首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   86篇
  免费   1篇
各国政治   10篇
工人农民   12篇
世界政治   8篇
外交国际关系   1篇
法律   39篇
中国政治   2篇
政治理论   12篇
综合类   3篇
  2023年   1篇
  2022年   1篇
  2020年   2篇
  2019年   3篇
  2018年   4篇
  2017年   5篇
  2016年   6篇
  2015年   3篇
  2014年   2篇
  2013年   19篇
  2012年   2篇
  2011年   6篇
  2010年   2篇
  2009年   1篇
  2008年   5篇
  2007年   2篇
  2006年   2篇
  2005年   1篇
  2004年   2篇
  2003年   2篇
  2002年   1篇
  2001年   2篇
  2000年   1篇
  1999年   3篇
  1998年   2篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1990年   1篇
  1983年   1篇
排序方式: 共有87条查询结果,搜索用时 62 毫秒
31.
32.
The new technologies of bio-informatic border security and remote surveillance that have emerged as key infrastructures of reconfigured mobility regimes depend on various kinds of labor to produce the effect of bordering. The current retrofitting and technological remediation of borders suggests their transformation away from static demarcators of hard territorial boundaries toward much more sophisticated, flexible, and mobile devices of tracking, filtration, and exclusion. Borders require the labor of software developers, designers, engineers, infrastructure builders, border guards, systems experts, and many others who produce the “smart border”; but they also depend on the labor of “data-ready” travelers who produce themselves at the border, as well as the underground labor of those who traffic in informal and illegalized economies across such borders. Bordering increasingly relies on technological forms of mediation that are embedded within hi-tech, military and private corporate logics, but are also resisted by electronic and physical “hacks” or bypassing of informational and infrastructural architectures. In this paper we consider three socio-technological assemblages of the border, and the labor which makes and unmakes them: (1) the interlocking “cyber-mobilities” of contemporary airports including visual technologies for baggage, cargo, and passenger inspection, as well as information technologies for passenger dataveillance, air traffic control, and human resource systems; (2) the development of the Schengen Information System database of the EU, and its implications for wider migrant rights and internal mobility within the EU, as well as radical border media that have attempted to intervene in that border space; and (3) elements of the US–Mexico “smart border” regime known as the Secure Border Initiative Network (2006–2011), and those who have tried to tactically evade, disrupt, or undermine the working of this border.  相似文献   
33.
Tamara Jacka 《亚洲研究》2013,45(4):477-494
ABSTRACT

Recent feminist debate about how to achieve the substantive representation of women in government has been conducted largely in relation to national parliaments in democratic states. This article brings a new perspective by examining grassroots rural government in contemporary China – an authoritarian state, which, however, began implementing village “self-government,” including elections, in 1987. The article draws on qualitative fieldwork in the Chinese provinces of Zhejiang and Yunnan. The authors went into this fieldwork with an understanding that women's substantive representation, democracy, and gender equality are mutually constituted and with an expectation that village self-government might make a much-needed contribution to the achievement of all three. However, we ran into trouble with this analytical framework. First, there were marked variations in villagers’ practices and understandings of “representation.” Second, we found that democracy was not a prerequisite for substantive representation. Third, most villagers we talked with claimed that “men and women are equal” and there was little conception of villagers’ interests diverging by gender. This article explores our analytical “trouble,” with a view to advancing scholarship on constraints to democracy in authoritarian states and suggesting fruitful directions for feminist theorists interested in the relationship between gender, representation and democracy.  相似文献   
34.
35.
Postmortem examination is a cornerstone in identifying the cause of unexplained sudden death in children. Even in cases of suspected or known abuse, an autopsy may help characterize the nature of the abuse, which is particularly important in the forensic autopsy of children in the first 3 to 4 years of life when inflicted neurotrauma is most common. Forensic examinations are vital in cases that might otherwise be diagnosed as sudden infant death syndrome. The ocular autopsy in particular may demonstrate findings that were not appreciated on antemortem clinical examination. This protocol for postmortem examination of the eyes and orbits was developed to promote more consistent documentation of findings, improved clinical and forensic decision making, and more replicable and coherent research outcomes.  相似文献   
36.
The relationship between incarceration and recidivism was investigated in a sample of 627 adult male sexual offenders. Incarceration for the index offense was unrelated to sexual or violent recidivism. This was the case whether incarceration was examined as a dichotomous variable (incarceration vs. community sentence) or as a continuous variable (length of incarceration). Risk for sexual recidivism was assessed with a modified version of the Rapid Risk Assessment for Sexual Offense Recidivism. There was no evidence that the relationship between incarceration and recidivism was confounded or moderated by risk or that length of incarceration and recidivism were non-linearly associated. Sentencing sexual offenders to terms of incarceration appears to have little, if any, impact on sexual and violent recidivism following release.  相似文献   
37.
Purpose. Through an examination of serial rape data, the current article presents arguments supporting the use of receiver operating characteristic (ROC) analysis over traditional methods in addressing challenges that arise when attempting to link serial crimes. Primarily, these arguments centre on the fact that traditional linking methods do not take into account how linking accuracy will vary as a function of the threshold used for determining when two crimes are similar enough to be considered linked. Methods. Considered for analysis were 27 crime scene behaviours exhibited in 126 rapes, which were committed by 42 perpetrators. Similarity scores were derived for every possible crime pair in the sample. These measures of similarity were then subjected to ROC analysis in order to (1) determine threshold‐independent measures of linking accuracy and (2) set appropriate decision thresholds for linking purposes. Results. By providing a measure of linking accuracy that is not biased by threshold placement, the analysis confirmed that it is possible to link crimes at a level that significantly exceeds chance (AUC = .75). The use of ROC analysis also allowed for the identification of decision thresholds that resulted in the desired balance between various linking outcomes (e.g. hits and false alarms). Conclusions. ROC analysis is exclusive in its ability to circumvent the limitations of threshold‐specific results yielded from traditional approaches to linkage analysis. Moreover, results of the current analysis provide a basis for challenging common assumptions underlying the linking task.  相似文献   
38.
39.
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号