全文获取类型
收费全文 | 489篇 |
免费 | 16篇 |
国内免费 | 3篇 |
专业分类
508篇 |
出版年
2023年 | 2篇 |
2021年 | 3篇 |
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 7篇 |
2017年 | 12篇 |
2016年 | 15篇 |
2015年 | 5篇 |
2014年 | 16篇 |
2013年 | 64篇 |
2012年 | 22篇 |
2011年 | 29篇 |
2010年 | 14篇 |
2009年 | 16篇 |
2008年 | 25篇 |
2007年 | 35篇 |
2006年 | 23篇 |
2005年 | 19篇 |
2004年 | 20篇 |
2003年 | 16篇 |
2002年 | 23篇 |
2001年 | 5篇 |
2000年 | 6篇 |
1999年 | 7篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 5篇 |
1994年 | 9篇 |
1993年 | 4篇 |
1992年 | 8篇 |
1991年 | 7篇 |
1990年 | 5篇 |
1989年 | 2篇 |
1988年 | 8篇 |
1987年 | 5篇 |
1986年 | 6篇 |
1985年 | 7篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1981年 | 6篇 |
1980年 | 4篇 |
1979年 | 2篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1973年 | 3篇 |
1972年 | 1篇 |
1971年 | 1篇 |
1969年 | 1篇 |
1964年 | 1篇 |
排序方式: 共有508条查询结果,搜索用时 15 毫秒
161.
The term attentional blink (AB) refers to a failure in identifying the second of two targets, separated by less than 500?ms, embedded in a rapid succession of nontargets. To examine whether the expectation of the onset of the first target affects the AB, we compared the magnitudes of the AB deficit when participants triggered the appearance of the first target and when the target was presented automatically at some time point, as in traditional AB studies. In Experiment 1, the first target appeared immediately after a participant's voluntary keypress, revealing that the accuracy for identifying the first target increased and that the AB deficit was attenuated. In Experiment 2, the temporal delay between a voluntary keypress and the first-target presentation was manipulated. The results showed that both targets could be reported accurately only when the first target was presented within 300?ms after the action. In Experiment 3, we ruled out an alternative explanation that would attribute the facilitation effect to mere physical movement, by examining the accuracy of target identification when participants voluntarily pressed a key but that action was unrelated to the onset of the first target. Taken together, the results suggest that voluntary action to trigger the onset of a visual target facilitates processing and reduces the subsequent AB deficit when the target appears within 300?ms of the action. 相似文献
162.
163.
Daniel A. Sauers James B. Hunt Ken Bass 《Journal of Personal Selling & Sales Management》2013,33(3):17-28
Salesforce control systems tend to focus on outcomes rather than behaviors. The use and effectiveness of behavior-based control systems is limited, particularly with industrial sales-people, who generally operate in the field much of the time where their behavior cannot be closely observed or supervised by management. The authors propose Behavioral Self-Management (BSM) as a means of controlling the methods salespeople use to achieve results. Specific BSM techniques applicable to selling and strategies for encouraging salespeople to engage in self- management are reviewed. 相似文献
164.
Although very little visual information is explicitly retained across views, some continuity of processing is afforded by implicit visual memory traces of previous views. These memory traces interact with attentional mechanisms to guide eye movements, cognition, and action. Two different memory mechanisms are described here. First, the deployments of focal attention and eye movements are facilitated towards recently attended features and locations (priming of popout). Second, attention is guided by implicit memory traces of specific visual contexts experienced in the past (contextual cueing). Compared to the visual memory tapped by change blindness tasks, the implicit memory mechanisms of priming of popout and contextual cueing do not require conscious intervention and may exhibit greater memory capacity, longer durability, and higher discriminability. Thus, these implicit traces of past views guide attention and eye movements to allow for effective access (indexing) to a scene's details, hence providing context and continuity to ongoing interactions with the perceptual world. 相似文献
165.
166.
