首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   21597篇
  免费   118篇
  21715篇
  2023年   11篇
  2022年   19篇
  2021年   24篇
  2020年   54篇
  2019年   53篇
  2018年   3532篇
  2017年   2859篇
  2016年   2315篇
  2015年   253篇
  2014年   142篇
  2013年   242篇
  2012年   668篇
  2011年   2452篇
  2010年   2565篇
  2009年   1529篇
  2008年   1770篇
  2007年   2212篇
  2006年   56篇
  2005年   241篇
  2004年   217篇
  2003年   140篇
  2002年   85篇
  2001年   43篇
  2000年   62篇
  1999年   21篇
  1998年   28篇
  1997年   21篇
  1996年   10篇
  1995年   2篇
  1994年   5篇
  1993年   5篇
  1992年   3篇
  1991年   4篇
  1990年   11篇
  1989年   2篇
  1988年   4篇
  1987年   2篇
  1986年   2篇
  1984年   2篇
  1983年   2篇
  1982年   4篇
  1981年   3篇
  1980年   5篇
  1979年   3篇
  1978年   3篇
  1976年   10篇
  1975年   2篇
  1974年   4篇
  1973年   3篇
  1966年   2篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
91.
92.
93.
94.
95.
96.
Cognitive biases and cognitive distortions have been implicated as important factors in the development and maintenance of many disorders. The concept of thought-shape fusion (TSF) in eating disorders was developed by Shafran, Teachman, Kerry, and Rachman (British Journal of Clinical Psychology 38 (1999) 167) as a variant of thought-action fusion, described by Shafran, Thordarson and Rachman (Journal of Anxiety Disorders 10 (1996) 379). TSF occurs when thinking about eating certain types of food increases a person's estimate of their shape and/or weight, elicits a perception of moral wrongdoing, and/or makes the person feel fat. Shafran et al. (1999) examined both the psychometric and experimental properties of TSF in an undergraduate sample. This paper reports an extension of this work to a clinical group (N=20) of patients with anorexia nervosa. After completing a set of relevant questionnaires, participants were asked to think about a food which they considered extremely fattening. They were then asked to write out the sentence, "I am eating--.", inserting the name of the fattening food in the blank. After being asked to rate their anxiety, guilt, feelings about their weight, morality, etc., participants were given the opportunity to neutralize their statement in any way they chose. The majority of the participants neutralized in ways consistent with the findings of Shafran et al. (1999). The results are discussed in terms of cognitive-behavioural formulations of eating disorders, and of the influence of cognitive biases and cognitive distortions on the processing of information relevant to food, weight and shape in anorexia nervosa.  相似文献   
97.
In the first part of this paper we review evidence suggesting that there exists a mechanism that selects input on the basis of its similarity to the required action. This response-based input selection differs from the more established space- and object-based input selection in that it is not constrained by the structure of the input. Our evidence suggests that the two-choice Stroop effect is caused by this response-based selection mechanism. By contrast, it is known that the flanker effect is determined by the space- and object- based selection mechanisms. We explore whether the conflict resolution of the Stroop and flanker tasks is different as well by embedding these two tasks in a PRP (Psychological Refractory Period) paradigm. We show that the Stroop and the PRP effects are additive whereas the flanker and the PRP effects are underadditive, suggesting that the processes in charge of the conflict resolution in the Stroop and the flanker tasks are indeed different. We discuss possible reasons for this difference, and discuss possible ways in which the response-based mechanism can be implemented in information processing models.  相似文献   
98.
As the population of older adults continues to rise, psychologists along with other behavioral and social scientists have shown increasing interest in this age group. Although behavior analysts have contributed to research on aging, the focus has been on applications that remedy age-related deficits, rather than a concern with aging as a developmental process. In particular, there has been little interest in the central theoretical questions that have guided gerontologists. How does behavior change with advancing years, and what are the sources of those changes? We consider the possibility that this neglect reflects the long-standing commitment of behavior analysts to variables that can be experimentally manipulated, a requirement that excludes the key variable—age itself. We review the options available to researchers and present strategies that minimize deviations from the traditional features of behavior-analytic designs. Our comments are predicated on the view that aging issues within contemporary society are far too important for behavior analysts to ignore.  相似文献   
99.
Confirmatory factor analysis and regression analyses of the Beavers Interactional Scales did not appear to support the model offered by its developers, namely, several specified family attributes contributing respectively to two global factors of Family Competence and Family Style. Moreover, regression analysis indicated that only three of 12 items predicted raters' assessments of Global Family Health, and one of seven items predicted Global Family Style. Individuals interested in the family dynamic centripetal/centrifugal might best think of that as a unitary entity and rate it accordingly.  相似文献   
100.
Conclusion Robert Heinlein, author of Stranger in a Strange Land as well as countless other science fiction stories, once claimed that "The sole thing achieved by any privacy law is to make the bugs smaller." Heinlein may be correct, but that travesties will happen does not sanction them—and maybe we will invent bugs to root out and foil other bugs. I have argued for individual privacy rights or rights to control sensitive personal information. The explosion of digital technology has made possible severe violations of individual privacy by corporations, news agencies, and the government. If I am correct about all of this, one commonly used "public interest" argument given for limiting privacy rights has been undermined. It is also far from true to claim that the prevalence of strong encryption technology will lead to disaster. While I do not adhere to the view that "rights hold, though the heavens may fall," in this article I have maintained that the security arguments of law enforcement do not come close to meeting the threshold for violating privacy rights. The heavens are far from falling. He is the author of, "Employee Monitoring and Computer Technology" (forthcoming in Business Ethics Quarterly), "Intangible Property: Privacy, Power, and Information Control," American Philosophical Quarterly 35 (October 1998) and is the editor of Intellectual Property: Moral, Legal, and International Dilemmas (Lanham, MD: Rowman & Littlefield, 1997), in which he contributes "Introduction to Intellectual Property" and "Toward A Lockean Theory of Intellectual Property."  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号