首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   869篇
  免费   5篇
各国政治   9篇
工人农民   38篇
世界政治   14篇
外交国际关系   456篇
法律   265篇
中国政治   4篇
政治理论   86篇
综合类   2篇
  2023年   2篇
  2021年   1篇
  2020年   2篇
  2019年   7篇
  2018年   10篇
  2017年   9篇
  2016年   5篇
  2015年   9篇
  2014年   43篇
  2013年   90篇
  2012年   58篇
  2011年   94篇
  2010年   63篇
  2009年   72篇
  2008年   43篇
  2007年   43篇
  2006年   45篇
  2005年   47篇
  2004年   51篇
  2003年   50篇
  2002年   40篇
  2001年   6篇
  2000年   3篇
  1999年   2篇
  1998年   9篇
  1997年   4篇
  1996年   5篇
  1995年   1篇
  1994年   5篇
  1993年   3篇
  1992年   2篇
  1991年   2篇
  1990年   2篇
  1989年   5篇
  1987年   6篇
  1986年   3篇
  1985年   4篇
  1984年   2篇
  1983年   4篇
  1982年   6篇
  1981年   3篇
  1980年   2篇
  1979年   1篇
  1978年   3篇
  1977年   1篇
  1973年   3篇
  1970年   1篇
  1967年   1篇
  1966年   1篇
排序方式: 共有874条查询结果,搜索用时 15 毫秒
101.

Purpose

Extant scholarship has examined pornography's putative link to the commission of sex crime. Yet, virtually no research speaks to whether an offender's exposure to pornography during many different stages of life elevates the violence of a sex offense. The current study addresses this gap.

Methods

Using retrospective longitudinal data, we systematically investigate the effect of offender pornography exposure during adolescence, adulthood, and immediately prior to the offense on the level of physical injury as well as the extent of humiliation experienced by sex crime victims.

Results

Findings indicate that adolescent exposure was a significant predictor of the elevation of violence—it increased the extent of victim humiliation. Results also suggest a tempering, or cathartic effect of pornography—using pornography just prior to the offense was correlated with reduced victim physical injury. No effects, however, were observed for adult pornography exposure.

Conclusion

Pornography use may differentially influence offenders’ propensity to harm or degrade victims over the life course.  相似文献   
102.

Purpose

Disproportionate minority contact during traffic stops has been a consistent source of commentary and study in recent years. While various theoretical perspectives have been employed to explain these empirical findings, the differential offending hypotheses has been largely ignored as a viable alternative explanation. Building on existing empirical evidence regarding criminal offending patterns and driving patterns, we examined the veracity of this explanation using data from an observational study of urban driving behavior.

Methods

Data were collected using an observational methodology in an urban environment. These data were then used to estimate various regression models and test the differential offending hypothesis.

Results

Analytic models indicated that Black drivers speed more frequently and engage in more severe speeding compared to White drivers, net of controls.

