首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   84篇
  免费   7篇
各国政治   4篇
工人农民   21篇
世界政治   9篇
外交国际关系   7篇
法律   30篇
中国政治   3篇
政治理论   17篇
  2023年   1篇
  2022年   1篇
  2021年   4篇
  2020年   6篇
  2019年   3篇
  2018年   9篇
  2017年   13篇
  2016年   11篇
  2015年   6篇
  2014年   6篇
  2013年   9篇
  2012年   3篇
  2011年   4篇
  2010年   2篇
  2009年   1篇
  2008年   2篇
  2004年   2篇
  2003年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1993年   1篇
  1991年   1篇
  1980年   1篇
  1964年   1篇
排序方式: 共有91条查询结果,搜索用时 15 毫秒
1.
2.
3.
Over the past decade, directional drilling and hydraulic fracturing enabled an unconventional oil and gas extraction (UOGE) boom in many regions of the United States, including parts of Pennsylvania. This revolution has created serious concerns about the capability of existing institutions to govern important societal outcomes associated with UOGE. We present a conceptual framework for assessing key societal outcomes influenced by UOGE governance. In applying this framework to Pennsylvania, we discern certain institutional strengths that have allowed the Commonwealth to reap appreciable short‐term economic growth from rich resource endowments. We also find, however, that several institutional weaknesses have allowed costs externalized to the environment, public health, and community integrity to offset some proportion of those economic benefits. Likewise, we find that governance of UOGE in Pennsylvania has contributed to a bifurcated sociopolitical landscape wherein adversarial coalitions dispute the legitimacy of the industry and its governance.  相似文献   
4.
Journal of Experimental Criminology - Despite experiments being termed the “gold standard,” criminology has been slow to adopt experimentation as a methodology. The goal of this...  相似文献   
5.
6.
Although the Victim’s Rights Movement has led to advances for victims of crime, the use of victim impact evidence in criminal trials remains controversial due to the suspicion that such evidence enhances punitive attitudes and arbitrariness in capital sentencing outcomes. Despite a growing body of literature in this area, it remains unclear if some victims are viewed more favorably than others, particularly from the perspective of judges. The current study examines the construction of victims by judges in capital cases and how this portrayal impacts sentencing outcomes in Delaware, which vests the final capital sentencing authority in judges rather than juries. In examining this gap in the literature, we consider if judges make distinctions between ideal and deviant victims, if these distinctions are associated with victim and offender characteristics, and if the construction of victims impacts offender sentencing. Findings from this study lend support to the idea that judges describe some victims as more “worthy” than others, that victims described in ideal ways are more likely to be white and female, and that “ideal victims” are more likely to result in death sentences.  相似文献   
7.
Moral Foundations Theory posits five distinct foundations of morality: Harm/Care, Fairness/Reciprocity, In-group/Loyalty, Authority/Respect, and Purity/Sanctity. In combination, this should yield between four-to-six moral signatures—distinct combinations or patterns of support for these aspects of morality. We extend previous research by examining the replicability of these moral signatures in a New Zealand-based national sample (n = 3,635). Latent Profile Analysis identified four distinct moral signatures: Individuators, Moderates, Neutrals, and High Moralists. We integrate these moral signatures within the Dual Process Model (DPM) framework and show that Social Dominance Orientation predicts membership in the Neutral moral signature (moderate/lukewarm support for multiple moral foundations); whereas Right-Wing Authoritarianism predicts membership in the High Moralist signature (undifferentiated high support across moral foundations). These findings were observed controlling for Big-Six personality and various demographics. Thus, the authoritarian and dominance-based motives identified by the DPM independently predict categorical differences in the signatures people use to judge morality.  相似文献   
8.
9.
While canines are most commonly trained to detect traditional explosives, such as nitroaromatics and smokeless powders, homemade explosives (HMEs), such as fuel–oxidizer mixtures, are arguably a greater threat. As such, it is imperative that canines are sufficiently trained in the detection of such HMEs. The training aid delivery device (TADD) is a primary containment device that has been used to house HMEs and HME components for canine detection training purposes. This research assesses the odor release from HME components, ammonium nitrate (AN), urea nitrate (UN), and potassium chlorate (PC), housed in TADDs. Canine odor recognition tests (ORTs) were used with analytical data to determine the detectability of TADDs containing AN, UN, or PC. Headspace analysis by gas chromatography/mass spectrometry (GC/MS) with solid-phase microextraction (SPME) or online cryotrapping were used to measure ammonia or chlorine, as well as other unwanted odorants, emanating from bulk AN, UN, and PC in TADDs over 28 weeks. The analytical data showed variation in the amount of ammonia and chlorine over time, with ammonia from AN and UN decreasing slowly over time and the abundance of chlorine from PC TADDs dependent on the frequency of exposure to ambient air. Even with these variations in odor abundance, canines previously trained to detect bulk explosive HME components were able to detect all three targets in glass and plastic TADDs for at least 18 months after loading. Detection proficiency ranged from 64% to 100% and was not found to be dependent on either age of material.  相似文献   
10.
Why do some states generate competent, professional military organizations, while others fail to do so even when they have the required economic, demographic, and technological endowments? Variation in states’ military organizational practices—their core policies related to promotion patterns, training regimens, command arrangements, and information management—holds the key. This article develops a typology of such practices and explains why and how they vary in response to the internal and external threats facing particular regimes. The article then subjects this argument to a carefully designed plausibility probe comparing the threat environments and military organizational practices of two states whose differences are both intuitively and theoretically puzzling: North and South Vietnam during the period 1954–1975. The initial evidence provides support for the theory and casts doubt on existing explanations of military organizational behavior focused on external threats, democracy, or the degree of political intervention in the military. The findings have important implications for foreign policy, as well as for future research on authoritarianism, civil-military relations, and military effectiveness.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号