首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   133篇
  免费   2篇
各国政治   3篇
工人农民   2篇
世界政治   8篇
外交国际关系   3篇
法律   76篇
政治理论   36篇
综合类   7篇
  2022年   1篇
  2021年   2篇
  2020年   3篇
  2019年   4篇
  2018年   1篇
  2017年   4篇
  2016年   2篇
  2015年   2篇
  2014年   5篇
  2013年   19篇
  2012年   8篇
  2011年   18篇
  2010年   3篇
  2008年   8篇
  2007年   5篇
  2006年   7篇
  2005年   3篇
  2004年   3篇
  2003年   7篇
  2002年   9篇
  2001年   2篇
  2000年   2篇
  1999年   2篇
  1998年   2篇
  1996年   3篇
  1994年   2篇
  1992年   2篇
  1988年   1篇
  1987年   1篇
  1983年   1篇
  1977年   1篇
  1976年   1篇
  1966年   1篇
排序方式: 共有135条查询结果,搜索用时 15 毫秒
111.
This introductory essay summarizes the contents of the papers presented at a conference in honor of Gebhard Kirchgässner entitled “(Macro-)Economic Policy and Public Choice” which are published in this special issue. In addition to this brief overview on the contributions, this essay relates them to the scientific works of Gebhard Kirchgässner after locating the latter within the realm of Public Choice analysis.  相似文献   
112.
ABSTRACT

Based on one specially created corpus of U.S. cybersecurity-related laws, this study employs the corpus approach to examine the referent objects and securitizing actors in U.S. cybersecurity legislative discourse, which are two critical issues in constructing security, including cybersecurity. Through corpus data analysis, it is found that unlike traditional security, cybersecurity has become more people-oriented in terms of referent objects with critical infrastructure as a key referent object. Additionally, the role of private sectors and cooperative security are highlighted in U.S. cybersecurity legislative discourse. From a sociosemiotic perspective, it is noted that the meaning-making process of U.S. cybersecurity not only is conveyed by the texts but also interacts with other sign systems, such as historical background, cyberspace as a virtual realm and social contexts, which suggests that the specific meanings of signs constructing cybersecurity and cybersecurity itself should be interpreted in specific temporal or spatial contexts. Furthermore, a sociosemiotic approach to U.S. cybersecurity legislative discourse also offers valuable insights to how signs and concepts in cybersecurity contribute to sketching a holistic landscape of cybersecurity and further security on a large scale.  相似文献   
113.
Good news and bad news: evidence of media bias in unemployment reports   总被引:1,自引:0,他引:1  
Marcel Garz 《Public Choice》2014,161(3-4):499-515
This study employs information obtained from media content analyses, as well as economic and political data, to investigate negativity in unemployment news between 2001 and 2010 in Germany. The data indicate a substantial bias in terms of the amounts of negative and positive reports, compared with the actual development of unemployment. Moreover, the media tend to place negative unemployment reports more prominently than positive ones. The estimates suggest that the bias is not the consequence of journalists asymmetrically interpreting the official unemployment numbers. Instead, it is associated with the exploitation of often non-economic information and structural influences in the process of news production.  相似文献   
114.
Policymakers and the public widely believe that punishment can reduce crime and therefore improve security. Empirical data, however, prove the preventive effect of punishment to be very limited at best. Especially, the assumption that imposing longer sentences will reduce crime rates seems erroneous. In our opinion, this misconception is due to a confusion of time perspectives: Criminal law necessarily looks back to the past, as it reacts to a deed. Security, on the other hand, means preventing dangers, and its focus must be the future. Hence, time orientation of criminal law and the logic of protection clash. Criminal law cannot provide the security wished for. The same mistake is repeated in the prevalent theories of punishment, notably the relative or unified theories of punishment. Security cannot be achieved or fostered through harsher punishment or punishment threats. On the other hand, one means of decreasing crime is increasing the number of policemen.  相似文献   
115.
The past decades have been characterized by a growing number of nonstate actors (NSAs) involved in global governance. However, despite this growth, only a small number of NSAs have been able to maintain a prolonged global presence over a substantial period of time. To explain why some NSAs are more active, we rely on resource dependence theory. We demonstrate that sustained advocacy over time can be explained by a density dependence mechanism, namely the more NSAs mobilize, the lower the chance that individual NSAs will prolong their global advocacy efforts. Analysis of data stemming from a unique data set of 5,627 NSAs active at the global climate conferences demonstrates that much advocacy in this field is indeed of an incidental nature, namely a large number of groups attend once and never return.  相似文献   
116.
