首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   757篇
  免费   14篇
管理学   29篇
民族学   56篇
人口学   41篇
丛书文集   105篇
理论方法论   38篇
综合类   229篇
社会学   250篇
统计学   23篇
  2024年   1篇
  2023年   3篇
  2022年   9篇
  2021年   7篇
  2020年   22篇
  2019年   16篇
  2018年   21篇
  2017年   21篇
  2016年   21篇
  2015年   22篇
  2014年   49篇
  2013年   144篇
  2012年   72篇
  2011年   70篇
  2010年   41篇
  2009年   34篇
  2008年   37篇
  2007年   36篇
  2006年   35篇
  2005年   28篇
  2004年   24篇
  2003年   14篇
  2002年   14篇
  2001年   9篇
  2000年   9篇
  1999年   5篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1994年   1篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
排序方式: 共有771条查询结果,搜索用时 562 毫秒
1.
This article discusses the socio-cultural dynamics that interact with ethno-racial identity experiencing in a previously under-researched group. A qualitative interdisciplinary study with 40 Native American academics from 28 mainstream universities across the U.S. served as a case example with findings that contrasted with historically influential theoretical frameworks postulating identity confusion and conflicts at the intersection of one’s mainstream education and profession versus one’s ethno-racial community grounding. Instead of feeling pressure to identify with only one worldview, the contextual, dynamic identities associated with the inclusive and flexible self-concept of tribal participants allowed them to in turn take advantage of two divergent cultural meaning systems pertaining to their distinct socio-cultural contexts. These shifts were experienced as not endogenous but rather exogenous variables, which did not cause the historically theorized issues. Participants felt their tribal identities instead facilitated meaningful integration of the existing incongruences, which resulted in unexpectedly resilient subjective experiencing.  相似文献   
2.
The seriousness of computer hacking is not exaggerated, it is far worse than that. The computer hacker has attained the status of myth; society associates all computer crime with a mythical perpetrator that bears no resemblance to reality. This paper will argue that in the early stages of the myth the computer hacker was regarded as a highly skilled but mentally disturbed youth who has an unhealthy association with computers. The new reality of electronic commerce resulted in pressures that culminated in the computer hacker becoming regarded as a dangerous criminal. A thorough analysis of the statistics will demonstrate that the majority of computer intruders are neither dangerous nor highly skilled, and thus nothing like the mythical hacker.  相似文献   
3.
统计调查课程的现状与调整思路   总被引:1,自引:0,他引:1  
文章从统计调查课程设置的现状出发,介绍了当前随着社会经济的发展和统计调查方法体系的改革,统计调查理论体系以及统计调查课程设置的不足,叙述了统计调查课程调整的思路。要实施这个思路,必须重视统计调查对象内容的变化,并注重借鉴国外成熟的经验。为适应形势的发展,随着现行统计调查方法体系的调整与完善,对统计调查课程也要作相应的调整。  相似文献   
4.
价值多元化视阈下大学生核心价值认同危机与重构   总被引:2,自引:0,他引:2  
中国社会正处于一个急剧转型时期,人们的生活方式发生了极大变化,出现了许多认同危机,特别是核心价值认同危机。然而,核心价值认同是关系到社会安定和发展的一个重要的心理和文化因素。大学生是推动社会前进的重要力量和潜在力量,因此,考察大学生核心价值认同危机的表现形式,分析产生核心价值认同危机的原因,提出以社会主义核心价值体系重塑大学生价值认同对构建社会主义和谐社会具有重要的现实意义。  相似文献   
5.
