首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   137篇
  免费   8篇
各国政治   11篇
工人农民   4篇
世界政治   23篇
外交国际关系   10篇
法律   53篇
中国政治   1篇
政治理论   43篇
  2021年   6篇
  2020年   3篇
  2019年   12篇
  2018年   6篇
  2017年   5篇
  2016年   3篇
  2015年   7篇
  2014年   2篇
  2013年   24篇
  2012年   4篇
  2011年   5篇
  2010年   3篇
  2009年   6篇
  2008年   4篇
  2007年   6篇
  2006年   4篇
  2005年   6篇
  2004年   3篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1997年   3篇
  1995年   4篇
  1992年   2篇
  1991年   3篇
  1990年   1篇
  1988年   1篇
  1987年   3篇
  1986年   3篇
  1985年   3篇
  1983年   1篇
  1980年   1篇
  1978年   1篇
  1974年   1篇
  1973年   1篇
排序方式: 共有145条查询结果,搜索用时 31 毫秒
51.
The performance framework adopted for this review includes five dimensions — economic, social, democratic, legal and political issues. This article presents summary findings from a statistical (meta-analytic) review of the performance measurements found in the available international literature on privatisation and contracting-out government services… This enables an assessment to be made of the extent to which reform objectives appear to have been achieved in practice. The article discusses the gains which result from contracting reforms, and the extent to which these gains accrue to various stakeholders — whether community, customers, the organisation or government.  相似文献   
52.
This article offers an assessment of the writings of Professor Gerry Stoker of Manchester and examines the main themes and messages of his work as it has related to both academics and practitioners. It examines the controversial nature of Stoker's output which has provoked the charge of 'betraying' local government, and suggests that reading Stoker's work is a more complex task than perhaps his fiercest critics would allow. It argues that there is more than one way in which Stoker's contribution can be interpreted and that there are, in ways which mirror his own pluralistic approach to political science, a number of 'versions of Stoker' which can be advanced based on a close reading of his work. This article explores three of these.  相似文献   
53.
54.
55.
Electoral bribery is an ancient phenomenon, but its manifestations and pathologies can only be understood in the context of particular electoral norms and political practices. The spark for electoral bribery in the Westminster tradition was the shift from parliamentary service as a duty to a privilege, whilst its paradigm forms of treating and crude vote-buying are traceable to a shift from buying a seat to buying the voters. The gradual move from cultural acceptance to legislative and ethical condemnation of electoral bribery is attributable to a concern with the rising cost of elections and developing notions of fair electoral competition. This article focuses on the seminal period in the ‘war’ on electoral bribery from 1868 to the early twentieth century, giving a taxonomy of the various forms of bribery and judicial responses to them, as well as an explanation of the role played by statutory developments. The ultimate success of this war on corruption is shown to lie in a confluence of politico-legal techniques – election courts, tighter legislation, the secret ballot and the mass franchise – and institutional developments, in particular the rise of centralised, professional parties.  相似文献   
56.
We present the results of an initial investigation into the efficacy of using testate amoebae for the discrimination of soils from wet ground and puddles, as little attention has been given to these organisms in forensic science. The preservation of testate amoebae in these sediments is generally good, although test concentrations are low. Statistical analysis suggests that testate amoebae assemblages are somewhat spatially distinct and have potential to be used for soil discrimination. A case study is presented where mineralogical (X-ray diffraction) and testate amoebae analyses are used in conjunction to clarify the scene of crime in a ‘cold case’ murder enquiry. Testate amoebae were recovered from dried sediment residues on clothing 10 years after the murder. Despite these promising results, further experimental work is crucial to examine the spatial and temporal variation of amoebae assemblages in water films, wet ground and puddles before they can be added to the armoury of methods available to the forensic biologist.  相似文献   
57.
With a reliance on the various forms of forensic science evidence in complex criminal investigations, the measures for ensuring its quality are facing increasing scrutiny. Improvements to quality management systems, to ensure both the robust application of scientific principles and the accurate interpretation and reporting of results, have arisen as a consequence of high-profile rebuttals of forensic science evidence, combined with process improvements driven by evaluation of current practice. These improvements are crucial to ensure validity of results as well as providing assurance for all those involved in the Criminal Justice System. This work first examines the quality management systems utilised for the examination and analysis of fingerprint, body fluid and DNA evidence. It then proceeds to highlight an apparent lack of comparable quality assurance mechanisms within the field of digital forensics, one of the newest branches of forensic science. Proposals are provided for the improvement of quality assurance for the digital forensics arena, drawing on the experiences of, and more well-established practices within, other forensic disciplines.  相似文献   
58.
The use of search engines and associated search functions to locate content online is now common practice. As a result, a forensic examination of a suspect's online search activity can be a critical aspect in establishing whether an offense has been committed in many investigations. This article offers an analysis of online search URL structures to support law enforcement and associated digital forensics practitioners interpret acts of online searching during an investigation. Google, Bing, Yahoo!, and DuckDuckGo searching functions are examined, and key URL attribute structures and metadata have been documented. In addition, an overview of social media searching covering Twitter, Facebook, Instagram, and YouTube is offered. Results show the ability to extract embedded metadata from search engine URLs which can establish online searching behaviors and the timing of searches.  相似文献   
59.
The forensic analysis of mobile handsets is becoming a more prominent factor in many criminal investigations. Despite such devices frequently storing relevant evidential content to support an investigation, accessing this information is becoming an increasingly difficult task due to enhanced effective security features. Where access to a device's resident data is not possible via traditional mobile forensic methods, in some cases it may still be possible to extract user information via queries made to an installed intelligent personal assistant. This article presents an evaluation of the information which is retrievable from Apple's Siri when interacted with on a locked iOS device running iOS 11.2.5 (the latest at the time of testing). The testing of verbal commands designed to elicit a response from Siri demonstrate the ability to recover call log, SMS, Contacts, Apple Maps, Calendar, and device information which may support any further investigation.  相似文献   
60.
The field of digital forensics maintains significant reliance on the software it uses to acquire and investigate forms of digital evidence. Without these tools, analysis of digital devices would often not be possible. Despite such levels of reliance, techniques for validating digital forensic software are sparse and research is limited in both volume and depth. As practitioners pursue the goal of producing robust evidence, they face the onerous task of both ensuring the accuracy of their tools and, their effective use. Whilst tool errors provide one issue, establishing a tool's limitations also provides an investigatory challenge leading the potential for practitioner user-error and ultimately a grey area of accountability. This article debates the problems surrounding digital forensic tool usage, evidential reliability and validation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号