首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   126篇
  免费   4篇
各国政治   3篇
工人农民   12篇
世界政治   2篇
外交国际关系   2篇
法律   94篇
中国政治   1篇
政治理论   15篇
综合类   1篇
  2022年   1篇
  2021年   2篇
  2020年   9篇
  2019年   2篇
  2018年   5篇
  2017年   4篇
  2016年   4篇
  2015年   4篇
  2014年   5篇
  2013年   31篇
  2012年   4篇
  2011年   4篇
  2010年   5篇
  2009年   4篇
  2008年   6篇
  2007年   2篇
  2006年   7篇
  2005年   4篇
  2004年   4篇
  2003年   3篇
  2002年   4篇
  2001年   2篇
  2000年   2篇
  1996年   2篇
  1993年   2篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1987年   1篇
  1986年   1篇
  1984年   1篇
排序方式: 共有130条查询结果,搜索用时 31 毫秒
121.
122.
123.
124.

Objective

This article explores patterns of terrorist activity over the period from 2000 through 2010 across three target countries: Indonesia, the Philippines and Thailand.

Methods

We use self-exciting point process models to create interpretable and replicable metrics for three key terrorism concepts: risk, resilience and volatility, as defined in the context of terrorist activity.

Results

Analysis of the data shows significant and important differences in the risk, volatility and resilience metrics over time across the three countries. For the three countries analysed, we show that risk varied on a scale from 0.005 to 1.61 “expected terrorist attacks per day”, volatility ranged from 0.820 to 0.994 “additional attacks caused by each attack”, and resilience, as measured by the number of days until risk subsides to a pre-attack level, ranged from 19 to 39 days. We find that of the three countries, Indonesia had the lowest average risk and volatility, and the highest level of resilience, indicative of the relatively sporadic nature of terrorist activity in Indonesia. The high terrorism risk and low resilience in the Philippines was a function of the more intense, less clustered pattern of terrorism than what was evident in Indonesia.

Conclusions

Mathematical models hold great promise for creating replicable, reliable and interpretable “metrics” to key terrorism concepts such as risk, resilience and volatility.  相似文献   
125.
The effect of retrieval support on eyewitness recall was investigated in two experiments. Based on the outshining hypothesis, Experiment 1 tested whether retrieval support enhances witness performance (compared to free recall) especially when witnessing conditions are suboptimal (e.g., because witnesses were distracted during the crime). Eighty-eight participants watched a videotaped crime with either full or divided attention and subsequently received retrieval support with the Self-Administered Interview© (SAI) or completed a free recall (FR). One week later (Time 2 – T2) all participants completed a second FR. Unexpectedly, retrieval support did not lead to better memory performance than FR under divided attention conditions, suggesting that retrieval support is not effective to overcome adverse effects of divided attention. Moreover, presence of retrieval support at Time 1 (T1) had no effect on memory performance at T2. Experiment 2 (N = 81) tested the hypothesis that these T2-results were due to a reporting issue undermining the memory-preserving effect of T1-retrieval support by manipulating retrieval support (SAI vs. FR) at T1 and T2. As expected, T1-retrieval support led to increased accuracy at T2. Thus, the beneficial value of T1-retrieval support seems greatest with high-quality T2-interviews. Interviewers should consider this when planning a subsequent interview.  相似文献   
126.
When planning large-scale incidents or bombing campaigns, terrorists often conduct reconnaissance research to identify key targets. This may include taking photographs of potential target locations. Identifying an effective real-time method to distinguish between genuine photographers and those with more sinister intent may be beneficial for law enforcement and security agencies. Participants took photographs in a public place with a genuine intent (truth tellers) or sinister intent (liars). After taking these photographs, the participants were approached by an undercover interviewer (a mime artist) who asked them whether he could see the photographs. Later, the participants discussed their photographs in a formal interview. First, liars were less cooperative in their interaction with the undercover interviewer than truth tellers. Second, in the formal interview, liars mentioned some security features that appeared in the photographs more than truth tellers. The findings suggest that ‘using photographs to detect deception’ is a subject that could prove important to explore to benefit forensic and counter-terrorist practice.  相似文献   
127.
ABSTRACT

