首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   164篇
  免费   1篇
  国内免费   3篇
管理学   13篇
民族学   2篇
人口学   9篇
丛书文集   5篇
理论方法论   9篇
综合类   43篇
社会学   63篇
统计学   24篇
  2024年   2篇
  2023年   5篇
  2021年   2篇
  2020年   8篇
  2019年   8篇
  2018年   13篇
  2017年   6篇
  2016年   2篇
  2015年   10篇
  2014年   9篇
  2013年   27篇
  2012年   7篇
  2011年   5篇
  2010年   11篇
  2009年   6篇
  2008年   9篇
  2007年   4篇
  2006年   5篇
  2005年   8篇
  2004年   6篇
  2003年   2篇
  2002年   5篇
  2001年   4篇
  2000年   1篇
  1997年   1篇
  1994年   1篇
  1992年   1篇
排序方式: 共有168条查询结果,搜索用时 0 毫秒
1.
ABSTRACT

Early detection with a low false alarm rate (FAR) is the main aim of outbreak detection as used in public health surveillance or in regard to bioterrorism. Multivariate surveillance is preferable to univariate surveillance since correlation between series (CBS) is recognized and incorporated. Sufficient reduction has proved a promising method for handling CBS, but has not previously been used when correlation within series (CWS) is present. Here we develop sufficient reduction methods for reducing a p-dimensional multivariate series to a univariate series of statistics shown to be sufficient to monitor a sudden, but persistent, shift in the multivariate series mean. Correlation both within and between series is taken into account, as public health data typically exhibit both forms of association. Simultaneous and lagged changes and different shift sizes are investigated. A one-sided exponentially weighted moving average chart is used as a tool for detection of a change. The performance of the proposed method is compared with existing sufficient reduction methods, the parallel univariate method and both VarR and Z charts. A simulation study using bivariate normal autoregressive data shows that the new method gives shorter delays and a lower FAR than other methods, which have high FARs when CWS is clearly present.  相似文献   
2.
Surveillance to detect changes of spatial patterns is of interest in many areas such as environmental control and regional analysis. Here the interaction parameter of the Ising model, is considered. A minimal sufficient statistic and its asymptotic distribution are used. It is demonstrated that the convergence to normal, distribution is rapid. The main result is that when the lattice is large, all approximations are better in several respects. It is shown that, for large lattice sizes, earlier results on surveillance of a normally distributed random variable can be used in cases of most interest. The expected delay of alarm at a fixed level of false alarm probability is examined for some examples.  相似文献   
3.
What factors determine whether and how deeply countries will commit to the international human rights regime? Using data for up to 142 countries between 1966 and 2000, this article analyzes patterns of membership to the International Human Rights Covenants. The analysis produced two main conclusions. First, the potential costs associated with joining a treaty, rather than its substantive content, motivates the decision to join. Treaties that protect different rights but establish comparable implementation mechanisms exhibit similar patterns of membership, whereas treaties that protect identical rights but establish different implementation provisions exhibit dissimilar patterns of membership. Second, rates of treaty membership differ by level of commitment. Countries that sign human rights treaties differ from countries that ratify. Results are interpreted with respect to four theories of commitment and compliance: realism, liberalism, constructivism, and sociological institutionalism. Theories that emphasize the importance of a treaty’s costs (realism and institutionalism) fare better than theories that prioritize a treaty’s content (liberalism and constructivism).  相似文献   
4.
The spectre of environmental ‘domestic extremism’ has long been postulated by police leaders and security analysts in Britain. It is a narrative that has justified the commitment of enormous amounts of government resources towards police intelligence work directed at non-violent direct action campaigns. Most controversially, this has included the long-term infiltration of environmental (and other) activist groups by undercover police. This article provides a critical analysis of the justifications put forward in support of the covert surveillance of environmental activists in Britain. The paper proceeds by way of a single case study – a high profile, environmental direct action protest in the north of England – in order to reveal the levels of abuse, manipulation and deception at the basis of undercover protest policing. Through their court case, the activists involved with this action were able to obtain rare insights into the police authorisation documents for the undercover operation that had led to their arrests. An analysis of these documents provides us with a glimpse of the contradictory justifications given by senior police officers for infiltration – now under scrutiny by a public inquiry.  相似文献   
5.
ABSTRACT

We describe two recently proposed machine learning approaches for discovering emerging trends in fatal accidental drug overdoses. The Gaussian Process Subset Scan (Herlands, McFowland, Wilson, & Neill, 2017 Neill, D. B. (2017). Multidimensional tensor scan for drug overdose surveillance. Journal of Public Health Informatics, 9(1), e20. doi:10.5210/ojphi.v9i1.7598[Crossref] [Google Scholar]) enables early detection of emerging patterns in spatio-temporal data, accounting for both the complex, correlated nature of the data and the fact that detecting subtle patterns requires integration of information across multiple spatial areas and multiple time steps. We apply this approach to 17 years of county-aggregated data for monthly opioid overdose deaths in the New York City metropolitan area, showing clear advantages in the utility of discovered patterns as compared to typical anomaly detection approaches. To detect and characterize emerging overdose patterns that differentially affect a subpopulation of the data, including geographic, demographic, and behavioral patterns (e.g., which combinations of drugs are involved), we apply the Multidimensional Tensor Scan (Neill, 2017 Neill, D. B. (2017). Multidimensional tensor scan for drug overdose surveillance. Journal of Public Health Informatics, 9(1), e20. doi:10.5210/ojphi.v9i1.7598[Crossref] [Google Scholar]) to 8 years of case-level overdose data from Allegheny County, Pennsylvania. We discover previously unidentified overdose patterns which reveal unusual demographic clusters, show impacts of drug legislation, and demonstrate potential for early detection and targeted intervention. These approaches to early detection of overdose patterns can inform prevention and response efforts, as well as understanding the effects of policy changes.  相似文献   
6.
ABSTRACT

