首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   320篇
  免费   32篇
  国内免费   13篇
  2024年   1篇
  2023年   6篇
  2022年   7篇
  2021年   17篇
  2020年   18篇
  2019年   33篇
  2018年   16篇
  2017年   10篇
  2016年   16篇
  2015年   4篇
  2014年   10篇
  2013年   46篇
  2012年   4篇
  2011年   13篇
  2010年   8篇
  2009年   9篇
  2008年   20篇
  2007年   17篇
  2006年   16篇
  2005年   8篇
  2004年   8篇
  2003年   8篇
  2002年   10篇
  2001年   1篇
  2000年   4篇
  1999年   6篇
  1998年   1篇
  1997年   2篇
  1996年   1篇
  1995年   1篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1988年   2篇
  1985年   6篇
  1984年   6篇
  1983年   4篇
  1982年   3篇
  1981年   6篇
  1980年   6篇
  1979年   1篇
  1977年   1篇
  1976年   2篇
  1975年   1篇
  1974年   2篇
排序方式: 共有365条查询结果,搜索用时 15 毫秒
51.
The amount and severity of security threats have increased considerably over the past two decades, calling into question the validity of assessments administered around the world. These threats have increased for a number of reasons, including the popular use of computerized and online technologies for test administration and the use of almost undetectable technologies for capturing test content and illegally sharing it instantly across borders and cultures. No assessment program, large or small, is immune to this potential damage. The International Test Commission has recognized the critical need for every organization with an important assessment program to be aware of these and be prepared to counter them. It was for this purpose that these guidelines were developed. Knowing the threats and the guidelines will lead to effective measures to protect the program and its assets, maintaining the value of the tests and assessments to the international community. The guidelines listed in this article provide recommendations on planning for better security, maintaining security during the development of tests and while they are administered, and responding well when a security breach occurs. Following these guidelines will create a significant protective barrier between those who willingly commit test fraud and the valuable assets a program has spent time and money to build.  相似文献   
52.
The National Society of Genetic Counselors' (NSGC) recommendations for fragile X syndrome (FXS) genetic counseling are intended to assist health care professionals who provide genetic counseling for individuals and families in whom the diagnosis of FXS is strongly suspected or has been made. The recommendations are the opinions of genetic counselors with expertise in FXS counseling and are based on clinical experience, a review of pertinent English language medical articles, and reports of expert committees. These recommendations should not be construed as dictating an exclusive course of management, nor does use of such recommendations guarantee a particular outcome. These recommendations do not displace a health care provider's professional judgment based on the clinical circumstances of a particular client.  相似文献   
53.
David M. Byers 《Zygon》2000,35(2):317-330
The 'war' between religion and science is winding down, creating new opportunities for fruitful dialogue. The foundations of indirect religion-science dialogue, where the perspectives of the two disciplines illuminate some third subject, are not well established. A detailed comparison of the Roman Catholic bishops' dialogues and a similar program within the American Association for the Advancement of Science illustrates the variety in formalscience-religion interactions and reveals much about the promise, achievements, and limitations of different approaches. Success depends in large part on controlling the diversity of the dialogue group, choosing topics carefully, and adopting positive and cooperative attitudes.  相似文献   
54.
Individuals whose personal values match the values of the culture to which they belong to (i.e., person-culture fit) have a better evaluation of themselves. However, whether individuals who experience person-culture fit endorse more positive evaluations of the culture they belong to (e.g., nationality) remains an open question. We tested whether person-culture fit in terms of values (i.e., value congruence) would be associated with national pride (N = 171,528). Response surface analyses showed that value congruence effects on national pride were contingent on the type of values examined. Value congruence in terms of achievement, security, conformity, tradition, benevolence, and universalism was associated with higher national pride. In contrast, value congruence in terms of self-direction, stimulation, hedonism, and power was associated with lower national pride.  相似文献   
55.