Ken Eason Susan Harker Wendy Olphert 《European Journal of Work and Organizational Psychology》2013,22(3):399-420
Abstract It is widely accepted that effective implementation of new technology into work organizations needs an integrative approach in which developments in both technical and social systems are considered. Furthermore, success depends upon the effective participation of significant stakeholders in this process. This article reviews the methods available for this purpose and concludes that a particular weakness is the methods that can be used to generate and review socio-technical system opportunities early in the development process. Whilst methods exist to support stakeholder participation at this stage, they need to represent future socio-technical opportunities if they are to make an effective contribution. This article presents the ORDIT (Organizational Requirements Definition for Information Technology Systems) methodology, which uses responsibility modelling as a basis for constructing socio-technical systems opportunities. The application of telemedicine in health care is presented as a case study to demonstrate how this method can be used to construct and evaluate socio-technical scenarios. 相似文献
167.
Ken Corbett Ph.D. 《Psychoanalytic Dialogues》2013,23(4):457-474
The relational reach and psychotherapeutic action of comedy are examined in the opening phase of treatment with a man who had an early history of neglect and consequent neurotic isolation. Through the examination of a series of comedic enactments that cracked into the beginning phase of this treatment, comedy's animating force to defy neurotic gravity and aid in the reanimation of primal density is considered. The ways in which laughter opened into a maternal erotic transference—countertransference is further detailed, in conjunction with reflection aimed at the aggression of this comedic bond, including countertransference hate. 相似文献
168.
Ken Corbett Ph.D. 《Psychoanalytic Dialogues》2013,23(4):353-370
This paper details the diagnostic discourse that has accumulated around feminine boys, including the traditional presuppositions of Gender Identity Disorder (GID). The GID discourse is examined for the ways in which it is built upon unquestioned beliefs about masculinity. Distinct from most modern considerations of gender, no effort has been made to critically theorize gender when thinking about feminine boys; masculinity is as masculinity was. Consequently, we are left with modes of diagnosis and treatment that are out of synch with modern social life, and a set of ideas that do not proceed from an adequate understanding of the range that is masculinity. New sustaining ideals are in play, and in accord with these ideals an argument is made for a new mode of psychotherapeutic address. The traditional individual trauma explanation for GID is questioned. Particular emphasis is given to the ways in which this traditional GID discourse fails to reckon with how masculinity is held in place by the strong arm of regulatory anxiety. A new position that incorporates a greater appreciation for the role of social trauma and melancholia is offered. It is argued that a theory that offers insight into the workings of melancholia as it builds the feminine boy affords a more robust set of ideas through which to contemplate the boy. In turn, we come upon a better avenue of psychotherapeutic action—one that does not employ behavioral strategies that reinforce social exclusion. 相似文献
169.
Ken Kelley 《Multivariate behavioral research》2013,48(4):524-555
Methods of sample size planning are developed from the accuracy in parameter approach in the multiple regression context in order to obtain a sufficiently narrow confidence interval for the population squared multiple correlation coefficient when regressors are random. Approximate and exact methods are developed that provide necessary sample size so that the expected width of the confidence interval will be sufficiently narrow. Modifications of these methods are then developed so that necessary sample size will lead to sufficiently narrow confidence intervals with no less than some desired degree of assurance. Computer routines have been developed and are included within the MBESS R package so that the methods discussed in the article can be implemented. The methods and computer routines are demonstrated using an empirical example linking innovation in the health services industry with previous innovation, personality factors, and group climate characteristics. 相似文献
170.
Pamela Qualter Ken Rotenberg Louise Barrett Peter Henzi Alexandra Barlow Maria Stylianou Rebecca A. Harris 《Journal of abnormal child psychology》2013,41(2):325-338
The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution paradigm (Study 1), scores on the Children’s Rejection-Sensitivity Questionnaire (Study 2), and visual attention to socially rejecting stimuli (Study 3). The participants were 185 children (11 years-7 months to 12 years-6 months), 248 children (9 years-4 months to 11 years-8 months) and 140 children (8 years-10 months to 12 years-10 months) in the three studies, respectively. Regression analyses showed that, with depressive symptoms covaried, there were quadratic relations between loneliness and these different measures of hypervigilance to social threat. As hypothesized, only children in the upper range of loneliness demonstrated elevated hostility to ambiguously motivated social exclusion, higher scores on the rejection sensitivity questionnaire, and disengagement difficulties when viewing socially rejecting stimuli. We found that very lonely children are hypersensitive to social threat. 相似文献