This paper considers how personal data protections figure into the design process of wearable technology. The data question is becoming especially important in the face of recent innovations in biotechnology that capitalize on the new fungibility of biology and electronics, in which new biotech wearables capitalize on the ability to analyze and track changes in blood, sweat, and tears. Interviews and participant observation with wearable tech designers, data scientists, fashion tech entrepreneurs, and select experts in cybersecurity and intellectual property law, reveal a range of approaches to data protection in design within the culture where wearables are beginning to merge with biotech. While a few respondents were extremely vigilant about protecting consumer’s privacy, the majority felt that when consumers ‘opt in’ to data sharing, they should be cognizant of the risks. From their perspective, it is not necessarily the producer’s responsibility to protect user's personal data. These attitudes present a problematic logic, which leaves users vulnerable to data exploitation. The paper concludes by arguing that this laissez-faire culture is the environment in which wearable biotech is being developed and will be deployed. This emerging technology raises issues about bodies, data, and ownership in crucial need of analysis and critique to push its move into the mainstream toward more equitable and inclusive ends.  相似文献   
7.
Although most surveillance studies scholars assume privacy is antithetical to surveillance, critics have recently warned that privacy-based criticisms may facilitate surveillance. That being said, we do not yet have data that show whether privacy claims were used in the past to legitimate government surveillance. This paper addresses that gap by analyzing claims made over one of the U.S.’s most controversial surveillance issues: government control over encryption technologies. A review of Congressional hearings and statements on the Congressional Record (n?=?112) reveals that from 1993 to 1999, public debates were dominated by a market liberalization discourse in which participants supported loosening encryption controls as a way to protect privacy from criminal intrusions in market transactions. Also playing a role was a strong skepticism toward government power and a preference for markets as managers of crime prevention. Challenged by these critiques, lawmakers withdrew regulatory proposals and spent the following decade working quietly with private firms to ensure law enforcement surveillance capability. These findings show the expansion of privacy for consumers and entrepreneurs has in fact been used to achieve the contraction of privacy from law enforcement and intelligence agencies.  相似文献   
8.
This article analyzes the social construction of border surveillance and policing in reality-based television. Utilizing content analytic methods to document and decode popular images of borders, mobility, and insecurity, it assesses three programs from Australia, the UK, and the United States. Despite claims of offering accurate and unfiltered depictions, the programs are ideological and provide visions of enforcement that reinforce stereotypes regarding the risks of permeable borders and exonerate intensive regimes of surveillance and securitization. Our findings suggest this occurs in three ways. First, the programs inflate the extent and seriousness of lawlessness associated with cross-border movement. Second, they offer individualistic explanations of crime that cite personal choices and pathologies as determinants. Finally, alongside neglecting their perspectives and interpretations of events, when compared to the reality of official statistics, the programs disproportionately feature suspected offenders as members of marginalized groups. The social and political implications of these findings are discussed.  相似文献   
9.
Silicon Valley, California – home of Apple, Facebook, Twitter, Google, and so on – is widely regarded as the epicentre of the information revolution. However, it is not just a technical or economic phenomenon; it has also made a social revolution. The article evaluates Silicon Valley from a normative perspective, seeking to identify its real societal impact, negative as well as positive. A select review of significant literature is followed by exposition of primary data, based on in situ face-to-face interviews with Valley occupants; these range from the chief technology officer of a global brand to a homeless, unemployed Vietnam War veteran. The article organises its findings under three headings: the nature of information revolution; iCapitalism as a new technoeconomic synthesis; and the normative crisis of the information society. It concludes with a warning about ongoing attempts to clone Silicon Valley around the world.  相似文献   
10.
In 2016, without the knowledge of its citizens, Baltimore City Police deployed a military aerial surveillance technology called Wide Area Motion Imagery (WAMI), which can track the movements of every person in public view over the entire city. Though the trial of the “spy plane,” as the program was dubbed, quickly ended in scandal, organizers from Baltimore’s low-income minority neighborhoods successfully rebooted the program in 2020, this time framing WAMI partly as a tool of “sousveillance” (watching “from below”) that can track the movements of police officers. The paper shows how organizers “rebranded” WAMI around two conceptions of sousveillance—“citizen-centered” and “state-centered”—creating an unlikely coalition of supporters from both pro- and anti-policing sides of the criminal justice reform debate. But while the renewed program has vowed to be a “Big Brother” to the state, it will continue to be used for traditional surveillance, raising troubling questions about privacy. The article sheds light on the politics of watching and being watched in the era of technology-driven criminal justice reform.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号