首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   670篇
  免费   0篇
  国内免费   6篇
教育   375篇
科学研究   76篇
各国文化   54篇
体育   22篇
综合类   8篇
文化理论   19篇
信息传播   122篇
  2023年   5篇
  2022年   2篇
  2021年   12篇
  2020年   39篇
  2019年   21篇
  2018年   28篇
  2017年   32篇
  2016年   23篇
  2015年   20篇
  2014年   34篇
  2013年   163篇
  2012年   47篇
  2011年   43篇
  2010年   38篇
  2009年   36篇
  2008年   35篇
  2007年   32篇
  2006年   19篇
  2005年   13篇
  2004年   10篇
  2003年   8篇
  2002年   3篇
  2001年   1篇
  2000年   3篇
  1999年   3篇
  1998年   1篇
  1997年   2篇
  1996年   2篇
  1994年   1篇
排序方式: 共有676条查询结果,搜索用时 31 毫秒
51.
Abstract

This essay examines post-migration identity of the Montagnard men who came to the United States as refugees. In particular, given the salience of home to identity, interview participants' notions of home space are explored. Findings are discussed first in terms of emotional, relational, sociocultural and political significance of home spaces that were identified by the participants. Then, the articulations of home are discussed in terms of implications they have for the current post-migration theories of cross-cultural adaptation and diaspora. The Montagnard men's experiences with and views of home shed light on applicability and limitations of the theories.  相似文献   
52.
Abstract

This essay examines the relationship between globalization and the diasporic movements of cultural groups as manifested in their communication practices of identity. I argue that diasporic groups dynamically reconstitute their understandings of cultural tradition, authenticity, and identity in line with their diasporic contexts and experiences. I frame my argument around two different diasporic Pacific Islander groups Tongans and Hawaiians—each situated in a particular kind of diasporic/global movement with specific historical, political, and economic dimensions. Qualitative in-depth interviews were conducted with each of these groups in this study.  相似文献   
53.
Abstract

In light of identity management theory (IMT), this research seeks to uncover the stages and transitions that explain the process of relational identity formation within intercultural friendships. Three stages (i.e., initial encounter, interaction, and involvement) and two transition phases emerged within the intercultural friendships of this research. This study concludes that while IMT contributes to our understanding of the process of intercultural relationship formation, it overlooks how intercultural relationships transition from one stage to another and the influences of networks and a third cultural context.  相似文献   
54.
We investigate in the context of crowdsourcing how seekers can increase open innovation performance, measured as received solver attention, by making two strategic decisions: selecting innovation tasks that are well suited for crowdsourcing and choosing between the potentials of status signalling through identity disclosure versus enjoying the benefits of anonymity. Drawing on uncertainty reduction theory, we suggest that a well-articulated problem statement reduces uncertainties of potential solvers and increases their willingness to participate. We argue that the ability of seekers to draft high-quality problem statements depends on the distance between the problem domain and their current knowledge stock. An analysis of 637 crowdsourcing projects finds that problem-seeker knowledge distance and received solver attention are curvilinear related such that moderate levels of knowledge distance maximize solver participation. However, high-status seekers who engage in identity-based status signalling are able to benefit from crowdsourcing across all levels of problem-seeker knowledge distance.  相似文献   
55.
Ethnic identity (EI) has long been known to supersede race as a predictor for attitudes and behaviors. However, little is known about the constituent parts that comprise and influence ethnic identity. In order to improve communications that target EI, we examine both demographic and communication variables to determine which have a greater pull on people’s attitudes and actions. Race appears to moderate the effects of age on ethnic identity, whereby age was negatively related to ethnic-identity exploration among White participants and positively related to ethnic identity commitment among Black participants (< .05). Having a higher income, print-media use, and information-engagement orientation were also positively correlated with ethnic identity; education and gender were not. Implications and future directions are discussed.  相似文献   
56.
介绍了CallCenter系统用户识别模块的识别原理、号码提取和地区识别原理及实现,实现了来电用户识别、分类和资料归档功能,为CallCenter系统的座席资源分配提供了参考依据,提高了CallCenter系统的客户响应效率。  相似文献   
57.
Abstract This study focuses on the effect of doctoral and postdoctoral studies at leading research universities in the USA on constructing the academic identity of Israeli students. The findings are based on constant comparative analysis of semi-structured interviews with 27 Fulbright alumni. The results show that while American scientific standards become a model for the Israeli scientists, Israeli culture and identity become much more evident, for better or worse. Several ways of handling these identities were recognized and include: the intertwine method, ordering, and buffering. Further theoretical and practical implications are discussed.  相似文献   
58.
在互联网技术飞速发展的今天,网络已成为青少年人际交往的重要平台.网络聊天作为青少年网络交往的重要途径有其自身特点.本文以前人的研究成果为基础,结合对三个青少年网络聊天室的跟踪观察,从技术环境、交流媒介、人际互动、社会心理等方面分析了青少年网络聊天的特点,以期探讨网络聊天对青少年心理发展的具体影响.  相似文献   
59.
公共关系作为一种管理艺术,在大型企业中已经得到了充分的运用,发挥着重要的作用,而中小企业由于缺乏公共关系知识,对公共关系重视不够,在管理中不能科学有效地运用公共关系,使中小企业在市场竞争中面临的困难越来越多。本文在对中小企业公共关系现状进行分析的基础上提出了改进的对策。  相似文献   
60.
This paper presents a systematic approach to develop a resilient software system which can be developed as emerging services and analytics for resiliency. While using the resiliency as a good example for enterprise cloud security, all resilient characteristics should be blended together to produce greater impacts. A framework, cloud computing adoption framework (CCAF), is presented in details. CCAF has four major types of emerging services and each one has been explained in details with regard to the individual function and how each one can be integrated. CCAF is an architectural framework that blends software resilience, service components and guidelines together and provides real case studies to produce greater impacts to the organizations adopting cloud computing and security. CCAF provides business alignments and provides agility, efficiency and integration for business competitive edge. In order to validate user requirements and system designs, a large scale survey has been conducted with detailed analysis provided for each major question. We present our discussion and conclude that the use of CCAF framework can illustrate software resilience and security improvement for enterprise security. CCAF framework itself is validated as an emerging service for enterprise cloud computing with analytics showing survey analysis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号