首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   320篇
  免费   0篇
  2023年   2篇
  2020年   1篇
  2014年   1篇
  2013年   50篇
  2012年   3篇
  2011年   1篇
  2010年   4篇
  2009年   13篇
  2008年   14篇
  2007年   4篇
  2006年   10篇
  2005年   1篇
  2004年   3篇
  2002年   1篇
  2001年   24篇
  2000年   7篇
  1999年   5篇
  1998年   8篇
  1997年   9篇
  1996年   23篇
  1995年   11篇
  1994年   4篇
  1993年   2篇
  1992年   1篇
  1990年   1篇
  1989年   1篇
  1986年   1篇
  1984年   4篇
  1983年   2篇
  1982年   3篇
  1981年   5篇
  1980年   8篇
  1979年   8篇
  1978年   4篇
  1977年   5篇
  1976年   5篇
  1975年   7篇
  1974年   6篇
  1973年   33篇
  1972年   4篇
  1971年   9篇
  1970年   4篇
  1969年   4篇
  1964年   2篇
  1958年   1篇
  1946年   1篇
排序方式: 共有320条查询结果,搜索用时 15 毫秒
131.
132.
This essay explores the issue of the moral rights of engineers. An historical case study is presented in which an accomplished, loyal, senior engineer was apparently wronged as a result of actions taken by his employer in pursuit of legitimate business interests. Belief that the engineer was wronged is justified by showing that what happened to him violated what can validly be termed one of his moral rights as an engineer: the right to reputational fairness. It is then argued that, this right notwithstanding, under certain circumstances it is morally permissible for employers to override it. The paper concludes by identifying two complementary facets of this right, discussing its scope, and indicating what is required of employers obliged to respect it in two types of action contexts. An earlier version of this paper was presented at the Annual Meeting of the Society for the History of Technology in Washington, D.C. on October 16, 1993. I am indebted to Stephanie J. Bird, Taft Broome, Deborah Johnson, Carl Mitcham, Walter Vincenti, Vivian Weil, and Caroline Whitbeck for helpful critical comments. Professor of Industrial Engineering and Engineering Management and, by courtesy, of Civil Engineering, and in the Program in Science, Technology, and Society, School of Engineering, Stanford University, Stanford, CA, USA, 94305-2120.  相似文献   
133.
134.
135.
Two experiments examined repetition priming on tasks that require access to semantic (or biographical) information from faces. In the second stage of each experiment, participants made either a nationality or an occupation decision to faces of celebrities, and, in the first stage, they made either the same or a different decision to faces (in Experiment 1) or the same or a different decision to printed names (in Experiment 2). All combinations of priming and test tasks produced clear repetition effects, which occurred irrespective of whether the decisions made were positive or negative. Same-domain (face-to-face) repetition priming was larger than cross-domain (name-to-face) priming, and priming was larger when the two tasks were the same. It is discussed how these findings are more readily accommodated by the Burton, Bruce, and Johnston () model of face recognition than by episode-based accounts of repetition priming.  相似文献   
136.
Attention-Deficit/Hyperactivity Disorder (ADHD) is prevalent among school-aged children. An associated feature of the disorder is a deficit in social functioning, which can be detrimental in terms of long-term outcomes. Therefore, it is crucial to identify evidence-based interventions which can improve the social skills of children with ADHD. The current study was an evaluation of a school-based social skills training program, called Working Together: Building Children's Social Skills Through Folk Literature. The modified version of the program with generalization enhancers was delivered in three schools to 16 children over a 10-week period. Results indicated that this program was effective for improving social skills in children with ADHD, particularly for children with poor pragmatic language skills.  相似文献   
137.
138.
The aim of this article is to show the structural continuity of the idea of justification and grace between the Cistercian abbot Bernard of Clairvaux and the Augustinian friar and church reformer Martin Luther in a forward reading of the two. Others, such as Peter Manns, the Obermann School and the Finnish Luther research have pointed at some link between Catholicism, including Bernard, and Luther, but they have also pointed to differences, especially as to their understanding of justification and grace. This article goes a bit further, by showing structural similarities between the two theologians, separated by some 400 years, also when it comes to the understanding of faith and grace. By so doing it furthermore questions what has been the dominant view among Lutherans: that Luther broke entirely with his Catholic past, with the exception of Augustine. The article therefore treats of factors that have been decisive for this view, such as the almost hostile perceptions of mysticism and Bernard as a mystic as well as of Mariology and Bernard as a mariolate. It is demonstrated that these labelings, the mystic and the mariolate, are based on a backward reading of Bernard's teaching, and that he first and foremost was a theologian preaching the justification by grace through faith because of Christ. The question is if Bernard, whom Luther evaluated highly as a preacher of Christ, can be seen as a model for Luther.  相似文献   
139.
Identity-based crimes are considered to be one of the most significant and growing problems of the last 20 years due to the significant economic harm these offenses pose for victims. The increased use and availability of personal information through on-line outlets has significantly increased the risk of identity-based fraud, although few have considered the factors that affect the likelihood of this type of victimization. This study utilizes a sample of students, faculty, and staff at a southeastern university to investigate the effects that protective factors possess on fostering resiliency against on-line identity theft. The findings suggest that protective software programs increase individual resiliency to victimization. The implications of this study for both resiliency models and cybercrime victimization are considered in detail.  相似文献   
140.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号