首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   175篇
  免费   5篇
  180篇
  2024年   2篇
  2020年   5篇
  2019年   3篇
  2018年   3篇
  2017年   3篇
  2016年   10篇
  2015年   1篇
  2014年   4篇
  2013年   17篇
  2012年   11篇
  2011年   6篇
  2010年   5篇
  2009年   2篇
  2008年   10篇
  2007年   5篇
  2006年   3篇
  2005年   4篇
  2004年   8篇
  2003年   5篇
  2002年   3篇
  2001年   8篇
  2000年   4篇
  1999年   5篇
  1997年   1篇
  1995年   2篇
  1993年   1篇
  1992年   3篇
  1991年   3篇
  1989年   4篇
  1988年   3篇
  1987年   3篇
  1986年   2篇
  1985年   3篇
  1984年   1篇
  1983年   2篇
  1982年   1篇
  1980年   1篇
  1979年   1篇
  1978年   3篇
  1977年   1篇
  1976年   4篇
  1975年   3篇
  1973年   3篇
  1972年   1篇
  1971年   2篇
  1970年   2篇
  1969年   1篇
  1968年   1篇
  1967年   1篇
排序方式: 共有180条查询结果,搜索用时 15 毫秒
131.
Subjects were presented with a list of digits to alternate ears for serial recall. The list was followed by a suffix, a redundant acoustic event which did not have to be recalled. The suffix was presented either to one of the ears or binaurally. In all cases the suffix gave rise to a selective impairment of recall of the final items in the list. The results are interpreted as showing first that stimuli of the kind used are processed by simultaneously selecting both ears rather than by switching attention, and second that the site of the suffix effect is after the selection mechanism.  相似文献   
132.
It is proposed that many of the releasing or disinhibiting effects caused by models can be accounted for by information-processing mechanisms, without recourse to the concept of reinforcement. More specifically, it is suggested that the process of viewing a model's behavior involves the activation of an interpretive schema. This renders the information the schema incorporates more accessible for subsequent use. If the schema incorporates (or is closely related to) behavior-specifying information, that information becomes more accessible as well, thus making it more likely to influence overt behavior. Two studies are reported that assessed the plausibility of this reasoning. In Experiment 1 subjects who had viewed an aggressive model perceived greater hostility in the behavior of an ambiguous stimulus person that they subsequently encountered than did control subjects. This finding is consistent with the assumption that the model's behavior activated a conceptual schema for use in interpretation. In Experiment 2 subjects in whom an aggressive schema had been activated under a guise displayed greater aggression in their subsequent behavior in a different context than did control subjects. This finding is consistent with the assumption that activating the conceptual schema also activated behavioral information. The discussion centers on the implications of the findings.  相似文献   
133.
CASPER is a psychometrics software package suitable for instructional and research applications with IBM-PC-compatible computers. CASPER lets the user simulate or directly enter psychometric data. Numerous statistical analyses, file handling procedures, and graphics are included Analyses include factor analysis, multiple regression, correlation/partial correlation, moments analysis, reliability analysis, and item analysis.  相似文献   
134.
It is argued that lateral masking is a composite of several processes. These processes include response competition, distribution of attention, perceptual grouping, and feature (contour) interaction. Three experiments were carried out in an attempt to isolate some of the components. In the first two experiments, it was shown that feature interaction dominates at close spacing but other processes dominate at wider spacing. The third experiment showed that at least part of the effect of perceptual grouping appears to be information provided about target location.  相似文献   
135.
The prevalence of domestic violence in a sample of 33 men and 33 women currently or previously in same-sex relationships was assessed. Data were collected through a mail survey in the state of Virginia. Of 1000 surveys sent out 66 usable ones were returned (response rate = 6.6%). Analysis indicated that 34 had experienced some form of domestic violence, but significant differences between male and female respondents were not detected. When data from this same-sex sample were compared with those of the heterosexual sample of the National Violence Against Women Survey, intimate partner assault may be more prevalent against gay men than against heterosexual men, but there was no significant difference between lesbians and heterosexual females.  相似文献   
136.
In this study, we sought to provide empirical data on the utility of the Personality Assessment Inventory (PAI; Morey, 1991) for the assessment of male batterers. The sample consisted of 93 men who were court mandated to treatment. In the study, we were able to replicate 2 of 3 clusters (borderline/dysphoric and nonelevated) commonly found in the literature on male batterers; however, we only partially replicated the 3rd cluster (antisocial/narcissistic). This new finding may reflect a difference in the assessment instrument used to assess male batterers (i.e., PAI). In this study, we also investigated a previously understudied subgroup of batterers, specifically, men who engage in positive impression management. In this study, we conclude that the PAI is a potentially useful instrument in assessing male batterers and provide suggestions for future research.  相似文献   
137.
It's narrative all the way down   总被引:1,自引:0,他引:1  
  相似文献   
138.
People have more information about themselves than others do, and this fundamental asymmetry can help to explain why individuals have difficulty accurately intuiting how they appear to other people. Determining how one appears to observers requires one to utilize public information that is available to observers, but to disregard private information that they do not possess. We report a series of experiments, however, showing that people utilize privately known information about their own past performance (Experiments 1 and 2), the performance of other people (Experiment 3), and imaginary performance (Experiment 4) when intuiting how they are viewed by others. This tendency can help explain why people's beliefs about how they are judged by others often diverge from how they are actually judged.  相似文献   
139.
Contour interaction as a function of retinal eccentricity   总被引:1,自引:0,他引:1  
  相似文献   
140.
Human morality may be thought of as a negative feedback control system in which moral rules are reference values, and moral disapproval, blame, and punishment are forms of negative feedback given for violations of the moral rules. In such a system, if moral agents held each other accountable, moral norms would be enforced effectively. However, even a properly functioning social negative feedback system could not explain acts in which individual agents uphold moral rules in the face of contrary social pressure. Dr. Frances Kelsey, who withheld FDA approval for thalidomide against intense social pressure, is an example of the degree of individual moral autonomy possible in a hostile environment. Such extreme moral autonomy is possible only if there is internal, psychological negative feedback, in addition to external, social feedback. Such a cybernetic model of morality and moral autonomy is consistent with certain aspects of classical ethical theories.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号