首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   196篇
  免费   10篇
各国政治   8篇
工人农民   15篇
世界政治   13篇
外交国际关系   9篇
法律   124篇
中国政治   6篇
政治理论   29篇
综合类   2篇
  2023年   4篇
  2022年   1篇
  2021年   3篇
  2020年   4篇
  2019年   8篇
  2018年   17篇
  2017年   7篇
  2016年   15篇
  2015年   12篇
  2014年   7篇
  2013年   31篇
  2012年   11篇
  2011年   8篇
  2010年   11篇
  2009年   8篇
  2008年   12篇
  2007年   9篇
  2006年   6篇
  2005年   4篇
  2004年   5篇
  2003年   5篇
  2002年   5篇
  2001年   3篇
  2000年   2篇
  1999年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
  1987年   1篇
  1982年   1篇
  1978年   1篇
  1970年   1篇
排序方式: 共有206条查询结果,搜索用时 15 毫秒
71.
72.
73.
This article analyses the disputed election of President Park Geun-hye and her administration’s confrontation of left-nationalist politicians and other social movements during her first year in office. We argue that the Park administration’s policies resonate with contemporary discussions of “post-democratisation,” a process whereby social rights are increasingly subordinated to market logics and state power insulated from popular challenges. Under the conservative governments of Lee Myung-bak and Park Geun-hye, this process has been animated by a mode of confrontation known in South Korea as “politics by public security.” This politics targets social conflict and political dissent as threats to national security and has involved both illegal interventions by state institutions – such as the 2012 electoral interference by state agencies including the National Intelligence Service – and a cultural politics that affirms but revises the narrative of Korean democratisation by obfuscating the nature of the democracy movement and by attempting to restore the honour of conservative forces associated with former dictatorships. In order to better understand this conjuncture, we explore its origin within a tacit alliance between both former public security prosecutors-cum-conservative politicians and a movement of conservative intellectuals known as the New Right.  相似文献   
74.
75.
The shortage of foster/adoptive parents being licensed to care for children in the public welfare system prompted an evaluation of the Licensure and Home Study Process (LHSP). Ecological systems theory framed the barriers-to-resources interplay among kinship and non-relative caregivers who withdrew or completed the LHSP. This mixed-methods study examined differences in applicant characteristics and types of barriers experienced. Results indicated that applicants responsible for other children in the home paired with welfare system barriers served as a tipping point for withdrawal. Relatives encountered the most barriers and all grandparents withdrew from the LHSP prior to licensure.  相似文献   
76.

Purpose

Psychopathy and psychopathic personality traits (PPT) have been linked to a long list of negative life outcomes. To date, however, few studies have provided a systematic analysis of whether psychopathic personality traits contribute to increased health burden. The current study was designed to address this gap in the literature.

Method

This study analyzed data from the National Longitudinal Study of Adolescent Health and employed a measure of PPT derived from the five-factor model of personality. Analyses were conducted using OLS, logistic, and Poisson regression techniques.

Results

The results revealed that relatively higher scores on psychopathic personality traits were associated with a slight increase in a wide range of negative health outcomes. These significant associations were detected for both males and females.

Conclusions

We speak to the importance of these findings for the potential to reduce health burden among psychopaths and those who score relatively high on measures of psychopathic personality traits.  相似文献   
77.
Criminality information practices involve public authorities in the UK (and elsewhere) gathering, retaining and sharing information that connects with an identifiable individual; all with the ostensible aim of upholding and improving standards of public protection. This piece first charts the landscape of contemporary criminality information practices in the UK today. The article then examines recent legal emphases and policy directions for public protection networks. Consideration is then given in the piece to privacy rights and values and the difficulties in providing an exact typology and grounding for these. The piece then outlines a suggested framework for correct legal regulation, as well as a through commentary on the work done by Catherine Bellamy et al. to empirically determine the extent to which public protection information sharing can in fact occur in correct adherence to legal regulation. A socio-legal analysis is undertaken of the nature of public protection networks as variants on Goffman's performance teams within a dramaturgical routine that foregrounds stigmatisation of perceived ‘risky’ individuals as an aspect of that routine. This piece also explores the processes of institutional isomorphism as a reaction to shifting policy directions and legal doctrines, acting as a driving force towards a hierarchical performance of criminality information practices by public protection networks. Three conclusions are offered up for consideration: firstly, that the growing complexity of the law and regulation relating to criminality information practices might improve privacy values in the criminal justice system and help to add precision to necessary processes of stigmatisation in relation to the aim of public protection. Secondly, that these shifts in the law still need ongoing revisions, in order that a hierarchical approach to criminality information practices can be arrived at over time. Thirdly, that if the permanency of potential stigmatisation through the indefinite retention of criminality information cannot change, due to the competing pressure on the criminal justice system from public protection duties, then consultation with ‘risky’ individuals where practicable, before criminality information connected to them is shared across public protection networks becomes essential as a privacy-enhancing value and practice.  相似文献   
78.
Abstract

We introduce the latest member of the intelligence family. Joining IMINT, HUMINT, SIGINT and others is ‘SOCMINT’ – social media intelligence. In an age of ubiquitous social media it is the responsibility of the security community to admit SOCMINT into the national intelligence framework, but only when two important tests are passed. First, that it rests on solid methodological bedrock of collection, evidence, verification, understanding and application. Second, that the moral hazard it entails can be legitimately managed. This article offers a framework for how this can be done.  相似文献   
79.
We use National Incident-Based Reporting System (NIBRS) data and an AutoRegressive Integrative Moving Average (ARIMA) study design to investigate the effect of moon illumination on reported crime occurring outdoors between the hours of 10 pm to 2 am in 13 U.S. states and the District of Columbia. Prior research analyzed a confounded dependent variable that amalgamated indoor and outdoor crimes. This situation is problematic in that there is little reason to speculate a relationship between moon illumination and indoor crime because artificial illumination is used within dwellings. Findings show that while moon illumination has little influence on total crime and indoor crime, the intensity of moonlight does have a substantive positive effect on outdoor criminal activity. As moon illumination intensifies, outdoor crime increases markedly. Plausible explanations for this relationship are discussed.  相似文献   
80.
A screening instrument for detecting intimate partner violence (IPV) was developed using indirect questions. The authors identified 5 of 18 items studied that clearly distinguished victims of IPV from a random group of health conference attendees with a sensitivity of 85% and a specificity of 87%. This 5-item instrument (SAFE-T) was then tested on 435 women presenting to three emergency departments and the results compared to a direct question regarding current abuse. The SAFE-T questions detected only 54% of the women who admitted being abused and correctly classified 81% of the women who said they were not victims. The 1-year prevalence of IPV in this sample of women presenting to an emergency department was 11.6%. The authors conclude that indirect questioning of women appears to be more effective at ruling out IPV in an emergency department population and may be less useful for women "early" in an abusive relationship.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号