Conclusions

The findings suggest that citizen risk for specific police behavior is partially attributable to differential behavior prior to the encounter. These results mirror the findings of previous research in other geographic locations using different methodologies; thus, contributing to the conclusion that understanding officer decision-making and behavior requires consideration of other factors beyond a citizen's race.  相似文献   
103.
This article offers a conceptual exploration of the changing notion of trust and distrust in today's news media ecology. Central is the question whether the relationship between the traditional media actors, media organisations, journalists and news users, can be increasingly characterised by distrust. Do we really notice a decline in trust in the news media? And moreover, are these feelings of distrust grounded? In order to answer these questions, we look at the changing economic, technological and societal context and how this might explain the strained relationship between these actors. We find that to a large extent the goals of the media actors diverge or even conflict. Mutually bridging these goals is difficult as they boil down to ideological and normative choices. This requires us to reconsider our ways of looking at trust. Therefore, this article's central argument is that a trusted relationship between the media actors is unlikely to result from a definitive settlement between the actor's conflicting goals. Rather, maintaining a trusted relationship is likely to become a matter of constant renegotiation. For this renegotiation to succeed, transparency and integrity are key. We find inspiration in the recent work of Solove (2001), Nissenbaum (2004) and Mansell (2008, forthcoming) to take a different, more contextual approach towards the notion of trust. As regards the relationship between news organisations and users, we suggest these norms should be negotiated in a balanced and transparent way, giving users an equal say in the process. The relationship between journalists and news users should be guided by a mutual interest in truth telling, whereby users are not only merely seen as consumers, but also as potential contributors to news stories. Policy makers in turn should act as facilitators of such spaces of renegotiation.  相似文献   
104.
Trust is an important feature for all users of the Internet who rely on the safety and security of network technologies and systems for their daily lives. Trust, or the lack of it, has also been identified by the European Commission’s Digital Agenda as a major barrier to further development of the information society in Europe. One of the areas in which concerns have been raised is in relation to children’s safety online. As a result, substantial efforts have been made by policymakers and by the industry to build greater trust and confidence in online digital safety. This paper examines what trust means in the context of children’s use of the Internet. Should policy on trust enhancement, for instance, include children’s own trust in the technologies or services they use or is it sufficient to seek to reinforce parental and adult confidence that children can be adequately protected? What is required to build that trust from either perspective? Does it need, or should it include a relationship of trust between parents and children? To tease out these questions further, the paper examines current European Union policy frameworks on digital safety, particularly industry responses to the call for a more trusted Internet environment for children, and argues that technical solutions to be effective need to carefully balance a number of competing objectives and to be sufficiently grounded in evidence of parental and child experience of the Internet.  相似文献   
105.
The aim of this paper is two-fold: first, to introduce how Japanese law and its jurisprudence have dealt with the case of on-line defamation, which is arguably one of the most acute problems in modern society, and second, to critically examine the efficacy of such an approach. The recent decision of the Supreme Court in on-line defamation (as oppose to off-line defamation) will be introduced as an exemplar of the way Japanese law and its jurisprudence have dealt with such an acute problem. A first step will be to provide, by way of background, a brief overview of how defamation in a conventional sense has been treated by the Japanese legal system. The second step will be to outline how the Japanese jurisdiction has dealt with on-line defamation, that is to say, to what extent the Japanese court regulates on-line defamatory comments made by the ordinary people. A third step will be to examine the efficacy of such an approach, and the final step will be to examine whether the UK court can learn a lesson from the Japanese jurisdiction. The author will draw upon Japanese jurisprudence, in order to consider whether a valuable lesson might be offered to the UK jurisdiction.  相似文献   
106.
Corporate social responsibility (CSR) has become a relevant topic for enterprises offering products and services on a global scale. International organizations provide for guidelines and private associations publish codes of conduct requiring businesses to integrate social, environmental and ethical aspects, human rights as well as consumer concerns into their operations. Not at least the EU is promoting CSR through an Agenda for Action 2011–14. The implementation of CSR is a multidimensional ethical process and gains particular importance for the IT industry which by its nature is global. Therefore, IT enterprises are invited to conduct a CSR assessment, to develop a CSR strategy and to implement CSR commitments. These tasks are to be done by introducing specific CSR processes and compliance measures for risk assessment and risk mitigation.  相似文献   
107.
This paper discusses the controversy surrounding the Data Retention Directive with an emphasis on the 2011 decision of the Cyprus Supreme Court which has annulled several district court orders that allowed the police access to telecommunications data relating to certain persons relevant to criminal investigations. The annulment has been on the ground that the legal provisions upon which the orders have been issued are unconstitutional. It will suggest that the decision does not entail a direct rejection of the EU Data Retention Directive and that in any event, Cyprus is not a Member State resisting the particular measure. This is because the legal provisions are deemed unconstitutional, though part of the law that has transposed the relevant Directive into national law are provisions that go beyond what the EU legislator intended to regulate through that Directive. Still, the particular Directive sits rather uneasily within the ‘human rights’ regime, in particular the one governing the individual right of privacy.  相似文献   
108.
This article describes and analyses three recent decisions by the Swedish Data Inspection Board (Datainspektionen) directly focused on cloud computing. All three decisions were published on 28 September 2011 as part of a supervisory project seeking to clarify what demands the Data Protection Act places on organisations utilising cloud computing. As such, and due to the fact that similar concerns arise in the three matters, there is considerable overlap between the three decisions. Indeed, large parts of text are identical in the three decisions. To avoid repetition, I discuss the first decision in most detail, and limit the discussion of overlapping issues in the context of the other two decisions.  相似文献   
109.
Online child pornography is a repulsive reality which cannot be ignored; the biggest child pornography manufacturing ring in South African history was cracked with the arrest of eight family members. There are more than 116 000 Internet searches daily for child pornography. Pornography is no longer confined to consenting adults, children are not only being exposed to pornographic material but are increasingly being used as victims of child pornography. In South Africa, the Internet and Cell phone Pornography Bill tabled in 2010 aims to make it illegal for Internet and mobile phone service providers to distribute pornography or permit it to be distributed. The objective of the Bill is to protect children from child pornography and women from the indignity of being seen as objects of pornography. This paper takes as its focal point the continuing crisis which centres on the conceptual framework, the existing legislation regulating online child pornography and measures to curb infringement.  相似文献   
110.
In Opinion 1/2010, the Article 29 Data Protection Working Party has provided additional guidance concerning the concepts of ‘controller’ and ‘processor’ contained in Directive 95/46/EC. This guidance aims to assist practitioners in their determination of whether an entity is acting as a controller or as a processor towards a particular data processing operation. Despite the fact that this opinion is informative, the existing framework still appears to leave room for a considerable amount of legal uncertainty. This uncertainty is attributable in part to the nature of the existing concepts, but also (and perhaps to a larger extent) to their apparent misalignment with current processing realities. In this paper, the author seeks to articulate why the existing concepts often remain difficult to apply in practice, in order to enable a constructive reflection on how these issues might be addressed in the future.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号