首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   389篇
  免费   17篇
  国内免费   2篇
  2020年   7篇
  2019年   4篇
  2018年   5篇
  2017年   7篇
  2016年   11篇
  2015年   5篇
  2014年   7篇
  2013年   31篇
  2012年   15篇
  2011年   23篇
  2010年   14篇
  2009年   15篇
  2008年   15篇
  2007年   16篇
  2006年   15篇
  2005年   9篇
  2004年   12篇
  2003年   9篇
  2002年   5篇
  2001年   4篇
  2000年   4篇
  1999年   3篇
  1998年   7篇
  1997年   6篇
  1996年   3篇
  1995年   5篇
  1994年   3篇
  1993年   4篇
  1991年   8篇
  1990年   4篇
  1989年   5篇
  1988年   3篇
  1987年   5篇
  1986年   6篇
  1985年   4篇
  1984年   7篇
  1981年   5篇
  1980年   6篇
  1979年   3篇
  1976年   4篇
  1975年   3篇
  1974年   8篇
  1973年   6篇
  1967年   3篇
  1939年   4篇
  1937年   3篇
  1934年   5篇
  1933年   3篇
  1926年   6篇
  1922年   4篇
排序方式: 共有408条查询结果,搜索用时 15 毫秒
331.
Prior research on responses to trust violations has focused primarily on the effects of apology and denial. The authors extended this research by studying another type of verbal response that is often used to respond to trust violations but has not been considered in the trust literature: reticence. An accused party may use reticence in a sincere and even legitimate attempt to persuade a trustor to withhold judgment. Yet, by considering information diagnosticity and belief formation mechanisms through which verbal responses influence trust, the authors argue that reticence is a suboptimal response because it combines the least effective elements of apology and denial. Specifically, reticence is a suboptimal response to an integrity violation because, like apology, it fails to address guilt. And reticence is a suboptimal response to a competence violation because, like denial, it fails to signal redemption. Results from 2 laboratory studies, simulating different contexts and using research participants from 2 different countries, provide support for the prediction. The results offer important implications for those who might use reticence to respond to a perceived trust violation and also for those who must judge another's reticence.  相似文献   
332.
ABSTRACT— Experimental paradigms designed to assess "implicit" representations are currently very popular in many areas of psychology. The present article addresses the validity of three widespread assumptions in research using these paradigms: that (a) implicit measures reflect unconscious or introspectively inaccessible representations; (b) the major difference between implicit measures and self-reports is that implicit measures are resistant or less susceptible to social desirability; and (c) implicit measures reflect highly stable, older representations that have their roots in long-term socialization experiences. Drawing on a review of the available evidence, we conclude that the validity of all three assumptions is equivocal and that theoretical interpretations should be adjusted accordingly. We discuss an alternative conceptualization that distinguishes between activation and validation processes.  相似文献   
333.
Understanding others' minds has puzzled philosophers for centuries. Psychologists, too, have recently begun asking questions about what causes us to see another person as having complex or simple mental faculties. Here, we review recent evidence linking how we perceive others' faces with how we perceive others' minds—the face‐mind link. We first discuss research demonstrating a face‐to‐mind effect, showing that both certain facial features (e.g., eyes) and face perception processes (e.g., configural processing) can trigger the perception that a face has a mind. We then discuss recent evidence demonstrating a mind‐to‐face effect, showing that believing a person is inhumane (i.e., their mind) leads their face to be processed less like a face and more like an object. Finally, we consider both the consequences of this bidirectional face‐mind link, and what the next steps may be in understanding how and why we infer minds from faces, and how and why beliefs about others' minds affects how we see their face.  相似文献   
334.
This contribution is a sermon on the New Testament readings, Ephesians 4:1–13 and the Gospel of Luke 24:46–53, preached at the festive celebration of the vigil of Blutfreitag on the evening of the feast of the Ascension of our Lord in the Basilica of St Martin in Weingarten on 14 May 2015. It establishes a theological link between the solemnity of the Ascension of Christ and Blutfreitag (Friday of the Precious Blood), a local feast which has been celebrated for centuries on the day after Ascension Day.  相似文献   
335.
