排序方式: 共有25条查询结果,搜索用时 31 毫秒
1.
2.
Kit Burden 《Computer Law & Security Report》2017,33(1):112-118
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
3.
In this study, we randomly assigned 123 sixth and seventh grade classrooms from seven middle schools in the greater Cleveland
area to one of two five-session curricula addressing gender violence/sexual harassment (GV/SH) or to a no-treatment control
group. A baseline survey and two follow-up surveys were administered immediately after the treatment (Wave 2) and about six
months post-treatment (Wave 3). In an earlier paper, we demonstrated the effectiveness of two approaches to youth GV/SH prevention
programming (a fact-based, law and justice curriculum and an interaction-based curriculum). In this paper, we explored whether
these largely positive findings remain for both girls and boys, including whether girls experience higher levels of GV/SH
than boys. Most of our statistical models proved to be non-statistically significant. However, in 2 of our 48 victimization/perpetration
(any violence, sexual violence and non-sexual violence) models (across two post-intervention follow-up points), we observed
that the interventions reduced peer (male or female, non-dating partner) sexual violence victimization and reduced peer perpetration,
but another outcome model indicated that the interventions increased dating perpetration. These mixed findings will need to
be explored further in future research. Regarding our primary research question, we observed no statistically significant
differences for the treatment multiplied by gender interaction terms for any of the perpetration or victimization outcome
models, suggesting that the treatment had similar effects on girls and boys. However, we did observe that boys are more involved
in violence than girls: both as victims and perpetrators. Boys experienced significantly more of three types of victimization
from peers and dating partners compared to what girls experienced at the hands of their peers and dating partners. As perpetrators,
boys committed more sexual victimization against peers (immediately post-intervention only) and more sexual victimization
against dating partners than girls. The implications of these results are discussed. 相似文献
4.
Christopher R. Berry Barry C. Burden William G. Howell 《American journal of political science》2010,54(1):1-17
While many scholars have focused on the production of legislation, we explore life after enactment. Contrary to the prevailing view that federal programs are indissoluble, we show that programmatic restructurings and terminations are commonplace. In addition, we observe significant changes in programmatic appropriations. We suggest that a sitting congress is most likely to transform, kill, or cut programs inherited from an enacting congress when its partisan composition differs substantially. To test this claim, we examine the postenactment histories of every federal domestic program established between 1971 and 2003, using a new dataset that distinguishes program death from restructuring. Consistent with our predictions, we find that changes in the partisan composition of congresses have a strong influence on program durability and size. We thus dispel the notion that federal programs are everlasting while providing a plausible coalition-based account for their evolution. 相似文献
5.
Political Behavior - A prominent explanation for why women are significantly underrepresented in public office in the U.S. is that stereotypes lead voters to favor male candidates over female... 相似文献
6.
7.
Kit Burden 《Computer Law & Security Report》2018,34(5):1154-1161
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
8.
9.
This paper develops a simple technique for locating voters and candidates in two-party US elections. Such a procedure is attractive because it overcomes the limitations of existing techniques that fail to place incumbents, challengers, and constituents on the same scale. The method is demonstrated using data from the 1988 presidential and congressional elections. The new data are then used to reevaluate spatial theories of candidate competition. 相似文献
10.
Much emphasis has been placed on the continuing growth of the outsourcing sector in the recent recessionary times. However, whilst much of this growth has undeniably been due to the budget-driven imperative to lower costs, the long term advantages of lower cost, guaranteed service levels and access to best practice/latest technology marks out the outsourcing sector as one which is set for sustained growth. In this context, the importance of establishing sound foundations for what are invariably long term deals is clear. This paper will accordingly establish the key stages involved in establishing the foundations for a successful outsource project, and the pitfalls to avoid. 相似文献