首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   467篇
  免费   15篇
  国内免费   2篇
管理学   55篇
人口学   9篇
丛书文集   59篇
理论方法论   21篇
综合类   236篇
社会学   91篇
统计学   13篇
  2024年   1篇
  2023年   4篇
  2022年   5篇
  2021年   9篇
  2020年   12篇
  2019年   7篇
  2018年   8篇
  2017年   20篇
  2016年   13篇
  2015年   9篇
  2014年   23篇
  2013年   42篇
  2012年   29篇
  2011年   50篇
  2010年   24篇
  2009年   38篇
  2008年   36篇
  2007年   29篇
  2006年   29篇
  2005年   23篇
  2004年   18篇
  2003年   21篇
  2002年   10篇
  2001年   10篇
  2000年   2篇
  1999年   1篇
  1998年   2篇
  1997年   2篇
  1995年   1篇
  1994年   1篇
  1993年   3篇
  1989年   2篇
排序方式: 共有484条查询结果,搜索用时 625 毫秒
1.
当代大学生综合素质的缺陷与改善措施   总被引:3,自引:0,他引:3  
从政治素质、思想素质、社会公德、身体心理状况等四个方面阐述了当代大学生综合素质的缺陷,通过分析研究,提出一系列具体的改善措施,力求以此来促进对大学生综合素质的培养教育,确保大学生全面健康的发展。  相似文献   
2.
在男性占主导地位的语言,诚如英汉语中"乞丐""医生"等职业术语和"chairman""hero"等官衔荣誉称呼之类的名词,一般性的人类泛指"a man","mankind"以及代词的非指示用法中,女性往往被置于"隐形"的地位。性别差异和性别歧视的现象已引起社会上各学科的普遍关注,然而,从认知角度对这一现象作出注解的文章寥寥。运用认知语言学中的原型和范畴理论、框架理论、心理空间和概念合成理论对此予以阐释,可为英汉语中这一现象的理论阐释提供全新的多元认知视角。  相似文献   
3.
南唐是五代十国时期南方国家中与中原抗衡的中坚力量, 其经济发展取得了很大成就。统治者施行保境息民政策、实施阻断北方割据势力南渐的策略 以及唐代江淮地区经济发展的基础等,是经济得以恢复和发展的重要原因;而与邻邦之间的 长期战争、小生产模式下沉重的封建剥削和日益激化的派系斗争,则使南唐的经济发展仍未 达到理想的水平。探索南唐经济发展的原因及其相对性,具有重要的历史和现实意义。  相似文献   
4.
本文首先阐明代位求偿权的涵义。在此基础上,针对我国法律关于代位求偿权的相关规定以及国内学者对代位求偿权行使条件的理解,比较借鉴英国法律,分析我国法律所确立的代位求偿权行使条件,提出自己的观点和看法。  相似文献   
5.
Although alternative forms of statistical and verbal information are routinely used to convey species’ extinction risk to policymakers and the public, little is known about their effects on audience information processing and risk perceptions. To address this gap in literature, we report on an experiment that was designed to explore how perceptions of extinction risk differ as a function of five different assessment benchmarks (Criteria A–E) used by scientists to classify species within IUCN Red List risk levels (e.g., Critically Endangered, Vulnerable), as well as the role of key individual differences in these effects (e.g., rational and experiential thinking styles, environmental concern). Despite their normative equivalence within the IUCN classification system, results revealed divergent effects of specific assessment criteria: on average, describing extinction risk in terms of proportional population decline over time (Criterion A) and number of remaining individuals (Criterion D) evoked the highest level of perceived risk, whereas the single‐event probability of a species becoming extinct (Criterion E) engendered the least perceived risk. Furthermore, participants scoring high in rationality (analytic thinking) were less prone to exhibit these biases compared to those low in rationality. Our findings suggest that despite their equivalence in the eyes of scientific experts, IUCN criteria are indeed capable of engendering different levels of risk perception among lay audiences, effects that carry direct and important implications for those tasked with communicating about conservation status to diverse publics.  相似文献   
6.
Cognitive liberation is often treated in the social movements literature as a mediating factor through which political opportunities and mobilizing structures generate protest. This paper unpacks multiple dimensions of cognitive liberation and finds that they may operate in tension with one another. Building on scholarship that focuses on subjective factors in social movements, the paper examines the case of the Korku, an oppressed indigenous community in central India, who choose not to protest despite the presence of several dimensions of cognitive liberation. Rather than engage in collective political action, the Korku’s grievances are deflected toward depoliticized religious goals. The Korku seek communal improvement through Hindu piety in a context of the Hindutva cultural-nationalist ideology, rather than protest against the encroachment of this ideology on their community.  相似文献   
7.
《Long Range Planning》2022,55(3):102121
The ability of Top Management Teams (TMTs) to reflect critically on their own actions represents an important element of effective TMT decision making and governance effectiveness. This paper therefore examines how the TMT-board interface internal to the organization, as well as the TMT interface with the external supervisory authority, shape TMT reflexivity. Drawing from governance and psychological theories, we posit that cognitive conflict at the TMT-board interface can escalate by increasing levels of affective TMT-board conflict, and hereby, harm TMT reflexivity if not managed well. This proposition was tested in a multisource team-level data set collected in the field among TMTs (N = 111 TMT members) and their supervisory boards (N = 152 board members) of 56 Dutch insurance companies. The findings demonstrate that the link between cognitive and affective TMT-board conflict is mitigated by board membership influx. Yet in cases where conflict escalation does occur, its subsequent impact on TMT reflexivity hinges on the degree to which an external supervisory authority monitored TMT actions. The results illustrate that TMT decision making processes can be effectively influenced by internal and external TMT-governance interfaces, yet at different conflict stages, and through different governance actions.  相似文献   
8.
By integrating cognitive diversity into debiasing literature, this paper contributes towards opening the black box of executive judgment. Based on information processing theory we investigate the role of cognitive diversity in strategic decision making. We apply a vignette-based experimental research design to examine the effect of cognitive diversity in teams on decision maker's illusion of control. The results of these experiments provide evidence for a positive influence of high cognitive diversity for debiasing judgment while similarly indicating no such effect for groups with low cognitive diversity. These findings suggest that group composition aspects can play an important role for improving judgment in decision making teams and open promising new avenues for studying debiasing in behavioral strategy research.  相似文献   
9.
ABSTRACT

