首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   181篇
  免费   0篇
教育   156篇
科学研究   11篇
体育   4篇
信息传播   10篇
  2019年   2篇
  2018年   2篇
  2017年   7篇
  2014年   4篇
  2013年   33篇
  2012年   3篇
  2010年   4篇
  2009年   5篇
  2008年   3篇
  2007年   4篇
  2006年   2篇
  2005年   3篇
  2003年   3篇
  2002年   6篇
  2001年   2篇
  1999年   5篇
  1998年   2篇
  1997年   3篇
  1995年   9篇
  1994年   6篇
  1993年   4篇
  1992年   3篇
  1990年   5篇
  1989年   3篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   1篇
  1983年   3篇
  1982年   2篇
  1981年   3篇
  1980年   4篇
  1979年   1篇
  1978年   2篇
  1976年   2篇
  1975年   1篇
  1974年   3篇
  1973年   4篇
  1972年   6篇
  1971年   2篇
  1970年   1篇
  1968年   1篇
  1929年   1篇
  1927年   1篇
  1922年   1篇
  1921年   2篇
  1920年   1篇
  1890年   1篇
  1889年   1篇
  1880年   1篇
排序方式: 共有181条查询结果,搜索用时 15 毫秒
121.
122.
ABSTRACT

This experiment (N= 476) investigates how individuals evaluate political candidates who use informal communication on social media. We use expectancy violations theory (EVT) to predict that informal communication will lead to negative evaluations. Our results suggest that politicians’ use of informal communication on social media leads to expectancy violation, which decreases perceived credibility and lessens intention to support a candidate. This effect was not moderated by sex (male versus female) or age (young versus old) of the candidate, nor of participants being the same sex as the candidate. These findings suggest that political figures should use informal communication on social media with caution.  相似文献   
123.
Large-scale information technology implementations are risky projects, and the challenges and risks multiply when multiple organizations are involved, as is often the case in e-government initiatives. Some of the risk can be addressed by carefully aligning the partners' motivations, which are affected by each organization's internal and external operational and information technology strategies. In this paper, we propose a strategic alignment framework and use it to examine the motivations of a set of collaborating government agencies and businesses in the pilot implementation of the Internet Payment Platform, an interorganizational, third-party hosted, e-procurement system. As we predict, the partners in this study had varied technical, political, economic, and operational motivations for participating in the project. Even so, the participating agencies reported positive outcomes from the project, and look forward to further collaboration on the next iteration of this e-procurement system.  相似文献   
124.
This study examines the relationship between teachers' beliefs and their practices at Key Stage 2 (ages 7-11) in relation to the use of questioning. Data were collected from interviewing and observing Key Stage 2 teachers at four schools in the West of England. A Straussian approach to grounded theory is followed broadly in order to analyse the data. In contrast to the findings of previous studies, which suggested a mismatch between teachers' beliefs and practices in that teachers, in certain respects, do less than they claim, the research revealed that teachers use a variety of skills during their teaching that they may not always be aware of. It is also argued that teachers do not share researchers' language to express the way they teach.  相似文献   
125.
OBJECTIVE: To explore factors that facilitate the receipt of mental health treatment among juvenile crime victims. METHOD: Telephone interviews were conducted with a national sample of 157 caretakers whose children had suffered a serious sexual or physical assault in the previous year. RESULTS: Twenty-two percent of caretakers had thought about getting professional counseling for their child victims, and 20% of the child victims actually received it. But half of the families who thought about it did not follow through on their consideration. Moreover, nearly half of those victimized children who actually received counseling did so without their families reporting that they had considered it in advance. The level of symptoms and parent-child relationship factors were related to considering counseling which was in turn strongly related to actually getting counseling. Other factors were independently related to receiving counseling, such as the victimization occurring at school and the victim being perceived as at fault to some degree. Advice to get counseling and medical insurance also played roles. CONCLUSIONS: These findings suggested two pathways to counseling. One occurred via direct parental concern, and was associated with such variables as parental perceptions that the child was depressed or withdrawn or that the parent-child relationship had been negatively affected. The other pathway occurred independent of parental concern, most likely via school interventions, because this counseling was in conjunction with school victimizations.  相似文献   
126.
We used data gathered via investigative “RoundUp” software to measure a year of online child pornography (CP) trafficking activity by U.S. computers on the Gnutella peer-to-peer network. The data include millions of observations of Internet Protocol addresses sharing known CP files, identified as such in previous law enforcement investigations. We found that 244,920 U.S. computers shared 120,418 unique known CP files on Gnutella during the study year. More than 80% of these computers shared fewer than 10 such files during the study year or shared files for fewer than 10 days. However, less than 1% of computers (n = 915) made high annual contributions to the number of known CP files available on the network (100 or more files). If law enforcement arrested the operators of these high-contribution computers and took their files offline, the number of distinct known CP files available in the P2P network could be reduced by as much as 30%. Our findings indicate widespread low level CP trafficking by U.S. computers in one peer-to-peer network, while a small percentage of computers made high contributions to the problem. However, our measures were not comprehensive and should be considered lower bounds estimates. Nonetheless, our findings show that data can be systematically gathered and analyzed to develop an empirical grasp of the scope and characteristics of CP trafficking on peer-to-peer networks. Such measurements can be used to combat the problem. Further, investigative software tools can be used strategically to help law enforcement prioritize investigations.  相似文献   
127.
128.
Well before the full independence of Latvia and the dissolution of the Soviet Union, Latvia had begun to profoundly reform its national science system. Key events in the process were the foundation of the Latvian Union of Scientists in 1988 and the Latvian Council of Science in 1990. The next step was the radical reform of the Latvian Academy of Sciences such that it became an independent body of the classical academy type. By 1992, the Academy had adopted a new Charter and new Statutes. At the same time, the institutes which had been subordinated to the Academy became independent. In fact, many of the powers of the old Soviet‐style academy were assumed by the Council of Science and the Department of Science and Higher Education which was created within the Ministry of Education. The overall aim was to pattern Latvian science policy and its institutions on western European models.  相似文献   
129.
This paper explores the impact of a personal development planning (PDP) project on the attitudes, behaviour and understanding of students in Years 11 and 12. It examines levels of motivation, personal understanding, communication skills and the responsibility of the students with regard to their own learning at the beginning of the project and again after 6 months. Findings may be of interest to tutors involved in PDP, action planning and similar initiatives driven by the one‐to‐one dialogue.  相似文献   
130.
This article examines alternative ways of resolving an apparent paradox that has emerged from neuropsychological studies of language development: How can the developmentally stable functional asymmetry ("hemispheric specialization") observed in neurologically intact children be reconciled with the dramatic recovery of function often displayed following unilateral brain damage? The alternative resolutions we consider differ most critically in the roles they assign to lesion-induced neural reorganizations versus lesion-related release of preexisting functional potentials. Though arguments are given in favor of the latter as the primary factor in functional recovery, the primary goal of the article is to clarify the conceptual issues raised by recent empirical research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号