首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   113篇
  免费   2篇
各国政治   1篇
工人农民   11篇
世界政治   7篇
外交国际关系   17篇
法律   60篇
政治理论   19篇
  2023年   1篇
  2022年   1篇
  2020年   2篇
  2019年   3篇
  2018年   5篇
  2017年   5篇
  2016年   5篇
  2015年   4篇
  2014年   6篇
  2013年   22篇
  2012年   5篇
  2011年   3篇
  2010年   4篇
  2009年   1篇
  2008年   5篇
  2007年   6篇
  2006年   11篇
  2005年   6篇
  2004年   6篇
  2003年   4篇
  2002年   4篇
  2001年   2篇
  2000年   2篇
  1998年   1篇
  1992年   1篇
排序方式: 共有115条查询结果,搜索用时 46 毫秒
51.
A puzzling feature of self‐governing organizations is persistent majority support for restrictive, seemingly nonmajoritarian, procedures (e.g., chairs and committees). This article provides a theory of self‐enforcing majoritarian commitment to restrictive procedures. We ask (1) why majorities consent to restrictive procedures in the first place, (2) why restrictive procedures survive challenges thereafter, and (3) with what policy consequences. In the model, a risk‐averse majority allocates procedural rights to increase procedural efficiency (i.e., reduce the procedural uncertainty of free‐for‐all bargaining). An equilibrium procedure is generally asymmetric and restrictive, generating nonmajoritarian policy bias. Still, a majority may persist in endorsing it so as to avoid amplifying procedural and policy uncertainty.  相似文献   
52.
We analyze insiders’ trades in the Italian financial market. Insiders buy undervalued stocks, but they also act as positive feedback traders. They exploit short term market movements with abnormal returns around trades: they purchase (sell) stocks after a price decline (increase) and trades are followed by a partial reversal. They time the market mainly through purchases immediately communicated to the market and sales (and in part purchases) communicated quarterly to the market. It seems that insiders do not manipulate the market but strategically choose the size of trades, while they are interested to disclose immediately purchases of the assets of the company they prefer not to do it in case of sales. JEL Classification: G14, G15  相似文献   
53.
54.
The literature on international environmental agreements has recognized the role transfers play in encouraging participation in international environmental agreements. However, the results achieved so far are overly specific. Therefore, we develop a more general framework that enables us to study the role of transfers in a systematic way. We propose transfers using both internal and external financial resources for making “welfare optimal agreements” self-enforcing. To illustrate the relevance of our transfer scheme, we use a stylized integrated assessment simulation model of climate change to show how appropriate transfers may induce almost all countries into signing a self-enforcing climate treaty.   相似文献   
55.

Purpose

We argue that inadequate frameworks to compare similar gang control strategies, and the scarcity of well-designed evaluations have hindered our ability to determine the effectiveness of existing programs. This article proposes a new typology of gang control strategies to use with logic models as tools to improve gang program evaluation.

Methods

We conducted a systematic review of gang control strategy evaluation reports and created a typology from the studies identified. Studies were selected on the basis of methodological quality in order to reflect only rigorous evaluations with credible research findings.

Results

Forty-five studies were selected and reviewed. Studies were classified in homogeneous categories based on the targeted population and the objective of the strategy. We infer logic models that consider the activities, outputs, and outcomes of each type of strategy.

Conclusion

A better framework for the comparison of similar studies may allow meta-analyses to be conducted, thereby improving our knowledge of what works. Logic models can move the field forward by allowing researchers to understand why some programs work and others do not. The improvement, both in quality and quantity, of program evaluation in gang research is crucial in order to move beyond claims of promising approaches.  相似文献   
56.
This article provides a geopolitical and geoeconomic analysis of the strategic foundation of biodiversity, as the basis for the development of technologies that are leading the technological revolution in the early 21st century, specifically in relation to the advance of biotechnology. It explores the mechanisms promoted by Nation States and Multinationals involved in biobusiness in order to establish global processes of biotic plundering in highly biodiverse areas—biopiracy—as well as the forms of their appropriation—patenting genetic material and its related knowledge. This dynamic is analyzed at the world level and discussed with specific reference to Mexico.  相似文献   
57.
58.
Research on crime guns has traditionally focused on the time-to-crime measure. This study shifts the focus to guns that entered the illegal firearm market through thefts. This subset of guns allows us to examine the same process and objective underlying the time-to-crime measure—that being the recovery process. Two new measures are proposed. The first, time-to-find, assesses the time span between a gun’s theft and seizure by police. The second, distance-to-recovery, introduces a spatial dimension to the crime gun repertoire by measuring the distance a firearm travels between its points of theft and seizure. Using a mix of national (Canada) and provincial (Quebec) data on crime guns, this study’s findings show that these two new measures are tapping into a unique phenomenon: whereas time-to-crime accounts for a gun’s complete lifecycle, time-to-find and distance-to-recovery reflect a gun’s criminal lifecycle. At the multivariate level, the most influential factor explaining both time-to-find and distance-to-recovery is the registration status of the gun. Non-registered crime guns took longer to find and traveled lengthier distances between the moments and points of theft and seizure. Our explanation for this is that non-registered guns may be stolen from sources that are more problematic to begin with and, thus, result in the gun’s transition toward a segment of the illegal market that is also more problematic and in demand than the pool of firearms represented by registered guns. This would embed the firearm more deeply into the illegal market, making it more difficult to retrieve and more likely to be dispersed across a wider geographical plane than guns which are registered to begin with.  相似文献   
59.
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号