There are growing numbers of Adult Day Health Care (ADHC) programs providing needed health services to community-dwelling elderly. Therefore, ADHC staff are in an opportune position to identify and to intervene in suspected elder mistreatment (EM) cases. In this paper, prevalence estimates of EM are reported for a probability sample of ADHC clients in New York State, using data provided during a social worker informant interview. The abuse “signs and symptoms” items in the social worker informant interview schedule were divided into two categories: (1) physical indicators and (2) client's behavioral indicators. Physical indicators included unexplained bruises and welts, unexplained burns, unexplained lacerations or abrasions, human bite marks, and frequent injuries that are “accidental” or “unexplained.” Client's behavioral indicators included apprehension, being frightened, and afraid to go home. EM prevalence for all 8 items was 12.3 percent. When “apprehensive” was excluded, the EM prevalence was 3.6 percent in this sample. These findings suggest that ADHC provides a point of contact for the assessment and intervention of EM that might otherwise be overlooked among elders who are often isolated or homebound.  相似文献   
10.
Tree algorithms are a well-known class of random access algorithms with a provable maximum stable throughput under the infinite population model (as opposed to ALOHA or the binary exponential backoff algorithm). In this article, we propose a tree algorithm for opportunistic spectrum usage in cognitive radio networks. A channel in such a network is shared among so-called primary and secondary users, where the secondary users are allowed to use the channel only if there is no primary user activity. The tree algorithm designed in this article can be used by the secondary users to share the channel capacity left by the primary users.

We analyze the maximum stable throughput and mean packet delay of the secondary users by developing a tree structured Quasi-Birth Death Markov chain under the assumption that the primary user activity can be modeled by means of a finite state Markov chain and that packets lengths follow a discrete phase-type distribution.

Numerical experiments provide insight on the effect of various system parameters and indicate that the proposed algorithm is able to make good use of the bandwidth left by the primary users.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号