This study investigated the short-term stability of the 1991 Mirowsky-Ross 2 x 2 Index of the Sense of Control. From an ongoing longitudinal study, 304 subjects were randomly selected for test-retest interviews occurring 1 to 4 days after their regularly scheduled first follow-up interview. Test-retest reliability was assessed at the item level using percent agreement and weighted kappa. At the scale score level, reliability was assessed with the intraclass correlation coefficient (ICC). ICCs were also calculated within categories of demographic, socioeconomic, psychosocial, and functional status characteristics. There was moderate to substantial item-level agreement (mean weighted kappa = 51; weighted kappa range = .38 to .66). At the scale score level there was substantial agreement (ICC = .71). No appreciable differences in ICC values were found in the demographic, socioeconomic, psychosocial, and functional comparisons of status characteristics. Thus, this sense of control measure has acceptable test-retest reliability and is appropriate for use in longitudinal research.  相似文献   
336.
Postmodern ideas have significantly challenged and expanded the marriage and family therapy field. Students in many training programs must grapple with models and training experiences influenced by both postmodern and modern orientations. The authors describe a particular programs training process and focus on the ways past students reflect on their professional development guided by the postmodernist-based perspective of Narrative Therapy and the modernist-based perspective of Bowen Family Systems Theory, two of the models emphasized by this program. The authors propose that these divergent philosophical orientations can interact together to support meaningful development in trainees experiences.  相似文献   
337.
Vulnerability is one of the least examined concepts in research ethics. Vulnerability was linked in the Belmont Report to questions of justice in the selection of subjects. Regulations and policy documents regarding the ethical conduct of research have focused on vulnerability in terms of limitations of the capacity to provide informed consent. Other interpretations of vulnerability have emphasized unequal power relationships between politically and economically disadvantaged groups and investigators or sponsors. So many groups are now considered to be vulnerable in the context of research, particularly international research, that the concept has lost force. In addition, classifying groups as vulnerable not only stereotypes them, but also may not reliably protect many individuals from harm. Certain individuals require ongoing protections of the kind already established in law and regulation, but attention must also be focused on characteristics of the research protocol and environment that present ethical challenges.  相似文献   
338.
Three studies investigated how inclusion versus exclusion strategies differentially lead to stereotypic decisions. In inclusion strategies, suitable targets are selected from a list of candidates, whereas in exclusion strategies, unsuitable candidates are eliminated. Across 2 separate target domains (Study 1: male and female politicians; Studies 2 and 3: African American and European American basketball players), exclusion strategies, as compared with inclusion strategies, elicited higher levels of both sensitivity stereotyping (i.e., greater difficulty distinguishing among members of stereotyped groups) and criterion stereotyping (i.e., setting different decision thresholds for judging members of different groups; see M. R. Banaji & A. G. Greenwald, 1995). Thus, the strategy used during decision making can influence the final decision via 2 theoretically distinct stereotyping mechanisms.  相似文献   
339.
This study examined the effectiveness of individual exposure combined with cognitive restructuring for social phobia in a clinical setting as well as the influence of sample restriction criteria on the effect size. Participants were 217 unselected patients with a primary diagnosis of social phobia who were treated by 57 therapists in four outpatient clinics of the Christoph-Dornier-Foundation of Clinical Psychology in Germany. Results 6 weeks after the end of therapy showed highly significant reductions in social phobic fears and avoidance as well as in general anxiety and symptoms of depression. However, patients who dropped out during therapy reported a significantly higher degree of depression. Results did not differ between the four outpatient clinics and are comparable with the average effect-sizes reported by meta-analytic studies of controlled efficacy research, using selected patients. Also, restricting the sample according to the selection criteria often applied in research settings did not result in higher effect sizes for the applied outcome measures. We conclude that individual cognitive behavioural therapy for social phobia can be transported from research settings to the field of mental health.  相似文献   
340.
We show how decision makers can be induced to choose a personally inferior alternative, a strong violation of rational decision making. First, the inferior alternative is installed as the leading option by starting with information that supports this alternative. Then, the decision maker uses the natural process of distorting new information to support whichever alternative is leading. This leader-supporting distortion overcomes the inherent advantages of the superior alternative. The end result is a tendency to choose the self-identified inferior alternative. We trace the choice process to reveal the amount of distortion and its influence on preference. Self-reported awareness of distortion to support the inferior alternative is not related to the amount of distortion. The absence of valid awareness suggests that the manipulation that produces this preference violation is unlikely to be detected and that the distortion is unlikely to be corrected by the decision maker. As expected, given the lack of awareness, final confidence is just as high when the inferior alternative is chosen as when the superior one is. The discussion considers how to prevent an adversary from manipulating one's decisions using this technique.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号