首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   361篇
  免费   25篇
各国政治   11篇
工人农民   54篇
世界政治   14篇
外交国际关系   10篇
法律   227篇
中国政治   9篇
政治理论   59篇
综合类   2篇
  2023年   5篇
  2022年   4篇
  2021年   6篇
  2020年   10篇
  2019年   23篇
  2018年   28篇
  2017年   12篇
  2016年   25篇
  2015年   16篇
  2014年   17篇
  2013年   46篇
  2012年   20篇
  2011年   19篇
  2010年   11篇
  2009年   10篇
  2008年   16篇
  2007年   21篇
  2006年   21篇
  2005年   18篇
  2004年   16篇
  2003年   10篇
  2002年   8篇
  2001年   4篇
  2000年   1篇
  1998年   3篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1989年   1篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1982年   1篇
  1974年   2篇
排序方式: 共有386条查询结果,搜索用时 15 毫秒
61.
There has naturally been a good deal of discussion of the forthcoming General Data Protection Regulation. One issue of interest to all data controllers, and of particular concern for researchers, is whether the GDPR expands the scope of personal data through the introduction of the term ‘pseudonymisation’ in Article 4(5). If all data which have been ‘pseudonymised’ in the conventional sense of the word (e.g. key-coded) are to be treated as personal data, this would have serious implications for research. Administrative data research, which is carried out on data routinely collected and held by public authorities, would be particularly affected as the sharing of de-identified data could constitute the unconsented disclosure of identifiable information.Instead, however, we argue that the definition of pseudonymisation in Article 4(5) GDPR will not expand the category of personal data, and that there is no intention that it should do so. The definition of pseudonymisation under the GDPR is not intended to determine whether data are personal data; indeed it is clear that all data falling within this definition are personal data. Rather, it is Recital 26 and its requirement of a ‘means reasonably likely to be used’ which remains the relevant test as to whether data are personal. This leaves open the possibility that data which have been ‘pseudonymised’ in the conventional sense of key-coding can still be rendered anonymous. There may also be circumstances in which data which have undergone pseudonymisation within one organisation could be anonymous for a third party. We explain how, with reference to the data environment factors as set out in the UK Anonymisation Network's Anonymisation Decision-Making Framework.  相似文献   
62.
This article considers how the impact of art research can be evidenced, particularly the impact for general audiences through exhibitions or similar public events. This article uses thematic analysis to identify and then structure the types of evidence used in sixty-three selected impact case studies from the Research Excellence Framework 2014. The article then analyzes how the types of evidence are used and identifies opportunities to strengthen the evidence of impact. The focus is on the impact for the general public.  相似文献   
63.
64.
Abstract

‘Tied’ or ‘in-kind’ international food aid has been criticised as an implicit form of export subsidy that governments use to circumvent export subsidy restrictions. In addition to displacing agricultural exports, food aid is less efficient than untied aid and depresses local agricultural production in recipient countries. I argue that tied food aid is not protected by the Uruguay Round Agreement on Agriculture and could consequently be challenged under the World Trade Organization's dispute settlement mechanism as a prohibited or actionable subsidy contrary to the Subsidies and Countervailing Measures (scm) Agreement. As the USA is both the largest donor of international food aid and most consistently ties its food aid to domestic agricultural producers, this paper focuses on US policy to describe the challenge that might be advanced under the scm Agreement.  相似文献   
65.
66.
Abstract

Participants attempted to select previously studied faces from lineups that were administered either sequentially (test faces presented one at a time) or simultaneously (test faces presented altogether). Target discriminability was manipulated by varying the number of facial features that could be used to distinguish the study face from the other test faces (foils) or by varying study face exposure duration. In addition, decision criterion level was manipulated via an instruction manipulation. Results indicated that sequential participants adopted a stricter decision standard under high criterion instructions compared to simultaneous participants. Under liberal criterion setting instructions, the rate at which the target was selected was comparable across lineup procedures. Target discriminability affected target selections to a greater extent in simultaneous compared to sequential lineups. We discuss the applied implications that these findings have regarding correct identifications from lineups.  相似文献   
67.
Abstract

Much of what is known about sexual offenders is based on correctional samples and then applied across settings based on the assumption that this group is homogeneous. In this study, 149 files were compared, including 108 cases from the forensic mental health system (FMH) and 41 cases from the correctional system (COR). Although many similarities were observed between the FMH and COR groups, the results also revealed important differences. The FMH group was characterised by more frequent hospitalisations, higher rates of major mental illness and single status. The COR group was characterised by a history of physical and sexual abuse, family history of addictions, more intrusive sexual offences and higher rates of offending. These results highlight different profiles for sexual offenders in forensic mental health and correctional settings and challenge us to consider the implications for assessment, treatment and risk management of this unique group of sexual offenders.  相似文献   
68.
This survey of three hundred and twenty undergraduate students attempted to determine their knowledge of crime and punishment in North Carolina. Respondents answered a series of open- and closed-ended questions regarding various legal topics, such as statutory rape and the legal ages for tobacco and alcohol use. The participants were also asked to list punishments for various offenses, such as possession of marijuana, driving while intoxicated, and rape. They were then asked to define certain legal terms such as larceny. The results indicated that most students were unable to provide correct corresponding punishments for many offenses. They were also unable to accurately define various legal terms, such as robbery or rape. The implications for stronger education in the area of criminal justice are discussed.  相似文献   
69.
Recent research has begun to examine whether participants in dating violence studies perceive any benefit from the research and/or experience emotional distress as a result of having participated. Such information is important for Institutional Review Boards (IRBs) and researchers in determining ethical and appropriate protections for participants. In the current study, we examined participants’ reactions to answering questions on dating violence victimization and perpetration utilizing a sample of female college students (N?=?282). We also examined whether distress tolerance was associated with research reactions and moderated the relation between reports of victimization/perpetration and negative emotional reactions to the research. Findings demonstrated that negative emotional reactions to the research did not differ between individuals with or without previous dating violence. Further, distress tolerance had a main effect, but not a moderating effect, on negative emotional reactions to research participation. Implications of these findings for future research and IRBs are discussed.  相似文献   
70.
Parental substance abuse is a major factor in families experiencing foster care placement, yet little is known about the potential of screening in determining risk or identifying subpopulations for which elevated risk occurs. One Midwestern state recently implemented screening. This research uses information gathered as part of the screen's implementation to conduct a latent class analysis. The research was extended to provide a detailed examination of differences in child and family characteristics across classes, and to compare the screen results with caseworker impressions. Three distinct typologies emerged, with the high-risk and moderate-risk designations comprising only one quarter of the cases.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号