首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18篇
  免费   0篇
管理学   3篇
理论方法论   6篇
社会学   7篇
统计学   2篇
  2024年   1篇
  2020年   1篇
  2019年   1篇
  2016年   2篇
  2015年   1篇
  2013年   1篇
  2012年   1篇
  2011年   1篇
  2010年   1篇
  2009年   1篇
  2006年   1篇
  2004年   1篇
  1998年   1篇
  1997年   2篇
  1996年   1篇
  1985年   1篇
排序方式: 共有18条查询结果,搜索用时 15 毫秒
1.
According to the class of de minimis decision principles, risks can be ignored (or at least treated very differently from other risks) if the risk is sufficiently small. In this article, we argue that a de minimis threshold has no place in a normative theory of decision making, because the application of the principle will either recommend ignoring risks that should not be ignored (e.g., the sure death of a person) or it cannot be used by ordinary bounded and information-constrained agents.  相似文献   
2.
The ‘parental perspective’ in child care work is a matter of concern and is actively solicited by practitioners, managers, policymakers and researchers for differing reasons. This paper argues that the search for such a stable “parental perspective” should be abandoned and suggest that research should embrace a social constructionist turn by concentrating on how parents' views are negotiated conversationally in discourse. Using data drawn from research interviews with parents of children in care and employing conversation and discourse analytic methods, the paper demonstrates how there are critical issues of accountability, blame, and testing at stake in the interview encounter, as interviewer and interviewee jointly produce a moral version of the client, the institution, the case and its attributes. The implications of this argument are delineated.  相似文献   
3.
This paper reviews the literature on communication between professionals and parents/carers in health and social care. It notes that there is considerable research on doctor–patient communication and counselling, but much less on professionals who visit families in their homes. While there is a large literature on good practice and communication skills, there is little research on the actual encounters themselves. What counts as 'communication' in such publications is explored. The paper suggests that there is much to be gained by considering research in discourse analysis and sociolinguistics on professional–client encounters. Examples of some of the key concepts are discussed and an engagement with this literature is recommended.  相似文献   
4.
This article reports on a sociolinguistic study into the prevalence of African-American English (AAE) features in the lyrical language use of blues artists, relying on data from different social and national backgrounds and time periods. It adopts a variationist linguistic methodological approach to examine the prevalence of five AAE forms in live-performed blues music: /aɪ/ monophthongization, post-consonantal word-final /t/ deletion, post-consonantal word-final /d/ deletion, alveolar nasal /n/ in < ing > ultimas, and post-vocalic word-final /r/ deletion. Mixed effects logistic regression analysis applied to a corpus of 80 performances finds no statistically significant association between national/ethnic background and variant use, and indicates that blues artists, from different eras and nationalities, are highly probable to realize the AAE variant of the analyzed variables, regardless of their sociocultural background. By building on early scholarly work on language and music, existing studies considering the use of AAE by non-members of the African-American community, and current theorizing on authenticity, style, and indexicality, this study hence provides tentative support for the existence of a standard blues singing style, which involves performers using AAE forms as a stylistic-linguistic strategy to index artistic authenticity.  相似文献   
5.
This paper examines how a case of child abuse is turned into ‘political news’. It raises the following questions: (i) which moments in the chain of events concerning child abuse are selected for coverage by the media; (ii) what is the nature of the transformation of institutional events into a particular type of covered event; and (iii) what is the dynamics of struggle over definitions of reality and the projection of certain causal links. We compare how the trade press and the national press report child abuse by concentrating on three different cycles of a particular case, Stephanie Fox (cycle 1: discovery of Stephanie's death; cycle 2: the conviction of Stephen Fox; and cycle 3: the inquiry report). Our primary focus is on the narrative transformation of the storyline as different voices and discourses are recruited to substantiate different agendas. We show how different rhetorical strategies are deployed to account for the facts of the case, while linking this up with the current situation of the reader of such media reports. © 1997 John Wiley & Sons, Ltd.  相似文献   
6.
7.
The authors studied the entrepreneurial culture among Albanian smugglers and traffickers using 43 Albanian judicial files in Belgium from 1995–2005. They analyse the niches that these “entrepreneurs” created as well as the way they invested profits. The authors also analyse the personal agency of the smuggled and trafficked clients, and practices that may help to explain the specific entrepreneurial culture. Short comparisons are made with other ethnic criminal groups engaged in similar activities during the same period in Belgium.  相似文献   
8.
CONGESTION MODELS AND WEIGHTED BAYESIAN POTENTIAL GAMES   总被引:5,自引:0,他引:5  
Facchini  Giovanni  van Megen  Freek  Borm  Peter  Tijs  Stef 《Theory and Decision》1997,42(2):193-206
Games associated with congestion situations à la Rosenthal (1973) have pure Nash equilibria. This result implicitly relies on the existence of a potential function. In this paper we provide a characterization of potential games in terms of coordination games and dummy games. Second, we extend Rosenthal's congestion model to an incomplete information setting, and show that the related Bayesian games are potential games and therefore have pure Bayesian equilibria.  相似文献   
9.
This article critically examines and contextualises the role of nationality statistics and maps in representations of the post-Yugoslav wars. Approaching these wars, a conflict involving competing nationalisms centred upon modern technologies of power/knowledge, I deploy the term “national numbers” to refer to the discursive node where numerical data about the nationality of the population and territorial mappings converge. Drawing on ethnographic fieldwork since 1996, this article explores how the reliance on national numbers and their territorialisation functions as the lynchpin of a dominant “mosaic” mode of representation of the post-Yugoslav wars. Examining their workings within local and international governance, in experiences of “ethnic cleansing” in the post-Yugoslav states and in discourses aiming to know, understand, explain, and represent the violence, it then makes a case for a healthy dose of critical distance with regard to the deployment of national numbers. In particular, we need to contextualise them in relation to the role of national categories and other lines of differentiation in Yugoslavia. Anthropologists and other social scientists, who take pride in providing strongly contextualised understandings of social phenomena, seem to be particularly well placed to do so.  相似文献   
10.
An Approach to Vulnerability Analysis of Complex Industrial Systems   总被引:3,自引:0,他引:3  
Einarsson  Stefán  Rausand  Marvin 《Risk analysis》1998,18(5):535-546
The concept of vulnerability of complex industrial systems is defined and discussed in relation to risk and system survivability. The discussion is illustrated by referring to a number of previous industrial accidents. The various risk factors, or threats, influencing an industrial system's vulnerability are classified and discussed. Both internal and external threats are covered. The general scope of vulnerability analysis is compared to traditional risk analysis approaches and main differences are illustrated. A general procedure for vulnerability analysis in two steps, including building of scenarios and preparation of relevant worksheets, is described and discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号