首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   231篇
  免费   8篇
各国政治   12篇
工人农民   12篇
世界政治   12篇
外交国际关系   15篇
法律   125篇
中国政治   1篇
政治理论   62篇
  2023年   2篇
  2022年   1篇
  2021年   5篇
  2020年   7篇
  2019年   6篇
  2018年   17篇
  2017年   7篇
  2016年   17篇
  2015年   8篇
  2014年   20篇
  2013年   36篇
  2012年   14篇
  2011年   24篇
  2010年   9篇
  2009年   7篇
  2008年   8篇
  2007年   7篇
  2006年   7篇
  2005年   4篇
  2004年   1篇
  2003年   6篇
  2002年   5篇
  2001年   3篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1995年   2篇
  1987年   1篇
  1984年   1篇
  1980年   1篇
  1979年   2篇
  1978年   3篇
  1977年   1篇
  1976年   1篇
  1975年   2篇
排序方式: 共有239条查询结果,搜索用时 0 毫秒
201.
202.
Ronald Dworkin's recently published book, Sovereign Virtue (hereafter SV), appeals to arguments that are popular within, and ideas that are fundamental to, liberal egalitarianism. These arguments and ideas need to be distinguished and unpacked. The purpose of this paper is partly to do this and to cast doubt on the adequacy of various moves made by Dworkin. In addition, and more importantly I argue that the analysis of the 'equality of what?' debate reveals a tension at the heart of contemporary liberal egalitarianism between the Kantian aspiration to eliminate luck and the contemporary aspiration to do political philosophy without metaphysics.  相似文献   
203.
Crimes Against Businesses: The Way Forward for Future Research   总被引:1,自引:0,他引:1  
  相似文献   
204.
This study cross-validates a short aggression inventory using a sample of 250 law enforcement professionals. The instrument under investigation is the 12-question modified version of the Buss-Perry Aggression Scale (Buss & Perry, 1992). Statistical and external validation methods were used to ascertain the appropriateness of this scale's use with law enforcement professionals. Confirmatory factor analyses revealed that both the firstorder, four-factor model, {ie12-1}, GFI=.94, NFI=.84, NNFI=.88, and CFI=.91, and the second-order model with a single, global Aggression “super” factor, {ie12-2}, GFI=.94, NFI=.84, NNFI=.89, and CFI=.91, provided a reasonable goodness-of-fit to the data. Subscales of this instrument correlated meaningfully with departmental measures of citizen complaints for physical and verbal aggression by officers, as well as the number of shooting incidents in which the officers were involved. The need for a short measure of aggression is discussed and applications in law enforcement are offered.  相似文献   
205.
206.
207.
Recent advances in immunology have provided a foundation of knowledge to understand many of the intricacies involved in manipulating the human response to fight parasitic infections, and a great deal has been learned from malaria vaccine efforts regarding strategies for developing parasite vaccines. There has been some encouraging progress in the development of a Chagas vaccine in animal models. A prize fund for Chagas could be instrumental in ensuring that these efforts are translated into products that benefit patients.  相似文献   
208.
209.
210.
The popular social networking site, Facebook, recently launched a facial recognition tool to help users tag photographs they uploaded to Facebook. This generated significant controversy, arising as much as anything, from the company’s failure to adequately inform users of this new service and to explain how the technology works.The incident illustrates the sensitivity of facial recognition technology and the potential conflict with data privacy laws. However, facial recognition has been around for some time and is used by businesses and public organisations for a variety of purposes – primarily in relation to law enforcement, border control, photo editing and social networking. There are also indications that the technology could be used by commercial entities for marketing purposes in the future.This article considers the technology, its practical applications and the manner in which European data protection laws regulate its use. In particular, how much control should we have over our own image? What uses of this technology are, and are not, acceptable? Ultimately, does European data protection law provide an adequate framework for this technology? Is it a framework which protects the privacy of individuals without unduly constraining the development of innovative and beneficial applications and business models?  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号