首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7607篇
  免费   404篇
  国内免费   4篇
  2024年   21篇
  2023年   103篇
  2022年   102篇
  2021年   153篇
  2020年   205篇
  2019年   264篇
  2018年   359篇
  2017年   374篇
  2016年   349篇
  2015年   244篇
  2014年   252篇
  2013年   930篇
  2012年   527篇
  2011年   531篇
  2010年   311篇
  2009年   217篇
  2008年   431篇
  2007年   353篇
  2006年   320篇
  2005年   277篇
  2004年   238篇
  2003年   204篇
  2002年   165篇
  2001年   100篇
  2000年   115篇
  1999年   77篇
  1998年   49篇
  1997年   43篇
  1996年   38篇
  1995年   33篇
  1994年   25篇
  1993年   32篇
  1992年   36篇
  1991年   45篇
  1990年   52篇
  1989年   34篇
  1988年   37篇
  1987年   35篇
  1986年   33篇
  1985年   31篇
  1984年   26篇
  1983年   22篇
  1982年   14篇
  1981年   12篇
  1979年   19篇
  1978年   15篇
  1977年   14篇
  1974年   14篇
  1971年   11篇
  1966年   11篇
排序方式: 共有8015条查询结果,搜索用时 15 毫秒
951.
This research examined the role of different forms of positive regard for the ingroup in predicting beliefs in intergroup conspiracies. Collective narcissism reflects a belief in ingroup greatness contingent on others’ recognition. We hypothesized that collective narcissism should be especially likely to foster outgroup conspiracy beliefs. Non‐narcissistic ingroup positivity, on the other hand, should predict a weaker tendency to believe in conspiracy theories. In Study 1, the endorsement of conspiratorial explanations of outgroup actions was positively predicted by collective narcissism but negatively by non‐narcissistic ingroup positivity. Study 2 showed that the opposite effects of collective narcissism and non‐narcissistic ingroup positivity on conspiracy beliefs were mediated via differential perceptions of threat. Study 3 manipulated whether conspiracy theories implicated ingroup or outgroup members. Collective narcissism predicted belief in outgroup conspiracies but not in ingroup conspiracies, while non‐narcissistic ingroup positivity predicted lower conspiracy beliefs, regardless of them being ascribed to the ingroup or the outgroup.  相似文献   
952.
In Category Mistakes, Magidor proposes that sortal restrictions should be viewed as pragmatic presuppositions. This contrasts with recent linguistic theories of successfully resolved category mistakes, e.g. coercions or copredication. It has been argued that for the proper treatment of such examples, sortal restrictions should be expressed by semantic presuppositions since they need to interact with compositional semantics. I explore possible ways in which Magidor’s theory could be extended to explain examples of coercion and copredication. The outcome of the discussion is that incorporation of these facts into Magidor’s pragmatic system might be possible, but ecessitates choices that are far from trivial.  相似文献   
953.
Exner (1989 Exner, J. E. (1989). Searching for projection in the Rorschach. Journal of Personality Assessment, 53, 520536.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) and Weiner (2003 Weiner, I. B. (2003). Principles of Rorschach interpretation (2nd ed.). Mahwah, NJ: Erlbaum. [Google Scholar]) identified 3 types of Rorschach codes that are most likely to contain personally relevant projective material: Distortions, Movement, and Embellishments. We examine how often these types of codes occur in normative data and whether their frequency changes for the 1st, 2nd, 3rd, 4th, or last response to a card. We also examine the impact on these variables of the Rorschach Performance Assessment System's (R–PAS) statistical modeling procedures that convert the distribution of responses (R) from Comprehensive System (CS) administered protocols to match the distribution of R found in protocols obtained using R-optimized administration guidelines. In 2 normative reference databases, the results indicated that about 40% of responses (M = 39.25) have 1 type of code, 15% have 2 types, and 1.5% have all 3 types, with frequencies not changing by response number. In addition, there were no mean differences in the original CS and R-optimized modeled records (M Cohen's d = –0.04 in both databases). When considered alongside findings showing minimal differences between the protocols of people randomly assigned to CS or R-optimized administration, the data suggest R-optimized administration should not alter the extent to which potential projective material is present in a Rorschach protocol.  相似文献   
954.
To generate normative reference data for the Rorschach Performance Assessment System (R–PAS), modeling procedures were developed to convert the distribution of responses (R) in protocols obtained using Comprehensive System (CS; Exner 2003 Exner, J. E. (2003). The Rorschach: A Comprehensive System. Vol. 1. Basic foundations (4th ed.). Hoboken, NJ: Wiley. [Google Scholar]) administration guidelines to match the distribution of R in protocols obtained using R-Optimized Administration (Meyer, Viglione, Mihura, Erard, &; Erdberg, 2011 Meyer, G. J., Viglione, D. J., Mihura, J. L., Erard, R. E., &; Erdberg, P. (2011). Rorschach Performance Assessment System: administration, coding, interpretation, and technical manual. Toledo, OH: Rorschach Performance Assessment System. [Google Scholar]). This study replicates the R–PAS study, examining the impact of modeling R-Optimized Administration on Brazilian normative reference values by comparing a sample of 746 CS administered protocols to its counterpart sample of 343 records modeled to match R-Optimized Administration. The results were strongly consistent with the R–PAS findings, showing the modeled records had a slightly higher mean R and, secondarily, slightly higher means for Complexity and V-Comp, as well as smaller standard deviations for R, Complexity, and R8910%. We also observed 5 other small differences not observed in the R–PAS study. However, when comparing effect sizes for the differences in means and standard deviations observed in this study to the differences found in the R–PAS study, the results were virtually identical. These findings suggest that using R-Optimized Administration in Brazil might produce normative results that are similar to traditional CS norms for Brazil and similar to the international norms used in R–PAS.  相似文献   
955.
