首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   170篇
  免费   5篇
各国政治   27篇
工人农民   22篇
世界政治   8篇
外交国际关系   8篇
法律   82篇
中国政治   2篇
政治理论   24篇
综合类   2篇
  2023年   1篇
  2022年   1篇
  2021年   4篇
  2020年   4篇
  2019年   3篇
  2018年   5篇
  2017年   3篇
  2016年   5篇
  2015年   3篇
  2014年   5篇
  2013年   18篇
  2012年   6篇
  2011年   11篇
  2010年   6篇
  2009年   7篇
  2008年   3篇
  2007年   3篇
  2006年   3篇
  2005年   1篇
  2004年   10篇
  2003年   3篇
  2002年   4篇
  2001年   2篇
  2000年   2篇
  1999年   5篇
  1998年   4篇
  1997年   6篇
  1996年   3篇
  1995年   2篇
  1994年   4篇
  1993年   5篇
  1992年   4篇
  1991年   2篇
  1990年   3篇
  1989年   2篇
  1988年   3篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1982年   3篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1975年   3篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
排序方式: 共有175条查询结果,搜索用时 93 毫秒
41.
42.
43.
44.
Litigation is being transformed by new visual communication technologies, including videoconferencing, PowerPoint, and computer animations. Yet the effects of these visual technologies on legal decision making are largely unknown. In order to understand better the most pressing issues surrounding technology in the courtroom, psychologists, lawyers, and representatives from technology companies and funding agencies attended a Research Conference on Courtroom Technology organized by the Federal Judicial Center. The goals of the conference were to identify issues raised by courtroom uses of new technologies that could be illuminated by empirical research and to suggest designs and methods for conducting that research. This paper emerged from that conference. The authors provide an overview of considerations that should guide research in this area, including a framework that takes into account features of the technology, the audience, and the legal strategy of the user of the technology. They outline a paradigm for conducting such research, illustrate it with several possible empirical studies of varying levels of experimental and conceptual complexity, and identify directions for subsequent research.  相似文献   
45.
The NIBRS data program currently being implemented by the FBI and local lawenforcement agencies has by now produced sufficient data for archiving anddistribution. Although not representative of crime in the United States, existing NIBRS data can be used to investigate the nature of crimesknown to the police compared to the traditional UCR data. The Bureau ofJustice Statistics has requested the National Archive of Criminal JusticeData to store and make NIBRS data available to interested users. The datafrom 1996 will shortly be available from the NACJD web site. The 1996 datacontain almost 6.5 million records and the FBI's full file includes about 361 Mbytes of data. The data have been disaggregated from the FBI's complex single file into 11 segment levels or record types. This makes theindividual record types easier and faster to analyze than using the fullfile, which more closely resembles a relational database than a hierarchicalfile. However, splitting apart the record types requires that specialprocedures be used to merge files of different record types, which would benecessary if a user were interested in analyzing variables appearing in morethan one record type (e.g., comparing offender and victim ages). These procedures are described, and a test comparing the time to run a simple frequencycount using the full file against the merged files shows that using themerged files is considerably more efficient. Also discussed are some futuredevelopments to facilitate the analysis of NIBRS data.  相似文献   
46.
47.
Research into the etiology of running away has long provided evidence for the influence of family factors such as abuse, parent-child conflict, and child stress on an adolescent's decision to leave home. This paper offers evidence for the possibility that running away may be deeply entrenched in patterns of family interaction that extend across generations. Using data from the National Incidence Study of Missing, Abducted, Runaway, and Throwaway Children (NISMART), the influence of parents' own childhood experiences with running away on the behaviors of their children is illustrated. The importance of examining the influence of such intergenerational transmission factors, separate and in addition to more traditional predictors of running away, is demonstrated.This research was supported in part by funds from the Office of Juvenile Justice and Delinquency Prevention under Contract No. 91-JN-CX-0005. An earlier version of this paper was presented at the meetings of the American Society of Criminology in New Orleans, Louisiana, November 1992.Received a Ph.D. in sociology from the University of New Hampshire. Present research interests are in the area of criminal victimization of children.Received a doctoral degree in sociology from the University of New Hampshire. Current research interests focus on missing and abducted children.  相似文献   
48.
Pedro Almodóvar and Judith Butler's respective projects have long shared an interest in the performativity of gender. More recently, Butler has turned her attention to thinking of rupture as constitutive of identity. Talk to Her reveals a similar turn in the director's work. This essay argues that Talk to Her employs the figure of a comatose woman who awakens in order to investigate the condition of wakefulness as a newly achieved consciousness. In doing so, the director also investigates the parameters of his own authorial condition: alternately embodied and disembodied, he reveals it to be effectively dispossessed. This essay rotates around the opening five minutes of the film, which introduce, in parallel, the space of the theater and that of the hospital–one a space of silence and the other a space for ‘talk,’ a place where the impetus of narrative cures. I argue that these two spaces underscore our condition of existing as bodies. I furthermore consider the role that melodrama–a genre described by its inclination toward embodiment, muteness, and excess–plays in articulating these themes.  相似文献   
49.
This article explores the role of perception management as a doctrinal concept in the construction and deconstruction of threats. Threat construction involves a continual, reciprocal and constitutive relationship between the attribution of meaning and practice. It takes place in an environment changed by the multiple forces of the so-called information revolution, in which discursive links are forged between technology and victory as well as between scientific progress and military superiority. Through articulation and enactment, information and information technology are represented as both threatening and threatened in three dimensions: dependency on information as data, possible loss of information superiority, and loss of control over information as image. The enemy ‘Other’ in these threat constructions is everywhere and nowhere at the same time, and is seen as being greatly empowered by the same tools that empower the United States military establishment. But while, for many military actors, regaining control in the information domain through technological innovation seems more or less straightforward, the immaterial battlefield of perception proves harder to master. We purport that military strategists do not seem to fully grasp the illusionary nature of the belief that the information space is a thing to be shaped at will and without restrictions.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号