首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   269篇
  免费   7篇
  2023年   4篇
  2021年   3篇
  2020年   7篇
  2019年   12篇
  2018年   9篇
  2017年   7篇
  2016年   3篇
  2015年   8篇
  2014年   12篇
  2013年   31篇
  2012年   15篇
  2011年   9篇
  2010年   10篇
  2009年   7篇
  2008年   8篇
  2007年   8篇
  2006年   11篇
  2005年   9篇
  2004年   10篇
  2003年   8篇
  2002年   5篇
  2001年   6篇
  2000年   7篇
  1999年   4篇
  1997年   4篇
  1993年   1篇
  1992年   2篇
  1991年   4篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1985年   3篇
  1984年   1篇
  1982年   1篇
  1981年   4篇
  1980年   1篇
  1979年   4篇
  1978年   1篇
  1977年   1篇
  1976年   3篇
  1975年   5篇
  1974年   4篇
  1973年   3篇
  1972年   2篇
  1971年   1篇
  1970年   1篇
  1969年   4篇
  1968年   2篇
  1967年   1篇
  1951年   1篇
排序方式: 共有276条查询结果,搜索用时 15 毫秒
191.
Building on the U.N. human security taxonomy of 1994, this article aims to explore the constructability of a reliable, valid, parsimonious, useful measure of human security that is relevant to contemporary environments and situations? A seminal 1994 U.N. report, Human Security in Theory and Practice, outlined seven types of human security (personal, health, food, community, economic, environmental, political). A quarter-century on, we added two more, cyber and national security, and tested if a single measure could capture all nine security concerns. A national sample of N = 1033 New Zealanders completed a brief online measure in which participants reported yes or no to experiencing each type of security and basic demographics. Guttman scaling placed these needs in an ascending order of difficulty. Analogous to a staircase, security may be scaled from personal up to political security (coefficient of reproducibility = .88), with three distinct but interrelated flights: (1) proximal (personal, health, food security); (2) social (cyber, community, economic, environmental); and (3) distal (national, political). We confirmed this nine-step, three-flight measure in our sample (Χ2 = 81.72; df = 24; RMSEA = .048, 90%CI [.037, .06]; CFI = .976; TLI = .964; SRMR = .028). The measure showed configural, metric, scalar, and factorial invariances (across random-split subgroups). Ethnic groups and the precariously employed scored significantly differently, in coherent ways, on the security staircase scale.  相似文献   
192.
Unconscious plagiarism occurs in a recall task when someone presents someone else’s idea as his or her own. Recent research has shown that the likelihood of such an error is inflated if the idea is improved during the retention interval, but not if it is imagined. Here, we explore the effects of repeating the elaboration phase during the retention interval. Participants in a group first generated alternate uses to common objects before elaborating the ideas either by imagining them or by improving them. This elaboration phase occurred once, twice, or not at all. Later, they attempted to recall their original ideas and generate new ideas. Repeated imagery did not inflate unconscious plagiarism on either task. In contrast, repeating the improvement phase increased plagiarism to dramatically high levels in the recall task. The latter effect might be particularly pertinent to real-world cases of plagiarism in which the ideas under dispute have been the subject of creative development over many occasions.  相似文献   
193.
Durgin FH  Doyle E  Egan L 《Acta psychologica》2008,127(2):428-448
Three experiments with a total of 87 human observers revealed an upper-left spatial bias in the initial movement of gaze during visual search. The bias was present whether or not the explicit control of gaze was required for the task. This bias may be part of a search strategy that competed with the fixed-gaze parallel search strategy hypothesized by Durgin [Durgin, F. H. (2003). Translation and competition among internal representations in a reverse Stroop effect. Perception &Psychophysics, 65, 367-378.] for this task. When the spatial probabilities of the search target were manipulated either in accord with or in opposition to the existing upper-left bias, two orthogonal factors of interference in the latency data were differentially affected. The two factors corresponded to two different forms of representation and search. Target probabilities consistent with the gaze bias encouraged opportunistic serial search (including gaze shifts), while symmetrically opposing target probabilities produced latency patterns more consistent with parallel search based on a sensory code.  相似文献   
194.
