首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   85篇
  免费   21篇
  2023年   1篇
  2022年   2篇
  2020年   1篇
  2019年   3篇
  2018年   3篇
  2017年   3篇
  2016年   5篇
  2015年   4篇
  2014年   4篇
  2013年   13篇
  2012年   7篇
  2011年   5篇
  2010年   7篇
  2009年   1篇
  2008年   4篇
  2007年   1篇
  2006年   2篇
  2005年   5篇
  2004年   3篇
  2003年   3篇
  2000年   1篇
  1999年   1篇
  1997年   1篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1988年   2篇
  1986年   1篇
  1985年   3篇
  1982年   2篇
  1981年   1篇
  1980年   3篇
  1978年   2篇
  1977年   1篇
  1976年   1篇
  1975年   1篇
  1973年   3篇
  1957年   1篇
排序方式: 共有106条查询结果,搜索用时 15 毫秒
81.
Baum and staddon disagree on the status of internal states in behavior analysis. Baum advocates molar behaviorism, treating behavior in temporally extended segments and so avoiding the need for internal states. Staddon argues that internal states merely represent the effects of different histories and that their use brings behavior analysis in line with the established sciences. The dispute is one form of the age‐old molar—molecular controversy that characterized Aristotle's disagreement with Plato. Both molar and molecular analyses have their place, but molar behaviorism may apply more naturally to a variety of phenomena, ranging from the matching law and avoidance learning to socalled “higher mental processes.” When molecular analysis involves internal states, as in Staddon's Theoretical Behaviorism (or New Behaviorism), misunderstanding will be inevitable and behaviorism will be seen as one more instance of the mediational theories in which psychology has long been mired. Such theories have long dominated the physical sciences, where their usefulness is indisputable, but psychology is far behind the physical sciences and nonmediational molar behaviorism better suits a discipline that lacks the methods and the data of the established sciences.  相似文献   
82.
83.
84.
First, a number of previous theories of intrinsic motivation are reviewed. Then, several studies of highly motivating computer games are described. These studies focus on what makes the games fun, not on what makes them educational. Finally, with this background, a rudimentary theory of intrinsically motivating instruction is developed, based on three categories: challenge, fantasy, and curiosity. Challenge is hypothesized to depend on goals with uncertain outcomes. Several ways of making outcomes uncertain are discussed, including variable difficulty level, multiple level goals, hidden information, and randomness. Fantasy is claimed to have both cognitive and emotional advantages in designing instructional environments. A distinction is made between extrinsic fantasies that depend only weakly on the skill used in a game, and intrinsic fantasies that are intimately related to the use of the skill. Curiosity is separated into sensory and cognitive components, and it is suggested that cognitive curiosity can be aroused by making learners believe their knowledge structures are incomplete, inconsistent, or unparsimonious.  相似文献   
85.
Two studies were conducted to investigate the role of social identity in appraisals of the purpose and acceptance of surveillance. In Study 1 (N = 112), a survey study demonstrated that there is a negative relationship between identification with one's city and the extent to which public closed circuit television (CCTV) surveillance is perceived as an invasion of privacy. This relationship was mediated by perceptions that the purpose of surveillance is to ensure safety. Study 2 (N = 139) manipulated identity salience at the sub‐group and superordinate level and the source of surveillance. Results demonstrated that surveillance originating from fellow sub‐group members was perceived as less privacy invading than surveillance originating from the superordinate group, but only when that sub‐group identity was salient. No differences in perceptions of privacy invasion were found when the more inclusive identity was made salient. We argue that whether surveillance is perceived as an invasion of privacy depends on the perceived social relationship with the source of the surveillance—surveillance is perceived as more acceptable when it originates from a group with which one identifies or shares an identity. Practical implications are discussed. Copyright © 2009 John Wiley & Sons, Ltd. This article was published online on 25 February 2009. An error was subsequently identified. This notice is included in the online and print versions to indicate that both have been corrected 12 January 2010.  相似文献   
86.
The present study investigates how attendees at national celebratory crowd events—specifically St. Patrick's Day parades—understand the role of such events in representing and uniting the national community. We conducted semi‐structured interviews with people who attended St. Patrick's Day parades in either Dublin or Belfast. In year 1, full‐length interviews were conducted before and after the events (N = 17), and in years 1 and 2, shorter interviews were conducted during the events (year 1 N = 170; year 2 N = 142). Interview data were analysed using thematic analysis, allowing the identification of three broad themes. Participants reported that (i) the events extend the boundary of the national group, using participation to define who counts as Irish; (ii) the events strategically represent the nature of the national group, maximising positive images and managing stereotypical representations; and (iii) symbolism serves to unify the group but can also disrupt already fragile unity and so must be managed. Overall, this points to a strategic identity dimension to these crowd events. We discuss the implications of these findings for future research in terms of the role of large‐scale celebratory events in the strategic representation of everyday social identities. © 2015 The Authors. Journal of Community & Applied Social Psychology published by John Wiley & Sons Ltd.  相似文献   
87.
We investigated whether bidirectional associations between parental warmth and behavioral control and child aggression and rule-breaking behavior emerged in 12 cultural groups. Study participants included 1,298 children (M = 8.29 years, standard deviation [SD] = 0.66, 51% girls) from Shanghai, China (n = 121); Medellín, Colombia (n = 108); Naples (n = 100) and Rome (n = 103), Italy; Zarqa, Jordan (n = 114); Kisumu, Kenya (n = 100); Manila, Philippines (n = 120); Trollhättan/Vänersborg, Sweden (n = 101); Chiang Mai, Thailand (n = 120); and Durham, NC, United States (n = 111 White, n = 103 Black, n = 97 Latino) followed over 5 years (i.e., ages 8–13). Warmth and control were measured using the Parental Acceptance-Rejection/Control Questionnaire, child aggression and rule-breaking were measured using the Achenbach System of Empirically-Based Assessment. Multiple-group structural equation modeling was conducted. Associations between parent warmth and subsequent rule-breaking behavior were found to be more common across ontogeny and demonstrate greater variability across different cultures than associations between warmth and subsequent aggressive behavior. In contrast, the evocative effects of child aggressive behavior on subsequent parent warmth and behavioral control were more common, especially before age 10, than those of rule-breaking behavior. Considering the type of externalizing behavior, developmental time point, and cultural context is essential to understanding how parenting and child behavior reciprocally affect one another.  相似文献   
88.
89.
Recognition memory for spoken words is influenced by phonetic resemblance between test words and items presented during study. Presentation of derived nonwords (e.g., /d/ransparent or transparen/d/) on a study list produces a higher than normal false recognition rate to base words (e.g., transparent). Test words that share beginning phonemes with studied nonwords have more false recognitions than do those that share ending phonemes. The latter difference has been attributed to familiarity resulting from prerecognition processing of spoken stimuli. As a listener hears/traens/, "transparent" may be activated as a potential solution. In the present experiments, we minimized contributions of postrecognition processing to this phenomenon by presenting a semantically unrelated test word (transportation) that was also expected to be activated during prerecognition stages of processing. The results indicated that false recognition was increased for words presumed to be activated only during prerecognition processing. Remember (R) and know (K) judgments revealed that the majority of studied words were R, and the majority of false recognitions were K. The lowest proportion of R judgments occurred for test words that were not activated during postrecognition processing (e.g., transportation and control words).  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号