首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   143篇
  免费   11篇
各国政治   7篇
工人农民   10篇
世界政治   12篇
外交国际关系   1篇
法律   92篇
中国政治   5篇
政治理论   26篇
综合类   1篇
  2022年   2篇
  2021年   2篇
  2020年   5篇
  2019年   5篇
  2018年   15篇
  2017年   8篇
  2016年   8篇
  2015年   7篇
  2014年   4篇
  2013年   20篇
  2012年   4篇
  2011年   5篇
  2010年   4篇
  2009年   6篇
  2008年   1篇
  2007年   7篇
  2006年   8篇
  2005年   6篇
  2004年   7篇
  2003年   2篇
  2002年   4篇
  2001年   1篇
  2000年   3篇
  1999年   2篇
  1996年   1篇
  1994年   1篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1984年   2篇
  1983年   1篇
  1980年   2篇
  1979年   1篇
  1973年   1篇
  1966年   1篇
排序方式: 共有154条查询结果,搜索用时 31 毫秒
101.
102.
Counterinsurgency (COIN) doctrine is designed to combat a defined insurgency. In the present situation in Iraq, COIN's definition has been radically extended to include nation-building as well. This additional function has expanded the scope of the role of the Coalition Forces in Iraq. Yet COIN in its present incarnation may not be enough to finalize the implementation of the strategy of nation-building. This article finds three main criticisms/limitations of contemporary COIN strategy: (1) It is predicated on a classic notion of insurgency that looks very different from present conflicts. (2) Although COIN advocates a political solution to a political problem, it uses (by default) mainly military mechanisms to carry it out. (3) Completion of the intricate and ambitious tasks necessary to defeat insurgencies in foreign lands may lie outside the direct control of the United States.  相似文献   
103.
Attitudes towards social attachment and bonding were evaluated in groups of maximum (N = 48) and minimum (N=46) security prison inmates and compared with the attitudes of a group of 49 noncriminal college students. Three primary styles of attachment were considered: avoidant, ambivalent/anxious, and secure. It was predicted that the maximum security condition, a group hypothesized to contain a large number of lifestyle criminals, would evidence more of an avoidant style of attachment compared to minimum security inmates or a group of coliege student controls. Consistent with this hypothesis, the maximum security inmates exhibited greater avoidance in their attitudes towards relationships than subjects in the other two conditions. The implications of these results are discussed.  相似文献   
104.
Criminology and Genetically Modified Food   总被引:1,自引:0,他引:1  
  相似文献   
105.
The increased pressures which have been placed upon correctional institutions in the 1980’s have made the retention of quality correctional officers imperative. Yet many of these officers find prison work to be an unsatisfying experience. This paper attempts to measure levels of alienation among correctional officers and identify factors which may be related to its occurrence. The amount of alienation experienced by 126 correctional officers at a Western state prison was measured utilizing Dean’s Alienation Scale. Alienation levels were found to be related primarily to institutional, and opposed to non-institutional, variables. The implications for correctional administration are discussed.  相似文献   
106.
This article attempts to put forward a more holistic vision of hate crime causation by exploring the intersections which exist between three separate criminological theories. Within the extant literature both Robert Merton’s strain theory and Barbara Perry’s structured action theory of ‘doing difference’ have been widely used to explain why prejudice motivated crimes continue to pervade most communities. Together the theories help to illuminate the sociological factors which act to create immense fear of, and hatred towards, various minority identity groups. However, neither of these theories adequately explain why some individuals commit hate crimes while others, equally affected by socio-economic strains and social constructions of ‘difference’, do not. This article therefore moves beyond such macro explanations of hate crime by drawing upon Gottfredson and Hirschi’s A General Theory of Crime (1990). Using typology research carried out by various academics, the article attempts to illustrate how socio-economic strains and general fears of ‘difference’ become mutually reinforcing determinants, promulgating a culture of prejudice against certain ‘others', which in turn ultimately triggers the hate motivated behaviours of individuals with low self control.  相似文献   
107.
