首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   77篇
  免费   1篇
各国政治   9篇
工人农民   1篇
世界政治   6篇
外交国际关系   1篇
法律   52篇
中国政治   1篇
政治理论   8篇
  2023年   2篇
  2022年   2篇
  2021年   2篇
  2020年   2篇
  2019年   2篇
  2018年   3篇
  2017年   1篇
  2016年   1篇
  2015年   2篇
  2014年   1篇
  2013年   22篇
  2012年   1篇
  2011年   1篇
  2010年   2篇
  2009年   1篇
  2008年   1篇
  2007年   1篇
  2006年   4篇
  2005年   2篇
  2004年   3篇
  2002年   2篇
  2000年   1篇
  1998年   2篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1991年   2篇
  1989年   2篇
  1988年   4篇
  1983年   1篇
  1981年   1篇
  1979年   1篇
  1974年   1篇
排序方式: 共有78条查询结果,搜索用时 31 毫秒
61.
The study investigates the nature of public service motivation’s (PSM) relationship to employee work engagement. Using the Job Demands-Resource Model, the authors compare whether PSM as a resource is an antecedent to employee work engagement or has a buffering effect on job hindrances of perceived red tape in explaining employee work engagement. They surveyed 388 supervisors and managers in a public-sector organization in the United States. The findings support PSM as an antecedent along with perceived job influence and perceived procurement red tape to employee work engagement.  相似文献   
62.
Sexual offences by multiple perpetrators are more violent and involve more severe forms of sexual violation than those perpetrated by a lone offender. Often a clear leader exists within these groups. Questions have been raised as to the relative risk of reoffending and the potentially differing criminogenic needs of leaders and followers. However, a recent study comparing leaders and followers in juvenile multiple perpetrator rapes (t'Hart-Kerkhoffs et al., 2011) failed to find some of the expected differences. It was proposed that this might be due, in part, to the way leaders and followers were classified in the study. Before work can progress in this area, it is important to devise reliable and valid means of identifying leaders and followers in multiple perpetrator rape. This article reports on a study which investigated the utility of two different methods of identifying leadership. The Scale of Influence (Porter & Alison, 2001) was applied to a sample of 256 offenders responsible for 95 multiple perpetrator rapes from the United Kingdom. Following this, the relative number of directives uttered by offenders was used to designate leadership. In 66% of the offences sampled, a leader was designated using the number of directives uttered compared with 80% when using the Scale of Influence. When combining both measures to form a composite measure of leadership, this percentage increased to 89%. Classifications of offenders as leaders, followers, and neither, according to the Scale of Influence, the count of directives, and the composite measure, were compared with classifications made by a practitioner to assess their concordance. The composite measure showed the greatest agreement with practitioner opinion. These findings suggest that the Scale of Influence could be developed to take account of other ways that leadership is displayed during multiple perpetrator rapes.  相似文献   
63.
64.
The most notable feature of the public ‘dialogue of the deaf’ taking place across the Strait separating Taiwan and China is its zero‐sum logic. This logic of one‐upmanship in political and security matters dictates that whatever benefits Taipei is detrimental to Beijing and vice versa. Commercial interaction between Taiwan and China, particularly in the broadly defined sector of information technology (IT), is arguably the more powerful driver of cross‐Strait interaction today. Two characteristics of this accelerating dynamic of commercial interaction across the Taiwan Strait are paramount: (1) its tight integration into a global IT supply chain; and (2) the extent of symbiosis by which all participants in this global supply chain depend on the worldwide vitality of this economic ecosystem. In interpreting what cross‐Strait economic integration in IT portends, political logic may be leading Taipei and Beijing along opposite paths to the same end‐point: the presumption that economic integration is undermining, and destabilizing, the cross‐Strait economic and political status quo. As a dominant player in global IT, the US has its own stake in a clear understanding of this globalization dynamic and in astutely maintaining its interests as the global IT supply chain continues to extend across the political fault‐line of the Taiwan Strait. Non‐partisan analysis of the logic of globalization suggests a different outcome for the cross‐Strait commercial dynamic than either Taipei or Beijing has publicly credited: its potential to mutually enhance economic prosperity and contribute long‐term to stabilizing cross‐Strait political interaction.  相似文献   
65.
This paper focuses on interactive innovation. It starts by operationalising Regional Innovation in the context of multi-level governance. It shows how regional and external innovation interaction among firms and other innovation organizations is important for regional innovation potential. The ability to access and use funding for innovation support for regional firms and organizations is crucial for regional innovation promotion. Equity investment funding is more important than public funding, which tends to be cautious and otherwise risk avoiding, except in circumstances of market arrest or failure to develop. Regional systems of innovation are broader than single sectors or clusters but some of these will be strategically privileged recipients of policy support because of their growth performance or potential, rather than, as in the past, their uncompetitiveness. The paper devotes space to exploring biotechnology clustering from a regional innovation systems viewpoint, as an instance of rather strong sectoral, regional innovation systems capabilities, though integrated also to global knowledge supply and markets. Illustration is provided of the way such sectoral innovation systems work at local regional level by reference to cases from Cambridge, Massachusetts and Cambridge, England.  相似文献   
66.
67.
For over half a century, various clinical and actuarial methods have been employed to assess the likelihood of violent recidivism. Yet there is a need for new methods that can improve the accuracy of recidivism predictions. This study proposes a new time series modeling approach that generates high levels of predictive accuracy over short and long periods of time. The proposed approach outperformed two widely used actuarial instruments (i.e., the Violence Risk Appraisal Guide and the Sex Offender Risk Appraisal Guide). Furthermore, analysis of temporal risk variations based on specific time series models can add valuable information into risk assessment and management of violent offenders.  相似文献   
68.

This article examines the character of oppositional movements in the GDR in the light of post‐Wende revelations of Stasi infiltration. We look at responses by members of the alternative culture to accusations that their work during the GDR was rendered ineffective by the Stasi and is consequently of little importance to a historical reappraisal of the GDR. Whilst they were clearly aware of the Stasi, whose influence did have an effect, our evidence suggests that this influence was not total. Current debates about the Stasi are creating an unbalanced view of the actual situation in the GDR before 1989 in that the Stasi is being portrayed as an organisation of almost Orwellian Big Brother proportions. Our article attempts to deconstruct this paradigm and argues that the complicity of the few with the MfS should not invalidate the activities of the majority of those involved in the alternative culture.  相似文献   
69.
70.
Book reviews     
D. Leebart (ed.), The Future of Software, The MIT Press, 1995. Hardcover, £19.95, 300 pp, ISBN 0‐262‐12184‐0

David Bainbridge, Software Copyright Law, 2nd edn, Butterworths, 1994. Softcover £35.00, 272 + xvi pp. ISBN 0‐406‐04841‐X

Andrew Christie, Integrated Circuits and Their Contents: International Protection, Sweet & Maxwell, 1995. Hardcover, £85.00. ISBN 0‐421‐48380‐6

S. White, S. Bate and T. Johnson, Satellite Communications in Europe: Law & Regulation, 2nd edn, FT Tax and Law, 1996. Hardcover, £135.00 xlvi + 456 pp. ISBN 0‐752‐002119‐8

A. Valente, Legal Knowledge Engineering: a Modelling Approach. Frontiers in Artificial Intelligence and Applications, Volume 30, IOS Press, 1995. Softcover, £52.00, 227 pp. ISBN 90‐5199‐23‐0

Professor Christopher Arnold, Outsourcing Contracts, Pearson Professional, 1995. 114 pp.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号