首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5194篇
  免费   201篇
  国内免费   61篇
管理学   522篇
劳动科学   1篇
民族学   42篇
人口学   233篇
丛书文集   552篇
理论方法论   383篇
综合类   3083篇
社会学   405篇
统计学   235篇
  2024年   11篇
  2023年   47篇
  2022年   43篇
  2021年   75篇
  2020年   96篇
  2019年   72篇
  2018年   79篇
  2017年   102篇
  2016年   138篇
  2015年   145篇
  2014年   277篇
  2013年   375篇
  2012年   331篇
  2011年   382篇
  2010年   291篇
  2009年   339篇
  2008年   315篇
  2007年   361篇
  2006年   408篇
  2005年   320篇
  2004年   288篇
  2003年   244篇
  2002年   182篇
  2001年   148篇
  2000年   109篇
  1999年   58篇
  1998年   21篇
  1997年   20篇
  1996年   12篇
  1995年   8篇
  1994年   11篇
  1993年   14篇
  1992年   23篇
  1991年   19篇
  1990年   9篇
  1989年   9篇
  1988年   9篇
  1987年   7篇
  1986年   8篇
  1985年   6篇
  1984年   6篇
  1983年   13篇
  1982年   5篇
  1981年   8篇
  1980年   4篇
  1979年   3篇
  1978年   4篇
  1977年   1篇
排序方式: 共有5456条查询结果,搜索用时 15 毫秒
1.
AimVaginal birth after caesarean (VBAC) is a relatively safe alternative to repeat caesarean birth in the proper context. This important decision to undergo an elective caesarean versus VBAC is ultimately a decision of the mother. The purpose of our study was to assess the quality of online information in relation to VBAC collected using the most common search engine: Google.MethodsThe 10 most common hit sites for the keywords “VBAC” and “Vaginal birth after caesarean” were evaluated using the search engine Google. The quality of websites was rated based on the Silberg scale for accountability, the modified Abbott's criteria for presentation and the SMOG index for readability. The content of each website was compared to the Society of Obstetricians and Gynecologists of Canada (SOGC) guidelines for VBAC.Findings13 out of 20 identified websites met the adequate criteria for accountability, with 85% of the websites indicating authorship. 11 websites were deemed aesthetically agreeable. The target audience, assessed by the readability score, was notably above the non-medical population with an average SMOG index score of 14.75. Only half of the websites contained recommendations, as detailed by the SOGC guidelines.ConclusionAlmost all sites target a higher academic level, making it beyond the comprehension of the general population. Woman friendly web-assessment tools should be provided to enable pregnant women to take an active role in their decision making.  相似文献   
2.
ABSTRACT

In this article responsibilisation in social work is studied by analysing two Finnish state-level policy documents (called final report and research report) which concern a current activation initiative called inclusive social security (ISS). It is asked how social workers and clients are constructed as responsible subjects in these documents. Responsibilisation refers to the advanced liberal mode of governmentality, which aims to strengthen citizens’ abilities to self-governance through various techniques that include the intertwined elements of surveillance and empowerment. It is demonstrated that the policy documents construct the social workers’ and the clients’ responsibilities partly in different ways. The final report leads activation to be based on shared responsibility and social work to be more community-based, whereas the research report strengthens more individual-based responsibility of clients and social workers. For the clients, the interpretation of ISS based on shared responsibility would probably be less stigmatising and paternalistic than the one based on individual responsibilities, i.e. approaching long-term unemployed citizens as being personally ‘at risk’ and thus a justified target group of individualised techniques for activation. For social workers and clients, future activation appears to be a wide mix of different techniques, moral expectations and possible ways of being a responsible subject.  相似文献   
3.
互联网作为信息搜寻和传播的重要渠道,有利于缓解国际市场不确定性对企业出口决策的影响,从而有助于稳定企业出口预期,保障出口企业的持续生存。本文首先基于Fernandes 和 Tang(2014)的研究框架将互联网深化程度和出口集聚同时纳入到异质性贸易企业模型,在剥离出口集聚对企业出口行为影响的基础上,从理论视角揭示了互联网深化程度提高影响企业出口行为特别是出口持续生存的内在机理与方向。研究发现,不同于出口集聚会同时影响企业的需求冲击和成本冲击,互联网深化带来的信息溢出效应会通过贝叶斯法则(Bayesian Rule)使得企业修正其对国际市场不确定性的预期,提高其对目的国市场成本冲击的估计精度,从而在互联网深化程度较高的城市,企业进入出口市场的临界生产率较低,有利于其出口参与度和出口稳定性的提高。然而互联网深化程度提高不影响企业在目的国市场产品出口的集约边际。本文使用2000-2013 年中国工业企业数据库、中国海关数据库和中国城市统计年鉴数据库的匹配数据从企业-目的国-产品层面实证检验了本文的理论命题。研究表明,我国政府应充分发挥互联网发展降低信息不确定性的微观机制,以推动外贸的平稳增长。  相似文献   
4.
