首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   187篇
  免费   14篇
  2023年   2篇
  2021年   2篇
  2020年   2篇
  2019年   4篇
  2018年   4篇
  2017年   5篇
  2016年   9篇
  2015年   7篇
  2014年   4篇
  2013年   35篇
  2012年   14篇
  2011年   2篇
  2009年   3篇
  2008年   5篇
  2007年   4篇
  2006年   8篇
  2005年   7篇
  2004年   8篇
  2003年   6篇
  2002年   3篇
  2001年   3篇
  1999年   4篇
  1998年   2篇
  1994年   1篇
  1992年   3篇
  1991年   2篇
  1989年   2篇
  1988年   2篇
  1987年   5篇
  1986年   3篇
  1984年   1篇
  1983年   6篇
  1982年   1篇
  1981年   2篇
  1980年   1篇
  1979年   2篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
  1974年   2篇
  1973年   1篇
  1971年   1篇
  1970年   5篇
  1969年   2篇
  1968年   1篇
  1967年   1篇
  1965年   2篇
  1963年   1篇
  1962年   1篇
  1946年   1篇
排序方式: 共有201条查询结果,搜索用时 15 毫秒
91.
92.
To better understand how parents react to their child’s trauma exposure and evaluate whether different reactions are related to different types of traumas, 120 parents (79.2% mothers, 18.3% fathers, 2.5% other caregivers) were asked about their emotional reactions related to their child’s self-reported worst trauma. Emotional reactions were assessed with the Parental Emotional Reactions Questionnaire (PERQ). Parents reported high levels of distress and guilt. Furthermore, there was a significant relationship between type of trauma and parents’ overall emotional reactions. Parental distress was equally endorsed among the different trauma groups. Parents of children who experienced intrafamilial violence and extrafamilial sexual abuse reported the highest levels of guilt, and child exposure to intrafamilial violence was associated with higher levels of parental shame.  相似文献   
93.
Academic research on prostitution focuses on the prostitute, rather than the clients, who are called johns. This limits our understanding of the methods and reasons individuals solicit sex. However, johns increasingly use computer mediated communications to discuss sex work. Their comments provide insight into the attitudes and methods of johns. This qualitative study utilizes a sample of posts from active Web forums for johns in 10 U.S. cities. The findings indicate the importance of on-line discussions for johns to identify and solicit sex workers, as well as manage external risks. Implications for law enforcement and deviance research are also discussed.  相似文献   
94.
Identity-based crimes are considered to be one of the most significant and growing problems of the last 20 years due to the significant economic harm these offenses pose for victims. The increased use and availability of personal information through on-line outlets has significantly increased the risk of identity-based fraud, although few have considered the factors that affect the likelihood of this type of victimization. This study utilizes a sample of students, faculty, and staff at a southeastern university to investigate the effects that protective factors possess on fostering resiliency against on-line identity theft. The findings suggest that protective software programs increase individual resiliency to victimization. The implications of this study for both resiliency models and cybercrime victimization are considered in detail.  相似文献   
95.
Computers and the Internet have become a vital part of modern life across the world, affecting communications, finance, and governance. At the same time, technology has created unparalleled opportunities for crime and deviance on- and off-line. Criminological research has expanded its focus over the last two decades to address the various forms of technology-enabled crime and the applicability of traditional theories to account for offending. There is, however, a need for careful consideration of the state of the field in order to identify issues requiring further study and analysis. This study examines the current literature on virtually all forms of cybercrime and the theoretical frameworks used to address these issues. In turn, we hope to give direction to refine our understanding of criminological theory and social policies to combat these offenses.  相似文献   
96.
Predicting the development of dynamic processes is vital in many areas of life. Previous findings are inconclusive as to whether higher working memory capacity (WMC) is always associated with using more accurate prediction strategies, or whether higher WMC can also be associated with using overly complex strategies that do not improve accuracy. In this study, participants predicted a range of systematically varied nonlinear processes based on exponential functions where prediction accuracy could or could not be enhanced using well-calibrated rules. Results indicate that higher WMC participants seem to rely more on well-calibrated strategies, leading to more accurate predictions for processes with highly nonlinear trajectories in the prediction region. Predictions of lower WMC participants, in contrast, point toward an increased use of simple exemplar-based prediction strategies, which perform just as well as more complex strategies when the prediction region is approximately linear. These results imply that with respect to predicting dynamic processes, working memory capacity limits are not generally a strength or a weakness, but that this depends on the process to be predicted.  相似文献   
97.
In the last few years, there has been an increase in the use of Web defacements, where individuals post political or ideological messages on websites in place of the original content. There is generally little research on the predictors of Web defacements against either domestic or foreign targets. This study addresses this gap by examining the attitudinal and behavioral correlates of willingness to engage in defacements using a sample of university students in Taiwan and the United States. The findings demonstrate that political attitudes toward marginalized groups and support for cybercrime increase individuals’ willingness to engage in defacements.  相似文献   
98.
99.
Speech processing requires sensitivity to long-term regularities of the native language yet demands listeners to flexibly adapt to perturbations that arise from talker idiosyncrasies such as nonnative accent. The present experiments investigate whether listeners exhibit dimension-based statistical learning of correlations between acoustic dimensions defining perceptual space for a given speech segment. While engaged in a word recognition task guided by a perceptually unambiguous voice-onset time (VOT) acoustics to signal beer, pier, deer, or tear, listeners were exposed incidentally to an artificial "accent" deviating from English norms in its correlation of the pitch onset of the following vowel (F0) to VOT. Results across four experiments are indicative of rapid, dimension-based statistical learning; reliance on the F0 dimension in word recognition was rapidly down-weighted in response to the perturbation of the correlation between F0 and VOT dimensions. However, listeners did not simply mirror the short-term input statistics. Instead, response patterns were consistent with a lingering influence of sensitivity to the long-term regularities of English. This suggests that the very acoustic dimensions defining perceptual space are not fixed and, rather, are dynamically and rapidly adjusted to the idiosyncrasies of local experience, such as might arise from nonnative-accent, dialect, or dysarthria. The current findings extend demonstrations of "object-based" statistical learning across speech segments to include incidental, online statistical learning of regularities residing within a speech segment.  相似文献   
100.
Cybercrime research suggests that, analogous to traditional crime, victims are more likely to be offenders. This overlap could be caused by shared risk factors, but it is unclear if these are comparable to traditional risk factors. Utilizing a high risk sample of computer-dependent cyber-offenders and traditional offenders (= 535) we compare victimization, offending, and victimization-offending between cybercrime and traditional crime. Cybercrime results show a considerable victim-offender overlap and correlates like low self-control and routine activities partly explain differences in victimization, offending, and victimization-offending. Some cybercrime correlates are related to the digital context, but show similar patterns for cybercrime and traditional crime.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号