This study's general objective was to analyze whether different types of cognitive emotion regulation strategies (CERS), namely adaptive strategies—specifically positive refocusing and positive reappraisal—and maladaptive strategies—self-blame, catastrophizing, and rumination—mediated the neuroticism-depression relationship in children 9–12 years old, and whether gender and school transition moderated the relationships proposed. A self-reporting measure was administered to 315 children to evaluate said variables. The resulting data were analyzed using structural equations. The study verified that maladaptive CERS partially mediated neuroticism's relationship with depression, while adaptive CERS, though negatively associated with depression, did not show a mediating effect on this relationship. The results provide evidence of the mediating function of maladaptive CERS on the neuroticism-depression relationship. Gender and school transition did not moderate the relationships proposed. Because, by their very nature, these strategies are modifiable, these results constitute an important finding that can be transferred to the design and content of child mental health prevention and promotion programs.  相似文献   
956.
Online platforms' success depends on individual's information sharing (IS). However, previous research showed that “knowledge is power” is a default‐perception in organizations and that individuals share relatively unimportant information while keeping the important private information for themselves. Trust has also been identified as important enabler of IS. We examined the role of power construed as responsibility for others' outcomes and of a “Trust” button, a theory‐inspired technological feature, using a 2(Power construals: opportunity vs. responsibility) × 2(Buttons: “Like” vs. “Like‐or‐Trust”) × 2(Information sharedness as within‐subjects factor; public, private) design. Findings showed that construing power as responsibility and “Trust” button's presence increased the sharing of private information; clicking behavior yielded insights into the underlying mechanisms. Theoretical and practical implications are discussed.  相似文献   
957.
The objective of this study was to compare, through a Confirmatory Factor Analysis, two different theoretical models that explain the operationalized creativity construct with the Verbal Torrance Tests of Creative Thinking (TTCT), Form B. Model 1 is represented by six factors which correspond to each activity and its respective indicators while Model 2 is integrated by three factors which correspond to each TTCT ability (i.e., Fluency, Originality, and Flexibility) and the corresponding indicators for each variable. The study was carried out with a sample consisting of 432 Spanish‐speaking youngsters of both sexes aged 15–26. According to the research findings, the model which showed the most satisfactory fit identifies six correlated factors that correspond to each of the activities proposed (χ2 = 414.48; df = 116; χ2/df = 3.57; GFI = .90; NFI = .95; CFI = .96 and RMSEA = .077). These results are discussed according to its psychometric implications for the construct assessment in different fields.  相似文献   
958.
We present and investigate a simple way to generate nonnormal data using linear combinations of independent generator (IG) variables. The simulated data have prespecified univariate skewness and kurtosis and a given covariance matrix. In contrast to the widely used Vale-Maurelli (VM) transform, the obtained data are shown to have a non-Gaussian copula. We analytically obtain asymptotic robustness conditions for the IG distribution. We show empirically that popular test statistics in covariance analysis tend to reject true models more often under the IG transform than under the VM transform. This implies that overly optimistic evaluations of estimators and fit statistics in covariance structure analysis may be tempered by including the IG transform for nonnormal data generation. We provide an implementation of the IG transform in the R environment.  相似文献   
959.
In this paper I examine the phenomenon of “uncanny” unconscious communication and the plausibility of “telepathic” interconnectivity between patient and therapist. While reexamining long-standing psychoanalytic reluctance to engage with the topic of the “uncanny,” I present clinical examples of seeming anomalous transmission, followed by discussion from contrasting perspectives of psychoanalysis, neuroscience, quantum physics, and parapsychology. The patient’s and analyst’s reactions to these uncanny moments are explored, along with the potential clinical value of nurturing receptivity to this “frequency” of unconscious attunement.  相似文献   
960.
In this reply I respond to Cambray’s introduction of the “self-organizing” and “emergent” qualities of telepathic communication, looking more closely at the relationship between dissociation and the emergence of telepathic phenomena. I highlight the creative aspect of such telepathic “intrusions,” viewing the clinician’s capacity for intuitive imagination as key to the emergence of telepathic material. In response to Eshel’s connection between the analyst’s “presence,” “absence,” and the patient’s unmet need for recognition, I examine the roles of co-construction and mutual dissociation in transference-countertransference enactments that generate uncanny phenomena. Verbal interpretation not always being the most viable mode of communication, “absence” can sometimes serve as a co-constructed, unconscious “solution” to the problem of multiple conflicting needs, holding a space for telepathic emergence to express the inexpressable.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号