Many observers doubt the capacity of digital media to change the political game. The rise of a transnational activism that is aimed beyond states and directly at corporations, trade and development regimes offers a fruitful area for understanding how communication practices can help create a new politics. The Internet is implicated in the new global activism far beyond merely reducing the costs of communication, or transcending the geographical and temporal barriers associated with other communication media. Various uses of the Internet and digital media facilitate the loosely structured networks, the weak identity ties, and the patterns of issue and demonstration organizing that define a new global protest politics. Analysis of various cases shows how digital network configurations can facilitate: permanent campaigns; the growth of broad networks despite relatively weak social identity and ideology ties; transformation of individual member organizations and whole networks; and the capacity to communicate messages from desktops to television screens. The same qualities that make these communication-based politics durable also make them vulnerable to problems of control, decision-making and collective identity.  相似文献   
6.
文学是人类存在的家园,解读文本是文艺学方法论的核心.中西方文艺学方法论的同一性即以社会和历史为视角,破译语言的能指和所指,考察读者的接受;民族性即中国重整体审美与感悟,西方重客观分析与体系建构;当代性则是多元性与开放性.马克思主义文艺学就是在这种格局中获得新的更大的发展.  相似文献   
7.
We propose that diversity in social relations measured by network diversity and cross-race/cross-gender contacts affords job seekers higher contact status that in turn brings better status attainment outcomes. Controlling for traditional strength of tie measures and other confounders, the empirical study confirms that (1) network diversity in race and gender are significantly associated with actual utilization of cross-race/cross-gender contacts in job search, (2) use of cross-race/cross-gender contacts is significantly related to higher contact status for nonwhite and female job seekers, but (3) contact status (activated social capital) partially provides jobs of higher SEI scores for white job seekers. Similarly, male job seekers obtain better jobs through female contacts, but the same does not apply to female job seekers. These findings show relative return deficits of social capital experienced by racial minorities and females even when they exert extra effort to obtain heterogeneous social relations and contacts.  相似文献   
8.
I propose a lens model for understanding how core identities (ethnic, sectarian, racial or national) are affected by past interactions and narratives increasing the chances of the outbreak of violent conflict. The model can be used to show how core identities are polarized during conflict escalation and how they might de-polarize during periods of de-escalation and conflict resolution, leading to potential transformation of core identities in post-conflict situations. Northern Ireland will be used to illustrate the Integrated Relational Identity Structure model, showing how conflicting identities have changed, or not, as a result of history, the conflict and the peace process.  相似文献   
9.
We examine a key modified labeling theory proposition—that a psychiatric label increases vulnerability to competence-based criticism and rejection—within task- and collectively oriented dyads comprised of same-sex individuals with equivalent education. Drawing on empirical work that approximates these conditions, we expect the proposition to hold only among men. We also expect education, operationalized with college class standing, to moderate the effects of gender by reducing men’s and increasing women’s criticism and rejection. But, we also expect the effect of education to weaken when men work with a psychiatric patient. As predicted, men reject suggestions from teammates with a psychiatric history more frequently than they reject suggestions from other teammates, while women’s resistance to influence is unaffected by their teammate’s psychiatric status. Men also rate psychiatric patient teammates as less powerful but no lower in status than other teammates, while women’s teammate assessments are unaffected by their teammate’s psychiatric status. Also as predicted, education reduces men’s resistance to influence when their teammate has no psychiatric history. Education also increases men’s ratings of their teammate’s power, as predicted, but has no effect on women’s resistance to influence or teammate ratings. We discuss the implications of these findings for the modified labeling theory of mental illness and status characteristics theory.  相似文献   
10.
For a continuous random variable X with support equal to (a, b), with c.d.f. F, and g: Ω1 → Ω2 a continuous, strictly increasing function, such that Ω1∩Ω2?(a, b), but otherwise arbitrary, we establish that the random variables F(X) ? F(g(X)) and F(g? 1(X)) ? F(X) have the same distribution. Further developments, accompanied by illustrations and observations, address as well the equidistribution identity U ? ψ(U) = dψ? 1(U) ? U for UU(0, 1), where ψ is a continuous, strictly increasing and onto function, but otherwise arbitrary. Finally, we expand on applications with connections to variance reduction techniques, the discrepancy between distributions, and a risk identity in predictive density estimation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号