首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   385篇
  免费   34篇
管理学   25篇
民族学   7篇
人口学   23篇
理论方法论   57篇
综合类   1篇
社会学   276篇
统计学   30篇
  2023年   1篇
  2022年   1篇
  2021年   16篇
  2020年   15篇
  2019年   29篇
  2018年   28篇
  2017年   37篇
  2016年   27篇
  2015年   17篇
  2014年   15篇
  2013年   66篇
  2012年   11篇
  2011年   15篇
  2010年   7篇
  2009年   7篇
  2008年   6篇
  2007年   10篇
  2006年   10篇
  2005年   6篇
  2004年   10篇
  2003年   12篇
  2002年   12篇
  2001年   8篇
  2000年   5篇
  1999年   4篇
  1998年   5篇
  1997年   5篇
  1996年   6篇
  1995年   1篇
  1993年   2篇
  1992年   3篇
  1991年   3篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1987年   3篇
  1985年   3篇
  1984年   2篇
  1982年   1篇
  1979年   1篇
  1978年   1篇
  1973年   1篇
  1972年   1篇
  1969年   1篇
  1967年   1篇
排序方式: 共有419条查询结果,搜索用时 15 毫秒
1.
This article explores how a lack of access to increasingly complex and overlapping digital communications platforms in times of disaster for people with disabilities has the potential to make already life-threatening situations considerably more dangerous. As we are increasingly coming to rely on a social media mash-up of digital platforms to assist in communications during disaster situations, the issue of accessibility for people with disabilities is as dire as if it was high ground during a tsunami or transport during a typhoon. The contemporary social media environment is characterised by a complex and overlapping network of complementary platforms, populated by user-generated content, where people communicate and exchange ideas. In this environment, YouTube videos are posted to Facebook and embedded in blogs, and Twitter is used to link to these other sites and is itself embedded in other platforms. These networks are increasingly supplementing and supplanting more traditional communication platforms, such as the television and radio, particularly in times of disaster. The concern of this paper is that the elements from which this mash-up of communications channels is made are not always accessible to people with disabilities. This evolving network of social media-based communication exposes the limits of existing Internet-based universal design.  相似文献   
2.
3.
The United States formulates much of its immigration and refugee policy to match economic and political circumstances. We interpret these policy shifts as a set of graduated positions on immigration and refugee flows that attempts to discipline the lives of newcomers and, in so doing, shapes immigrant identities. In this article, we analyse the interplay between the US government and Salvadoran asylum applicants negotiating procedures that grant only temporary relief from deportation via the policy of Temporary Protected Status (TPS). We find that each policy shift results in the strategic renegotiation of asylum applicants’ identities so as to achieve the best opportunity for a successful outcome. Based on Foucault’s ideas of governmentality and Ong’s concept of flexible citizenship, we argue that what appears more superficially as a patchwork strategy of immigration laws and asylum practices may be theorized more deeply as a set of flexible responses by the state that turn on identity construction at different scales, and that aim to mediate transnational relations.  相似文献   
4.
5.
Estimation from Zero-Failure Data   总被引:2,自引:0,他引:2  
When performing quantitative (or probabilistic) risk assessments, it is often the case that data for many of the potential events in question are sparse or nonexistent. Some of these events may be well-represented by the binomial probability distribution. In this paper, a model for predicting the binomial failure probability, P , from data that include no failures is examined. A review of the literature indicates that the use of this model is currently limited to risk analysis of energetic initiation in the explosives testing field. The basis for the model is discussed, and the behavior of the model relative to other models developed for the same purpose is investigated. It is found that the qualitative behavior of the model is very similar to that of the other models, and for larger values of n (the number of trials), the predicted P values varied by a factor of about eight among the five models examined. Analysis revealed that the estimator is nearly identical to the median of a Bayesian posterior distribution, derived using a uniform prior. An explanation of the application of the estimator in explosives testing is provided, and comments are offered regarding the use of the estimator versus other possible techniques.  相似文献   
6.
Emotion understanding is a multifaceted construct made up of several components. To identify how several common components of emotion understanding relate to one another, five emotion understanding tasks were compared within the same group of children. Fifty‐four preschool children (M = 3.81 years, SD = 0.40) were asked to display the typical facial expression of six emotions after hearing their corresponding emotion label. They were then read six vignettes and asked to: “use your face to show how [the protagonist] would feel,” provide an emotion label for the main character, and “choose a picture of a face that would look like [the main character].” Finally, they were asked to provide a label for emotions presented to them in photographs. For all tasks, six emotions were examined: happiness, sadness, anger, fear, surprise, and disgust. With the exception of the two modeling tasks, results show correlations among the emotion understanding tasks. There was a significant interaction between task and emotion category for emotion understanding accuracy. However, there was some consistency in the pattern of discrete emotion categorization emergence across the tasks. Additionally, accuracy scores (representing emotion understanding) across tasks were not equivalent. Findings are discussed in the broader context of emotion understanding.  相似文献   
7.
8.
9.
This article measures the degree to which academic economists have engaged in unethical behavior and the degree to which academic economists believe the profession as a whole engages in unethical behavior. Three main types of unethical behavior are examined: (1) falsification of research; (2) expropriation of graduate student research or including an undeserving co-author on a research paper; and (3) exchange of grades for gifts, money, or sex. Using a unique data set gathered at the 1998 American Economic Association (AEA) meetings, we find that there is a significant amount of misconduct, particularly in the second category.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号