首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18篇
  免费   1篇
工人农民   2篇
世界政治   2篇
外交国际关系   2篇
法律   10篇
中国政治   1篇
政治理论   2篇
  2020年   1篇
  2018年   2篇
  2017年   2篇
  2015年   1篇
  2013年   2篇
  2011年   2篇
  2009年   1篇
  2007年   2篇
  2006年   1篇
  2005年   1篇
  1989年   2篇
  1982年   1篇
  1971年   1篇
排序方式: 共有19条查询结果,搜索用时 15 毫秒
1.
2.
3.
In 1999, public defender (PD) representation of defendants appearing before Israel's juvenile courts began to be phased in. This article reports some of the major findings of a study that examined the impacts of the introduction of PDs. Analysis of interviews with 14 PDs yielded four major themes concerning the impact of the "arrival" of PDs, nature of the court, PDs' role, and PDs' interactions with other court actors. Analysis of interviews with eight prosecutors yielded seven themes concerning the need for PDs, PD as state agent, PDs' role, harms of legalization, disruption of the court, compromising the therapeutic value of the court hearing, and changes in court process. More generally, both PDs and prosecutors placed uncritical store in the value of rehabilitation alternatives. Indeed, the welfare model continues to shape their roles. The findings can largely be explained in terms of Eisenstein and Jacob's courtroom workgroup model.  相似文献   
4.
Journal of Youth and Adolescence - Gender differences in parental value socialization of their children’s motivation, achievement, and career aspirations in science were investigated. Direct...  相似文献   
5.
6.
The new technologies of bio-informatic border security and remote surveillance that have emerged as key infrastructures of reconfigured mobility regimes depend on various kinds of labor to produce the effect of bordering. The current retrofitting and technological remediation of borders suggests their transformation away from static demarcators of hard territorial boundaries toward much more sophisticated, flexible, and mobile devices of tracking, filtration, and exclusion. Borders require the labor of software developers, designers, engineers, infrastructure builders, border guards, systems experts, and many others who produce the “smart border”; but they also depend on the labor of “data-ready” travelers who produce themselves at the border, as well as the underground labor of those who traffic in informal and illegalized economies across such borders. Bordering increasingly relies on technological forms of mediation that are embedded within hi-tech, military and private corporate logics, but are also resisted by electronic and physical “hacks” or bypassing of informational and infrastructural architectures. In this paper we consider three socio-technological assemblages of the border, and the labor which makes and unmakes them: (1) the interlocking “cyber-mobilities” of contemporary airports including visual technologies for baggage, cargo, and passenger inspection, as well as information technologies for passenger dataveillance, air traffic control, and human resource systems; (2) the development of the Schengen Information System database of the EU, and its implications for wider migrant rights and internal mobility within the EU, as well as radical border media that have attempted to intervene in that border space; and (3) elements of the US–Mexico “smart border” regime known as the Secure Border Initiative Network (2006–2011), and those who have tried to tactically evade, disrupt, or undermine the working of this border.  相似文献   
7.
8.
This case study discusses the Survivor-Centered Advocacy (SCA) Project, a community-based participatory research (CBPR) project that convened anti-violence advocates from culturally specific communities to design and implement research. The project used a unique approach to build grassroots research capacity and center survivors of intimate partner violence from historically marginalized communities. This approach coalesced into the creation of an exploratory Community-Led Research (CLR) framework that incorporated trauma-informed, research justice and language justice principles. The CLR framework responded to community members’ desire to lead, rather than simply participate in, the research process. As a result, five studies were designed and executed by practitioners turned community-based researchers, most of whom had never before engaged in research, except as subjects. The CLR framework integrated the skills and experiences of community-based and external researchers, and led to high levels of engagement, rich data, more equitable research processes and innovative research projects.  相似文献   
9.
10.
This is the first study of unwanted sexual experiences in the collegiate "hooking-up" culture. In a representative sample of 178 students at a small liberal arts university. Twenty-three percent of women and 7% of men surveyed reported one or more experiences of unwanted sexual intercourse. Seventy-eight percent of unwanted vaginal, anal, and oral incidents took place while--"hooking up,"--whereas 78% of unwanted fondling incidents occurred at parties or bars. The most frequently endorsed reason for unwanted sexual intercourse was impaired judgment due to alcohol. The most frequently endorsed reason for unwanted fondling was that it happened before the perpetrator could be stopped. Of those affected by unwanted sexual intercourse or unwanted fondling, 46.7% and 19.2% reported unwanted memories, 50% and 32.7% reported avoidance and numbing responses, and 30% and 26.9% reported hyperarousal responses, respectively. A preliminary model of unwanted sex and collegiate social dynamics is proposed to provide a heuristic for further research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号