This paper develops a bicameral stability model wherein the conference committee serves as a vehicle for mutually advantageous bicameral exchange. The goal is to maintain a single party's bicameral majority. Majority party leaders use the conference committee to attenuate the outlying positions of House standing committees that threaten the bicameral majority. Conference outcomes favor the Senate because it is more vulnerable to party turnover. Statistical results on data from the U.S. Congress, 1949 through 1991, demonstrate that when one party holds a bicameral majority, a relative increase in conference bills preserves at the margin, Senate majority-party seats at the expense of House majority-party seats.  相似文献   
108.
Coding statements of criminal suspects facilitated tests of four hypotheses about differences between behavioral cues to deception and the incriminating potential (IP) of the topic. Information from criminal investigations corroborated the veracity of 337 brief utterances from 28 videotaped confessions. A four-point rating of topic IP measured the degree of potential threat per utterance. Cues discriminating true vs. false comprised word/phrase repeats, speech disfluency spikes, nonverbal overdone, and protracted headshaking. Non-lexical sounds discriminated true vs. false inthe reverse direction. Cues that distinguished IP only comprised speech speed, gesticulation amount, nonverbal animation level, soft weak vocal and “I (or we) just” qualifier. Adding “I don't know” to an answer discriminated both IP and true vs. false. The results supported hypothesis about differentiating deception cues from incriminating potential cues in high-stakes interviews, and suggested that extensive research on distinctions between stress-related cues and cues to deception would improve deception detection.  相似文献   
109.
This study examined the relationship between middle-school aggressive behaviors and young adults’ experiences as victims and perpetrators of intimate partner physical violence. As part of the Reach for Health longitudinal study, surveys were conducted with 977 8th graders who were resurveyed as young adults, when lifetime partner violence was assessed. In this economically disadvantaged sample, the prevalence of middle-school aggression and subsequent partner violence are high among both males and females. In middle school, 32% of girls and 42% of boys reported being in a recent fight and 12% of girls and 17% of boys had threatened another with a weapon. By the time they were 19–20 years old, about 35% of females and males reported being the victims of one or more forms of partner violence; 35% of females and 22% of males reported one or more forms of perpetration. Controlling for socio-demographic characteristics, middle-school aggression is a significant risk factor for partner victimization and perpetration. Early aggression remains an independent predictor of partner violence perpetration and victimization for males and perpetration for females when other middle-school risk behaviors and exposures to physical aggression in the childhood home are taken into account. To reduce partner violence through young adulthood, findings suggest the importance of early interventions that help adolescents learn non-violent strategies for resolving conflicts in cross-gender relationships.Principal Investigator for the study.Co-Principal Investigator and Senior Methodologist.Responsible for developing the survey instrument.Responsible for pilot testing the survey instrument and overseeing field operations.Responsible for data management and conducted statistical analyses.Responsible for convening the Community Advisory Board and developing the survey instrument.  相似文献   
110.
During periods of high unemployment, many workers exhaust their unemployment insurance (UI) benefits before regaining employment. To help alleviate this problem, Congress created the extended benefits (EB) program, expanding the number of weeks of benefits available to UI recipients in high unemployment states. The EB program operates by “triggering on” additional weeks of benefits in states where unemployment and UI benefit receipt are above federally established thresholds. We analyze the performance of the EB program by creating a series of policy simulations using weekly UI claims and unemployment data from the program's inception in 1970 through the most recent economic expansion in 2005. Overall, we find that EB triggers, as currently constructed, fail as a policy tool for extending UI benefits. Minor adjustments to the triggers are unlikely to be effective. We develop an alternative set of “fix point” triggers that allow the EB program to trigger on and off in a more timely fashion. These triggers outperform all previously legislated triggers as well as other commonly proposed triggering mechanisms on criteria of timeliness, breadth, and duration. © 2006 by the Association for Public Policy Analysis and Management  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号