首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   623篇
  免费   15篇
管理学   127篇
民族学   2篇
人口学   53篇
丛书文集   5篇
理论方法论   58篇
综合类   9篇
社会学   309篇
统计学   75篇
  2024年   2篇
  2023年   4篇
  2022年   18篇
  2021年   9篇
  2020年   26篇
  2019年   16篇
  2018年   24篇
  2017年   24篇
  2016年   27篇
  2015年   25篇
  2014年   22篇
  2013年   97篇
  2012年   23篇
  2011年   16篇
  2010年   12篇
  2009年   13篇
  2008年   15篇
  2007年   28篇
  2006年   20篇
  2005年   17篇
  2004年   12篇
  2003年   13篇
  2002年   11篇
  2001年   13篇
  2000年   9篇
  1999年   8篇
  1998年   6篇
  1997年   9篇
  1996年   9篇
  1995年   6篇
  1994年   11篇
  1993年   7篇
  1992年   5篇
  1991年   9篇
  1990年   9篇
  1989年   5篇
  1988年   7篇
  1987年   4篇
  1986年   2篇
  1985年   4篇
  1984年   3篇
  1983年   5篇
  1982年   7篇
  1981年   4篇
  1980年   8篇
  1979年   3篇
  1978年   2篇
  1976年   4篇
  1975年   3篇
  1974年   1篇
排序方式: 共有638条查询结果,搜索用时 9 毫秒
1.
2.
3.
This article presents a framework for using probabilistic terrorism risk modeling in regulatory analysis. We demonstrate the framework with an example application involving a regulation under consideration, the Western Hemisphere Travel Initiative for the Land Environment, (WHTI‐L). First, we estimate annualized loss from terrorist attacks with the Risk Management Solutions (RMS) Probabilistic Terrorism Model. We then estimate the critical risk reduction, which is the risk‐reducing effectiveness of WHTI‐L needed for its benefit, in terms of reduced terrorism loss in the United States, to exceed its cost. Our analysis indicates that the critical risk reduction depends strongly not only on uncertainties in the terrorism risk level, but also on uncertainty in the cost of regulation and how casualties are monetized. For a terrorism risk level based on the RMS standard risk estimate, the baseline regulatory cost estimate for WHTI‐L, and a range of casualty cost estimates based on the willingness‐to‐pay approach, our estimate for the expected annualized loss from terrorism ranges from $2.7 billion to $5.2 billion. For this range in annualized loss, the critical risk reduction for WHTI‐L ranges from 7% to 13%. Basing results on a lower risk level that results in halving the annualized terrorism loss would double the critical risk reduction (14–26%), and basing the results on a higher risk level that results in a doubling of the annualized terrorism loss would cut the critical risk reduction in half (3.5–6.6%). Ideally, decisions about terrorism security regulations and policies would be informed by true benefit‐cost analyses in which the estimated benefits are compared to costs. Such analyses for terrorism security efforts face substantial impediments stemming from the great uncertainty in the terrorist threat and the very low recurrence interval for large attacks. Several approaches can be used to estimate how a terrorism security program or regulation reduces the distribution of risks it is intended to manage. But, continued research to develop additional tools and data is necessary to support application of these approaches. These include refinement of models and simulations, engagement of subject matter experts, implementation of program evaluation, and estimating the costs of casualties from terrorism events.  相似文献   
4.
5.
One ultimate test of the material value of identification in an organizational context is whether it relates to productivity. In this rare study of a business team in a global consumer goods company, we demonstrate a sales benefit of organizational identification when correcting for systematic between‐unit differences in sales. Findings also question the theoretical and practical meaning of ‘proximity’ in accounting for salience variations in identification – the best predictor of sales was the degree of identification with the superordinate business unit. Findings shed light on the scientific as well as managerial and business utility of the organizational identity concept.  相似文献   
6.
We consider a continuous-time model for the evolution of social networks. A social network is here conceived as a (di-) graph on a set of vertices, representing actors, and the changes of interest are creation and disappearance over time of (arcs) edges in the graph. Hence we model a collection of random edge indicators that are not, in general, independent. We explicitly model the interdependencies between edge indicators that arise from interaction between social entities. A Markov chain is defined in terms of an embedded chain with holding times and transition probabilities. Data are observed at fixed points in time and hence we are not able to observe the embedded chain directly. Introducing a prior distribution for the parameters we may implement an MCMC algorithm for exploring the posterior distribution of the parameters by simulating the evolution of the embedded process between observations.  相似文献   
7.
This paper presents a conceptually distinct analysis of the data first reported by Leather et al. Specifically, it investigates the effects of exposure to a variety of forms of work-related violence upon work attitudes and general well-being within a sample of UK public house licensees—individuals who manage public houses and hold the licence permitting the sale of alcoholic drinks on the premises. In addition, it examines the role of social support in moderating such effects. Based upon a sample of 242 licensees, it reports a consistent interaction between exposure to such violence and the availability of perceived intra-organizational support in determining the size of any negative effects upon individual well-being, job satisfaction and organizational commitment. It is argued that exposure to all forms of work-related violence, including intimidation, verbal abuse and threat, should be seen as a potential stressor within the work environment, the negative effects of which are buffered by perceived support from within the organization, but not by that perceived to be available from informal sources such as family and friends.  相似文献   
8.
Analysis of incomplete durations with application to contraceptive use   总被引:1,自引:0,他引:1  
Models for analysing incomplete durations obtained from cross-sectional surveys are presented. The aim of the paper is to develop a framework for analysing the incomplete duration of episodes in progress at the time of the survey by formulating generalized linear models and fitting and assessing them by using standard statistical packages. The maximum quasi-likelihood method is used for model fitting. The choice of the distribution and the diagnostic procedures are discussed. Simulated data from two distributions (the Weibull and log-logistic distributions) are used to evaluate the methodology developed and to assess model misspecifications. A data set on the current use of the contraceptive pill from a cross-sectional survey in Egypt is analysed.  相似文献   
9.
By means of an example it is shown how eigenvalues and eigenvectors of variance components models can be obtained straightforwardly when balanced data are available. Simple asymptotically efficient estimators of the variance components are presented.  相似文献   
10.
From the literature three types of predictors for factor scores are available. These are characterized by the constraints: linear, linear conditionally unbiased, and linear correlation preserving. Each of these constraints generates a class of predictors. Best predictors are defined in terms of Lowner's partial matrix order applied to matrices of mean square error of prediction. It is shown that within the first two classes a best predictor exists and that it does not exist in the third.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号