全文获取类型
收费全文 | 170篇 |
免费 | 5篇 |
专业分类
各国政治 | 27篇 |
工人农民 | 22篇 |
世界政治 | 8篇 |
外交国际关系 | 8篇 |
法律 | 82篇 |
中国政治 | 2篇 |
政治理论 | 24篇 |
综合类 | 2篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 4篇 |
2020年 | 4篇 |
2019年 | 3篇 |
2018年 | 5篇 |
2017年 | 3篇 |
2016年 | 5篇 |
2015年 | 3篇 |
2014年 | 5篇 |
2013年 | 18篇 |
2012年 | 6篇 |
2011年 | 11篇 |
2010年 | 6篇 |
2009年 | 7篇 |
2008年 | 3篇 |
2007年 | 3篇 |
2006年 | 3篇 |
2005年 | 1篇 |
2004年 | 10篇 |
2003年 | 3篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 5篇 |
1998年 | 4篇 |
1997年 | 6篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 4篇 |
1993年 | 5篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1989年 | 2篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1980年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1975年 | 3篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有175条查询结果,搜索用时 93 毫秒
41.
42.
43.
44.
Litigation is being transformed by new visual communication technologies, including videoconferencing, PowerPoint, and computer animations. Yet the effects of these visual technologies on legal decision making are largely unknown. In order to understand better the most pressing issues surrounding technology in the courtroom, psychologists, lawyers, and representatives from technology companies and funding agencies attended a Research Conference on Courtroom Technology organized by the Federal Judicial Center. The goals of the conference were to identify issues raised by courtroom uses of new technologies that could be illuminated by empirical research and to suggest designs and methods for conducting that research. This paper emerged from that conference. The authors provide an overview of considerations that should guide research in this area, including a framework that takes into account features of the technology, the audience, and the legal strategy of the user of the technology. They outline a paradigm for conducting such research, illustrate it with several possible empirical studies of varying levels of experimental and conceptual complexity, and identify directions for subsequent research. 相似文献
45.
The NIBRS data program currently being implemented by the FBI and local lawenforcement agencies has by now produced sufficient data for archiving anddistribution. Although not representative of crime in the United States, existing NIBRS data can be used to investigate the nature of crimesknown to the police compared to the traditional UCR data. The Bureau ofJustice Statistics has requested the National Archive of Criminal JusticeData to store and make NIBRS data available to interested users. The datafrom 1996 will shortly be available from the NACJD web site. The 1996 datacontain almost 6.5 million records and the FBI's full file includes about 361 Mbytes of data. The data have been disaggregated from the FBI's complex single file into 11 segment levels or record types. This makes theindividual record types easier and faster to analyze than using the fullfile, which more closely resembles a relational database than a hierarchicalfile. However, splitting apart the record types requires that specialprocedures be used to merge files of different record types, which would benecessary if a user were interested in analyzing variables appearing in morethan one record type (e.g., comparing offender and victim ages). These procedures are described, and a test comparing the time to run a simple frequencycount using the full file against the merged files shows that using themerged files is considerably more efficient. Also discussed are some futuredevelopments to facilitate the analysis of NIBRS data. 相似文献
46.
47.
The intergenerational transmission of running away: Childhood experiences of the parents of runaways
Research into the etiology of running away has long provided evidence for the influence of family factors such as abuse, parent-child conflict, and child stress on an adolescent's decision to leave home. This paper offers evidence for the possibility that running away may be deeply entrenched in patterns of family interaction that extend across generations. Using data from the National Incidence Study of Missing, Abducted, Runaway, and Throwaway Children (NISMART), the influence of parents' own childhood experiences with running away on the behaviors of their children is illustrated. The importance of examining the influence of such intergenerational transmission factors, separate and in addition to more traditional predictors of running away, is demonstrated.This research was supported in part by funds from the Office of Juvenile Justice and Delinquency Prevention under Contract No. 91-JN-CX-0005. An earlier version of this paper was presented at the meetings of the American Society of Criminology in New Orleans, Louisiana, November 1992.Received a Ph.D. in sociology from the University of New Hampshire. Present research interests are in the area of criminal victimization of children.Received a doctoral degree in sociology from the University of New Hampshire. Current research interests focus on missing and abducted children. 相似文献
48.
Peggy Phelan 《Women & Performance》2013,23(1):19-26
Pedro Almodóvar and Judith Butler's respective projects have long shared an interest in the performativity of gender. More recently, Butler has turned her attention to thinking of rupture as constitutive of identity. Talk to Her reveals a similar turn in the director's work. This essay argues that Talk to Her employs the figure of a comatose woman who awakens in order to investigate the condition of wakefulness as a newly achieved consciousness. In doing so, the director also investigates the parameters of his own authorial condition: alternately embodied and disembodied, he reveals it to be effectively dispossessed. This essay rotates around the opening five minutes of the film, which introduce, in parallel, the space of the theater and that of the hospital–one a space of silence and the other a space for ‘talk,’ a place where the impetus of narrative cures. I argue that these two spaces underscore our condition of existing as bodies. I furthermore consider the role that melodrama–a genre described by its inclination toward embodiment, muteness, and excess–plays in articulating these themes. 相似文献
49.
This article explores the role of perception management as a doctrinal concept in the construction and deconstruction of threats. Threat construction involves a continual, reciprocal and constitutive relationship between the attribution of meaning and practice. It takes place in an environment changed by the multiple forces of the so-called information revolution, in which discursive links are forged between technology and victory as well as between scientific progress and military superiority. Through articulation and enactment, information and information technology are represented as both threatening and threatened in three dimensions: dependency on information as data, possible loss of information superiority, and loss of control over information as image. The enemy ‘Other’ in these threat constructions is everywhere and nowhere at the same time, and is seen as being greatly empowered by the same tools that empower the United States military establishment. But while, for many military actors, regaining control in the information domain through technological innovation seems more or less straightforward, the immaterial battlefield of perception proves harder to master. We purport that military strategists do not seem to fully grasp the illusionary nature of the belief that the information space is a thing to be shaped at will and without restrictions. 相似文献
50.