首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   1篇
工人农民   1篇
外交国际关系   2篇
法律   3篇
政治理论   2篇
  2019年   1篇
  2015年   1篇
  2013年   1篇
  2009年   1篇
  2008年   2篇
  2000年   1篇
  1999年   1篇
排序方式: 共有8条查询结果,搜索用时 15 毫秒
1
1.
Hyperlink network analysis, which utilizes the links between websites to map online communication structures, offers an emerging methodology for studying the networks of supporters and opponents of public policies. Reasons for the methodology's appeal include the ability to utilize web crawlers to collect large amounts of data and the ability to apply quantitative and qualitative methods to examine network interactions. While the methodology has been utilized by diverse disciplines it is relatively new to the fields of political science and public policy. Utilizing a mixed‐methods research design, this article examines the applicability of using hyperlink networks to study opposing groups in the Colorado climate and energy policy subsystem while drawing increased attention to the methodology's strengths and weaknesses. The results demonstrate the methodology's considerable potential, but highlight the need for greater adoption of a collection of best practices designed to increase the validity, reliability, and generalizability of hyperlink research.  相似文献   
2.
3.
This article explores the role of perception management as a doctrinal concept in the construction and deconstruction of threats. Threat construction involves a continual, reciprocal and constitutive relationship between the attribution of meaning and practice. It takes place in an environment changed by the multiple forces of the so-called information revolution, in which discursive links are forged between technology and victory as well as between scientific progress and military superiority. Through articulation and enactment, information and information technology are represented as both threatening and threatened in three dimensions: dependency on information as data, possible loss of information superiority, and loss of control over information as image. The enemy ‘Other’ in these threat constructions is everywhere and nowhere at the same time, and is seen as being greatly empowered by the same tools that empower the United States military establishment. But while, for many military actors, regaining control in the information domain through technological innovation seems more or less straightforward, the immaterial battlefield of perception proves harder to master. We purport that military strategists do not seem to fully grasp the illusionary nature of the belief that the information space is a thing to be shaped at will and without restrictions.  相似文献   
4.
This study examined the relationship between intimate partner violence and adult attachment in a sample of 70 couples. The attachment style of each partner and the interaction of the partners' attachment styles were examined as predictors of intimate partner violence. Additional analyses were conducted to examine violence reciprocity and to explore differences in the relationship between attachment and violence using continuous and dichotomous violence measures. Results of hierarchical regression analyses indicated the "mispairing" of an avoidant male partner with an anxious female partner was associated with both male and female violence. When controlling for partner violence, the relationship between attachment and violence was significant for males only. In addition, analyses using a dichotomized violence variable produced different results from analyses using a continuous violence measure. Clinical implications include focusing on the discrepancy between partners' needs for intimacy and distance within the couple as a strategy for treating intimate partner violence.  相似文献   
5.
Whether public services are better delivered through centralized or decentralized administrative systems is one of the most enduring debates in public administration. This article contributes to the debate with a study of program outcome achievement in U.S. child welfare services. We examine whether centralized state‐administered or decentralized county‐administered systems are more successful at realizing desired outcomes, which exhibit greater performance equity, and which are more successful at securing program outcomes in rural settings. Using a coarsened exact matching approach to quasi‐experimental research, we find that centralized child welfare systems exhibit greater success at achieving desired outcomes—in both rural contexts and overall. No discernible difference is found in centralized and decentralized systems' performance equity; outcome disparities exist under both structures. The study thus lends credence to centralization arguments, but at the same time cautions that centralized administration is not a structural panacea.  相似文献   
6.
7.
This contribution addresses the diverging discourses of the United States, France and Germany in reaction to the terrorist attacks of 2001 in New York and Washington, with a focus on gender. As a discourse analysis, it explores the ways in which the different narratives instantiate dichotomous conceptions of gender. It is argued that owing to the centrality of gendered constructions for identity, and owing to the mutually constitutive nature of the relation between identity and foreign policy, the comparative perspective adopted adds to the understanding of the disparities in enacting foreign policy between these three close transatlantic allies. Not only does this paper expose the contingency of the gendered underpinnings of the US, French and German high-level policy discourses that were constitutive of the early “war on terrorism” but it also shows how these stories matter. The three countries' foreign policy formulations in response to “9/11”, particularly their respective choices between identifying the attacks as acts of war or crime, pursuit or rejection of regime change, and unilateralism and multilateralism, make explicit that the varying degrees of dichotomously gendered framings of identity are constitutively significant for foreign policy formulations.  相似文献   
8.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号