risk by the Accidental Risk Assessment Methodology for IndustrieS (ARAMIS) project and it is an expansion application of severity and vulnerability assessment tools. The severity and vulnerability indexes from the ARAMIS methodology are employed to assess both the severity and vulnerability levels, respectively. A risk matrix is devised to support risk ranking and compatibility checking. The method consists of four main steps and is presented in geographical information‐system‐based maps. As an illustration, the proposed method is applied in Dagushan Peninsula, China. The case study indicated that the method could not only aid risk regulations on existing land‐use planning, but also support future land‐use planning by offering alternatives or influencing the plans at the development stage, and thus further enhance the roles and influence of land‐use planning in the accident prevention activities in China.  相似文献   
727.
The Simon's two‐stage design is the most commonly applied among multi‐stage designs in phase IIA clinical trials. It combines the sample sizes at the two stages in order to minimize either the expected or the maximum sample size. When the uncertainty about pre‐trial beliefs on the expected or desired response rate is high, a Bayesian alternative should be considered since it allows to deal with the entire distribution of the parameter of interest in a more natural way. In this setting, a crucial issue is how to construct a distribution from the available summaries to use as a clinical prior in a Bayesian design. In this work, we explore the Bayesian counterparts of the Simon's two‐stage design based on the predictive version of the single threshold design. This design requires specifying two prior distributions: the analysis prior, which is used to compute the posterior probabilities, and the design prior, which is employed to obtain the prior predictive distribution. While the usual approach is to build beta priors for carrying out a conjugate analysis, we derived both the analysis and the design distributions through linear combinations of B‐splines. The motivating example is the planning of the phase IIA two‐stage trial on anti‐HER2 DNA vaccine in breast cancer, where initial beliefs formed from elicited experts' opinions and historical data showed a high level of uncertainty. In a sample size determination problem, the impact of different priors is evaluated.  相似文献   
728.
This paper discusses a recent study on three ‘Youth Commission’ on police and crime projects. Professional viewpoints were interpreted to understand how they valued young people's participation and made sense of their experiences and capabilities. Framed within policing reforms, the ‘Youth Commission’ projects regard young people as co‐producers, who work in partnership with professionals to address police and crime issues. The focus is upon professionals and their relationships with young people for transformative participation and social outcomes. Working in partnerships showed interdependency but identifies further challenges if professionals do not truly value young people's participation.  相似文献   
729.
This article analyzes naturally occurring video‐recorded openings during which participants make the sensory social through the action of registering—calling joint attention to a selected, publicly perceivable referent so others shift their sensory attention to it. It examines sequence‐initial actions that register referents for which a participant is regarded as responsible. Findings demonstrate a systematic preference organization which observably guides when and how people initiate registering sequences sensitive to ownership of, and displayed stance toward, the target referent. Analysis shows how registering an owned referent achieves intersubjectivity and puts involved participants' face, affiliation, and social relationship on the line. A video abstract is available at https://youtu.be/rNL70vawG3o  相似文献   
730.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号