首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   24篇
  免费   1篇
法律   14篇
政治理论   11篇
  2019年   3篇
  2018年   7篇
  2017年   2篇
  2014年   3篇
  2012年   1篇
  2010年   2篇
  2009年   1篇
  2005年   1篇
  2004年   1篇
  2003年   3篇
  2000年   1篇
排序方式: 共有25条查询结果,搜索用时 31 毫秒
1.
2.
EU update     
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
3.
In this study, we randomly assigned 123 sixth and seventh grade classrooms from seven middle schools in the greater Cleveland area to one of two five-session curricula addressing gender violence/sexual harassment (GV/SH) or to a no-treatment control group. A baseline survey and two follow-up surveys were administered immediately after the treatment (Wave 2) and about six months post-treatment (Wave 3). In an earlier paper, we demonstrated the effectiveness of two approaches to youth GV/SH prevention programming (a fact-based, law and justice curriculum and an interaction-based curriculum). In this paper, we explored whether these largely positive findings remain for both girls and boys, including whether girls experience higher levels of GV/SH than boys. Most of our statistical models proved to be non-statistically significant. However, in 2 of our 48 victimization/perpetration (any violence, sexual violence and non-sexual violence) models (across two post-intervention follow-up points), we observed that the interventions reduced peer (male or female, non-dating partner) sexual violence victimization and reduced peer perpetration, but another outcome model indicated that the interventions increased dating perpetration. These mixed findings will need to be explored further in future research. Regarding our primary research question, we observed no statistically significant differences for the treatment multiplied by gender interaction terms for any of the perpetration or victimization outcome models, suggesting that the treatment had similar effects on girls and boys. However, we did observe that boys are more involved in violence than girls: both as victims and perpetrators. Boys experienced significantly more of three types of victimization from peers and dating partners compared to what girls experienced at the hands of their peers and dating partners. As perpetrators, boys committed more sexual victimization against peers (immediately post-intervention only) and more sexual victimization against dating partners than girls. The implications of these results are discussed.  相似文献   
4.
While many scholars have focused on the production of legislation, we explore life after enactment. Contrary to the prevailing view that federal programs are indissoluble, we show that programmatic restructurings and terminations are commonplace. In addition, we observe significant changes in programmatic appropriations. We suggest that a sitting congress is most likely to transform, kill, or cut programs inherited from an enacting congress when its partisan composition differs substantially. To test this claim, we examine the postenactment histories of every federal domestic program established between 1971 and 2003, using a new dataset that distinguishes program death from restructuring. Consistent with our predictions, we find that changes in the partisan composition of congresses have a strong influence on program durability and size. We thus dispel the notion that federal programs are everlasting while providing a plausible coalition-based account for their evolution.  相似文献   
5.
Political Behavior - A prominent explanation for why women are significantly underrepresented in public office in the U.S. is that stereotypes lead voters to favor male candidates over female...  相似文献   
6.
7.
EU update     
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
8.
9.
This paper develops a simple technique for locating voters and candidates in two-party US elections. Such a procedure is attractive because it overcomes the limitations of existing techniques that fail to place incumbents, challengers, and constituents on the same scale. The method is demonstrated using data from the 1988 presidential and congressional elections. The new data are then used to reevaluate spatial theories of candidate competition.  相似文献   
10.
Much emphasis has been placed on the continuing growth of the outsourcing sector in the recent recessionary times. However, whilst much of this growth has undeniably been due to the budget-driven imperative to lower costs, the long term advantages of lower cost, guaranteed service levels and access to best practice/latest technology marks out the outsourcing sector as one which is set for sustained growth. In this context, the importance of establishing sound foundations for what are invariably long term deals is clear. This paper will accordingly establish the key stages involved in establishing the foundations for a successful outsource project, and the pitfalls to avoid.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号