China’s pension reform during the past three decades has allowed a majority of China’s population to be covered by a pension scheme. Of particular note has been the New Rural Pension Scheme (NRPS), a voluntary programme introduced starting in 2009. One goal of our analysis is to assess that pension scheme, using a variety of sources of information including data drawn from recent (2013 and 2015) nationwide China Health and Retirement Longitudinal Surveys (CHARLS). Our analysis involves an exploration of differences between the generosity and structure of the NRPS and other pension schemes currently in place. We also explore the feasibility of reforming the current “quasi-social pension” component of the NRPS by substituting a universal non-contributory social pension pillar. In connection with our assessment of the NRPS, we note the unusually low benefit levels for rural China.  相似文献   
5.
We study interdependent risks in security, and shed light on the economic and policy implications of increasing security interdependence in presence of reactive attackers. We investigate the impact of potential public policy arrangements on the security of a group of interdependent organizations, namely, airports. Focusing on security expenditures and costs to society, as assessed by a social planner, to individual airports and to attackers, we first develop a game-theoretic framework, and derive explicit Nash equilibrium and socially optimal solutions in the airports network. We then conduct numerical experiments mirroring real-world cyber scenarios, to assess how a change in interdependence impact the airports' security expenditures, the overall expected costs to society, and the fairness of security financing. Our study provides insights on the economic and policy implications for the United States, Europe, and Asia.  相似文献   
6.
《Risk analysis》2018,38(8):1559-1575
Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game‐theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost‐effective decisions than selfish nonrational or semirational players.  相似文献   
7.
The literature on urban farming in Sub-Saharan African cities reveals that most studies have been conducted in Eastern, Southern and Central African cities. A few have focused on West Africa, including Sierra Leone, Guinea Bissau, and Cameroon. In Ghana there is a paucity of information on urban farming. The purpose of this paper is to examine the status of urban cultivation in Accra, Ghana's capital, reviewing existing research, and to present new empirical findings on urban cultivation emphasizing on its history, nature, practices, problems, potentials and urban planning implications.  相似文献   
8.
The seriousness of computer hacking is not exaggerated, it is far worse than that. The computer hacker has attained the status of myth; society associates all computer crime with a mythical perpetrator that bears no resemblance to reality. This paper will argue that in the early stages of the myth the computer hacker was regarded as a highly skilled but mentally disturbed youth who has an unhealthy association with computers. The new reality of electronic commerce resulted in pressures that culminated in the computer hacker becoming regarded as a dangerous criminal. A thorough analysis of the statistics will demonstrate that the majority of computer intruders are neither dangerous nor highly skilled, and thus nothing like the mythical hacker.  相似文献   
9.
新疆与中亚跨国民族问题对我国安全的影响   总被引:3,自引:0,他引:3  
近年来,随着中亚国家的独立,以及由此而引发的各民族政治、经济生活地位的起伏和民族关系的变化,使新疆与中亚跨国民族问题表现得异常突出,其表现形式主要有三:一是民族意识增长;二是以哈萨克族为主的跨国民族向境外移民问题;三是民族分立主义倾向.它对我国的军事安全、政治安全和文化安全构成了程度不同的威胁.  相似文献   
10.
试析中东国家的非传统安全挑战   总被引:3,自引:0,他引:3  
目前,非传统安全问题越来越成为国际政治研究的热点问题之一。对中东地区来说,由于宗教、历史、民族等方面的原因,中东国家的内外矛盾和冲突一直十分复杂,面对的非传统安全挑战也就显得越发突出和激烈。21世纪,中东国家的安全战略必须兼顾传统和非传统两类安全挑战,特别应从战略高度增加投入,积极应对迅速增大的非传统安全挑战。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号