This paper discusses the implications of Periventricular Leukomalacia (PVL) lesions for the development of Nonverbal Learning Disabilities (NLD) as illustrated through an identical twin case study. PVL lesions were identified in an 8-year-old child, but were not detected in his identical twin brother who served as a matched comparison. While the nonclinical twin displayed a largely unremarkable neuropsychological profile, the clinical twin evidenced a distinct pattern of social, intellectual, academic, and neuropsychological test results often identified among children with PVL and those with the NLD syndrome. The clinical and theoretical implications for this case study are discussed.  相似文献   
195.
Carey has argued that there is a system of core numerical cognition – the analog magnitude (AM) system – in which (approximate) cardinal numbers are explicitly represented in iconic format. While the existence of this system is beyond doubt, this paper aims to show that its representations cannot have the combination of features attributed to them by Carey. According to the argument from abstractness, the representation of the (approximate) cardinal number of a collection of individuals as such requires the representation of individuals as such, and this in turn requires non-iconic format, from which it is concluded that the explicit representation of the (approximate) cardinal number of some individuals requires non-iconic representational format. In support of the first premise, an account is given of what approximate cardinal numbers might be (namely, quantifiers), and in support of the second, a direct argument is articulated and defended. Finally, in response to an objection, a second argument (from parts) for the central thesis is provided. While the discussion is couched in the terms of Carey’s work, the considerations it adduces are perfectly general, and the conclusion should therefore be taken into consideration by all those aiming to characterize the AM system.  相似文献   
196.
The main aim of this paper is to highlight the need to address the conceptual problem of ‘implicit knowledge’ or ‘implicit cognition’ — a notion especially important in the study of the nonverbal minds of animals and infants. We review some uses of the term ‘implicit’ in psychology and allied disciplines, and conclude that conceptual clarification of this notion is not only lacking, but largely avoided and reduced to a methodological problem. We propose that this elusive notion is central in the study not only of animal and infant minds, but also the human adult mind. Some promising approaches in developmental and evolutionary psychology towards innovative conceptualization of implicit knowledge remain conceptually underdeveloped and in need of reconsideration and re-elaboration. We conclude by suggesting that the challenge of implicit cognition and nonverbal minds will only be solved through a concerted interdisciplinary approach between psychology and other disciplines.  相似文献   
197.
Dyadic co‐sleeping (mother–baby) is a common strategy for night‐time infant care in the majority of world cultures. Triadic co‐sleeping (mother–father–baby) is less common, although still widely practised cross‐culturally. This paper examines triadic co‐sleeping in an opportunistic sample of parents from the North Tees region of England, and explores fathers' expectations and experiences of sleeping with their babies. Using a prospective study design, 36 sets of parents, pre‐ and post‐natally, were interviewed about infant care strategies, particularly at night. Although they did not anticipate sleeping with their infants at the pre‐natal interview, the majority of fathers (81%) had done so by the time of the second interview. First‐time fathers were afraid that they would squash or suffocate the baby in their sleep, and some were concerned that the infant's presence would adversely affect their own sleep. Fathers used a variety of strategies to help overcome their initial fears of co‐sleeping. Among those for whom triadic co‐sleeping became a regular night‐time infant care strategy, the pleasures of prolonged intimate contact with their infant were clearly apparent. It is suggested that the experience of sleeping with their infant ameliorates some of the distancing effects felt by fathers outside the breast‐feeding relationship, and helps encourage paternal involvement in night‐time infant care‐giving. Copyright © 2000 John Wiley & Sons, Ltd.  相似文献   
198.
Psychonomic Bulletin & Review - An important mechanism used to selectively process relevant information in the environment is spatial attention. One fundamental way in which spatial attention...  相似文献   
199.
Previous research has shown that riots spread across multiple locations, but has not explained underlying psychological processes. We examined rioting in three locations during the August 2011 disorders in England to test a social identity model of riot diffusion. We triangulated multiple sources to construct a narrative of events; and we analysed interviews with 68 participants to examine experiences. In line with the model, we found evidence for two pathways of influence: “cognitive” and “strategic”. For some participants, previous rioting was highly self-relevant, and shared identity was the basis of their subsequent involvement. For others, previous rioting was empowering because it demonstrated the vulnerability of a common enemy (the police). In each location, interaction dynamics mediated the link between initial perceptions and collective action. The utility of this social identity approach is that it is able to account for both the boundaries and the sequence of urban riot diffusion.  相似文献   
200.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号