Indian snakeroot (Rauvolfia serpentina) is a valuable forest product, root extracts of which are used as an antihypertensive drug. Increasing demand led to overharvesting in the wild. Control of international trade is hampered by the inability to identify root samples to the species level. We therefore evaluated the potential of molecular identification by searching for species‐specific DNA polymorphisms. We found two species‐specific indels in the rps16 intron region for R. serpentina. Our DNA barcoding method was tested for its specificity, reproducibility, sensitivity and stability. We included samples of various tissues and ages, which had been treated differently for preservation. DNA extractions were tested in a range of amplification settings and dilutions. Species‐specific rps16 intron sequences were obtained from 79 herbarium accessions and one confiscated root, encompassing 39 different species. Our results demonstrate that molecular analysis provides new perspectives for forensic identification of Indian snakeroot.  相似文献   
117.
Slimming cactus (Hoodia), found only in southwestern Africa, is a well‐known herbal product for losing weight. Consequently, Hoodia extracts are sought‐after worldwide despite a CITES Appendix II status. The failure to eradicate illegal trade is due to problems with detecting and identifying Hoodia using morphological and chemical characters. Our aim was to evaluate the potential of molecular identification of Hoodia based on DNA barcoding. Screening of nrITS1 and psbAtrnH DNA sequences from 26 accessions of Ceropegieae resulted in successful identification, while conventional chemical profiling using DLI‐MS led to inaccurate detection and identification of Hoodia. The presence of Hoodia in herbal products was also successfully established using DNA sequences. A validation procedure of our DNA barcoding protocol demonstrated its robustness to changes in PCR conditions. We conclude that DNA barcoding is an effective tool for Hoodia detection and identification which can contribute to preventing illegal trade.  相似文献   
118.
119.
In this serial experiment, five human bones with known post-mortem intervals (PMI) in a soil environment from five different epochs (0.2 to approximately 2000 years) were tested in a blind setup with two established rapid tests for the identification of human blood traces (Hexagon-OBTI test and RSID blood test). Based on previous study results concerning the usability of the Luminol test for the first assessment of the PMI of osseous remains, the question arising was whether those test procedures, which are highly sensitive for the detection of human blood components, could also be used to narrow down the post-mortem interval. Five test series were conducted applying modified standard protocols of the manufactures. The aim was to find out whether with prior reaction steps or a prolonged time of incubation hemoglobin or its metabolites can be dissolved from the bone and positive test results can be achieved dependent on the PMI. Four test series yielded negative results for all bone samples and one test series a uniformly weak positive result. The results indicate that rapid tests based on the detection of blood are not suitable for the determination of the PMI of bone samples despite the modification of the standard protocols. Further thorough research is required to clarify the postmortem degradation of hemoglobin in bones.  相似文献   
120.
The identification of decomposed corpses found in domestic settings is frequently problematic because comparative material for methods such as forensic odontostomatology, comparative X-ray analysis, or DNA analysis, is not available. In the case presented here, a photograph from an old, expired passport could be used to successfully identify a "domestic setting" corpse in a skull-photo superimposition. In an additional DNA analysis, 13 STR-loci could be amplified from tissue samples taken from the corpse. DNA comparison with the presumed brother of the deceased yielded a probability of 97.09% for siblingship. Y-STR-analysis was, therefore, performed. The results showed that all of the systems for the presumed brother and the corpse conformed, with the exception of the DYS390 locus, in which allele 21 was found for the corpse and allele 22 for the brother. Despite the rapid development of other identification procedures, skull-photo superimpositions remain an important means of identification. Last not least this is due to the increasing ubiquity of personal photo documents in the age of digital photography. The validity of the results from a DNA analysis in an identification process depends largely on the authenticity of the samples available for comparison and the degree to which the DNA from the corpse is preserved. In the case presented by the authors, positive identification of the corpse solely on the basis of the DNA analysis would not have been possible. Numerous constellations can be imagined for decomposed corpses found in domestic settings for which skull-photo superimpositions may be the only possible option for identifying the corpse.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号