首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   82篇
  免费   2篇
工人农民   6篇
世界政治   3篇
外交国际关系   5篇
法律   58篇
政治理论   11篇
综合类   1篇
  2022年   1篇
  2021年   1篇
  2020年   2篇
  2019年   4篇
  2018年   4篇
  2017年   3篇
  2016年   4篇
  2014年   3篇
  2013年   20篇
  2012年   5篇
  2011年   5篇
  2010年   2篇
  2009年   2篇
  2008年   2篇
  2007年   4篇
  2006年   1篇
  2005年   1篇
  2004年   1篇
  2002年   1篇
  2001年   3篇
  2000年   3篇
  1999年   2篇
  1997年   1篇
  1995年   1篇
  1992年   1篇
  1990年   2篇
  1988年   2篇
  1983年   1篇
  1981年   1篇
  1973年   1篇
排序方式: 共有84条查询结果,搜索用时 19 毫秒
41.
We build on the tradition of studying images in international relations by developing a theory of perceived relationships and their associated images. The psychological theory is connected to a set of assumptions drawn from international relations theory that suggest perceived strategic relationships can be conceived of as a function of perceived relative power, perceived culture, and the perceived threat or perceived opportunity that a subject believes another actor represents. We hypothesize that perceived relationships evoke both cognitive and affective processes that lead to at least four ideal typical images. We further hypothesize that enemy, ally, colony, and degenerate images have identifiable and interrelated components. We test to see if the component parts of these images are related to each other, if the overall image affects the processing and interpretation of new information, and if strategic foreign policy choices follow from the cognitive and affective aspects of the image. The findings indicate that three of the four images are unified schemata, used even by inexperienced analysts. We find further that affect in combination with cognition does predict policy choice in the case of the enemy image. We suggest that image theory is a promising means by which foreign policy and international relations may be fruitfully studied.  相似文献   
42.
Arteriovenous malformations of the scalp are potential sources of serious bleeding because of their location, inherent weakness, and high flow rates. A 40-year-old man used his vascular lesion as a means of suicide. Selected aspects of the historical background, diagnosis, and treatment of these vascular disorders are described.  相似文献   
43.
44.
Interpretations of antemortem and perimortem trauma are complicated when dealing with cases involving extreme exposure to fire. This investigation attempts to discern the signatures of perimortem trauma from heat related trauma. Femora of domestic pig, sus scrofa, with minimal soft tissue and articulated patellae were subjected to varying traumatic forces. Skeletal elements were impacted with blunt and sharp forces, cut with varying instruments, subjected to torsional forces of shot. Bones were burned in various situations in conjunction with Knox County Rural/Metro Fire Department training exercises conducted in Knox County, Tennessee. Following recovery, fragments were subjected to radiographic, macroscopic, and microscopic analyses. Skeletal elements were reconstructed to permit accurate comparison with pre-fire visual records. In addition, fracture surfaces were examined under both transmitted light and scanning electron microscopy in an attempt to discern surface signatures of the causal fracture (trauma, heat, or situational). Results indicate that signatures of sharp force trauma remain evident following incineration. Furthermore, radiopaque spatter was not observed in any shot specimen. However, these initial findings suggest that the interpretation of blunt force and torsional trauma requires a rigorous examination and comparison of fracture patterns in conjunction with surface morphology.  相似文献   
45.
In Finland, more than one in four young females and almost one in three young males experienced some type of adversarial police contact in a year. The high prevalence of adversarial police contact among contemporary youth highlights the need to study the nature of the contacts and labelling theory’s hypothesis of control bias. Consequently, we develop the theory’s concept of social visibility to examine differential selection. We draw on a nationally representative youth survey to explore police contacts among youths aged 15 to 16 (N?=?5826). The open-ended responses suggested that police interventions typically focus on traffic situations or use of alcohol in public places. Also, we used multivariate logistic regression to examine which factors increase the likelihood of adversarial police contact. We found that a variety of delinquency and heavy alcohol use emerge as strong triggers of getting caught by the police. In addition, male gender, living in a city, having a single father, and low educational aspirations increases the likelihood of police contact, controlling for delinquency, and socio-demographic variables. Our findings seem to be consistent with mixed-model hypothesis, which highlights that both, differential involvement and selection, might operate together. We suggest that even in the Nordic conditions, which is characterised by high social equality, social biases seem to exist and some youth are more socially visible to formal social control than others.  相似文献   
46.
Over the past ten to fifteen years, an increasing number of social issues have become linked, and then subordinated, to security policy. This policy area has witnessed a paradigm shift, with the emergence of a new security mentality. The crumbling of the walls built up during the Cold War, and the collapse of the Soviet empire, meant the disappearance of the East versus West polarity. And as this world order, based on a balance of terror, passed into history, the nature of the global threat situation was transformed. The antagonisms of the Cold War had hardly had time to cease creating fear before new threat images emerged onto the scene. Unlike the Cold War situation, where world peace was threatened by a frenetic arms race between two highly concrete superpowers, the perceived threats of the 1990s became increasingly vague. The military menace was superseded by what was said to be a much more diffuse criminal threat. For what is it that lies concealed behind such concepts as ‘cross‐border crime’, ‘organized crime’, ‘terrorism’ and the like? Previously, security policy analysts had been able to localize the source of a given threat with precision. Their benchmark was now gone, however. Once the established geographical demarcations between Us and Them ceased to apply, it was found that the enemy might instead be in our midst.  相似文献   
47.
Based on official election records from East German constituencies, this paper examines the importance of strategic voting in German Bundestag elections. The results show that: (1) voters do indeed cast strategic ballots; (2) overall, the CDU and SPD benefit most often from strategic votes; (3) up to 9% of voters in the constituency cast strategic votes; and (4) that number was large enough to tip the scales in a number of constituencies, thus affecting the allocation of surplus seats in the Bundestag.  相似文献   
48.
49.
50.
The objective of this article is to analyse the structure of, and trends in, reported occupational safety crimes. The central focus is directed at analysing how we might understand the substantial increase in the number of reported offences witnessed during the first decade of the 21st century. In order to analyse trends in occupational safety crimes we proceed from both official crime statistics and data that have been compiled specifically for the purposes of this study, including a nationally representative sample of offence reports relating to the occupational safety crimes reported to the police. The results show that the increase in reported offenses is primarily due to a shift in definitions and in the reactions of the authorities rather than to a powerful increase in the number of actual crimes committed. This leads to the conclusion that registered occupational safety offences should first and foremost be viewed as a measure of the work of the authorities, rather than as an indicator of real crime trends.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号