A considerable proportion of crimes involve multiple perpetrators. Yet, little is known about how police officers construct, administer, and record eyewitness identification procedures for multiple suspects. An online survey of law enforcement agents in Sweden, Belgium, and the Netherlands (N?=?51) was conducted to obtain an initial understanding of police perceptions of prevalence and characteristics of multiple perpetrator crimes, and to examine identification procedure practices given the little to no guidance provided for police. Practice converged when it came to the use of sequential, photographic lineups, but diverged between and within countries on whether or not suspects of multiple perpetrator crimes should be placed in separate lineups. Results specifically highlight contextual cuing as one critical area for future research in identification for multiple perpetrator crimes (i.e. placing multiple suspects in the same lineup or asking eyewitnesses to look for a specific suspect).  相似文献   
128.
The postwar years in Spain were little more than the perpetuation of the Civil War on an ideological terrain, as the Franco Regime consistently vilified the memory of the Second Republic and remorselessly persecuted the defeated Republicans. In fact, nationalist diatribes against communism and its attendant ills of separatism and laicism were invariably expounded in medical terminology, referring as they did to the “cancer” and “virus” which had devastated the nation during the Civil War. This empirically unverifiable theory sustained that a large scale extermination (the Civil War) had to be carried out to rid Spain of this “virus” thus preempt the contagion of this fervently Catholic and patriotic nation. Horkheimer affirms that the family is the microcosm of the fascist state, as the relationship between siblings and parents replicates the obedience of the citizen to the fascist state. As Republican traits were at antipodes to the prescribed national attributes, the Francoist State sought to destroy the Republican family by a myriad of measures such as the inculcation of a zealous National Catholicism in their children, which in turn precipitated both selfhatred and the children's outright rejection of their parents. However, the social persecution of the defeated transcended indoctrination: in the postwar years, the horrendousness of life for the Republicans was compounded by the State's quasi reconversion policy, which resulted in Republican children being forcibly removed from their homes, and been adopted by pro-Francoist families, or in many cases, rehoused by religious orders which, within a decade, witnessed a huge increase in the number of supposed orphans becoming seminarists. In this article, I intend to elaborate on both the means by which the Francoist State eradicated the Republican family, and its long-term consequences.  相似文献   
129.
The New Jersey Supreme Court's recent decision in Farmers Mutual Fire Insurance Company of Salem v. New Jersey Property-Liability Insurance Guaranty Association holding that a 2004 statutory amendment requires all solvent triggered liability policies be exhausted before the Guaranty Association pays statutory benefits for an insolvent's share has created many uncertainties in allocating long-tail liabilities. This article discusses the implications and the significant limitations of the Farmers Mutual decision and the questions it leaves unanswered, and responds to arguments that the decision supports revisiting other situations where New Jersey's Owens-Illinois methodology allocates losses to the insured.  相似文献   
130.

Objectives

Third Party Policing (TPP) involves partnerships between police and third parties where the legal powers of third parties are harnessed to prevent or control crime problems. This paper explores the characteristics and mechanisms of TPP as a crime control strategy, focusing on how the partnership approach in policing can help sustain crime control gains over the long run. Using the ABILITY Truancy Trial as an example, I examine how policing can contribute to long-term social change for high-risk young people living in poor-performing school districts and high-risk communities.

Methods

The ABILITY Trial includes 102 young truants randomly allocated to a control (business-as-usual) or an experimental condition. The experimental condition activates the key theoretical components of Third Party Policing (TPP): a partnership between police and participating schools that activates and escalates (where needed) jurisdictional truanting laws (the legal lever).

Results

The paper presents a theoretical discussion of TPP and uses the ABILITY Trial to highlight the way TPP works in practice. Baseline data are presented for the ABILITY Trial. Outcome results are not presented.

Conclusions

Third Party Policing partnerships rest on the capacity of police to build relationships with third parties who have a stake in the crime problem, who possess responsive regulation legal levers, and who have a clear mandate to offer long-term solutions and help sustain the crime control gains. Partnerships, I argue, offer long-term solutions for police because they activate latent mechanisms, building the capacity for third parties to both maintain short-term gains and sustain the crime control gains beyond the lifespan of the initial police intervention.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号