In security studies, there is an unquestioned assumption of a linear link between trust and security. However, such an assumption neglects complex identity dynamics that can be involved in trust‐building discourses for engendering security. There needs to be greater examination into what is meant by trust, and upon what, and whom, and how the politics of identity works in social trust building and how states can influence this process. This article contributes to the literature on trust, security, and identity in International Relations (IR) by making a case for a conceptual focus on the formation of particularized distrust towards “the other” as a corollary to trust and security of “the self.” It is argued that in the construction of a political community where security is associated with trust, particularized distrust can also be promoted through institutional discourses—strengthening the “trusting we” by constructing “the other” who can challenge social trust and feelings of security associated with it. The argument is illustrated through critically examining a state‐level narrative in Norway in relation to “the other,” that is, the immigrant. Through this illustrative example, mutual constitutiveness of trust and distrust in a self/other discursive construction will be shown.  相似文献   
56.
The core objective of this special issue has been to shed light on emotions as (1) frames that shape interpersonal diplomatic relations, (2) as key tools that are used as part of the statecraft's toolbox, and (3) as formative/productive dynamics with real effects on human beings—that, in turn, often construct and maintain conflicts. It is therefore pertinent that we interrogate the political psychology of individual, collective, mass, and communal emotions and how these are often (mis)used in diplomacy and security narratives to legitimize politicians' decisions and practices. This concluding article provides a state of the art account of the study of emotions in International Relations (IR), sums up the main findings from all special issue contributions and constructively explores potential challenges ahead for the study of emotions in IR, especially in security and diplomacy studies. It concludes with an appeal for the development of a multiperspective approach—that is, one that combines social sciences, natural sciences, and humanities—for a nuanced study of the role of emotional work in state, diplomatic as well as security narratives and practices. This approach will in turn require methodological pluralism in how we go about, as reflexive researchers, our emotional research.  相似文献   
57.
An interest of researchers and practitioners has been postdeployment adjustment of returned soldiers, though the primary focus has been investigating the prevalence of psychiatric conditions. Less attention has been paid to nonclinical conditions, which still have posed significant adjustment problems for soldiers, in particular, for reserve soldiers who revert back to civilian life, family, and employment. The present study examined the occurrence of postdeployment problems among returned Army National Guard soldiers (N = 4,567 in 50 company-sized units). Survey items reliably indicated 7 problem areas. Highest prevalence of problems was being angry (35.9%) and being unable to sleep (43.3%), followed by alcohol abuse (25.1% reported 5 or more drinks in 1 day). Longer deployment lengths were associated with troubled relationships and aggression toward the significant other adult and children in the household. More deployments were associated with aggression toward household children. Self-reported general combat trauma and having killed or wounded someone were associated with all problem areas. Findings are discussed relative to how combat exposure likely alters soldiers’ perceptions and behaviors, including feelings of loneliness and isolation, and risk-taking behaviors of alcohol abuse and aggression toward others.  相似文献   
58.
为考察安全感和社会比较倾向在羞怯与攻击之间关系的中介作用,采用大学生羞怯量表、社会比较倾向量表、安全感量表和攻击问卷对543名大学生进行测量。结果发现(1)羞怯、攻击和社会比较倾向三者之间呈显著两两正相关,且三者分别与安全感呈显著负相关;(2)羞怯对攻击的直接效应显著;(3)安全感和社会比较倾向在羞怯与攻击关系间起完全中介作用。  相似文献   
59.
This paper describes the new security solutions based on cognitive approaches and new computing paradigm called cognitive cryptography. This new security area establish a new generation of computational methods and security systems, focused on creation intelligent cryptographic algorithms and security protocols using cognitive information processing approaches. Such systems are designed for semantic evaluation of encrypted data, and allow to select the most appropriate techniques of its encryption. This paper presents a possible application of such techniques for different security tasks like authentication, secret sharing, secure data management etc. Additionally, some cryptographic solutions inspired by biological models will be presented.  相似文献   
60.
This review article provides an overview of the British Academy Project on ‘Forced Migration, Religious Diplomacy and Human Security in the Eastern Orthodox World’ (January–December 2018), research questions, methodology, main findings and policy recommendations. The project compared the ways in which religious communities engaged with forced displaced populations in Eastern Europe and former Soviet states, with a particular focus on Serbia and Ukraine, collected a dataset on ‘Eastern Orthodoxy and Human Security’ and organised two workshops in Belgrade and Kyiv.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号