首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   84篇
  免费   2篇
各国政治   9篇
工人农民   13篇
世界政治   6篇
外交国际关系   2篇
法律   51篇
政治理论   5篇
  2021年   1篇
  2020年   4篇
  2019年   7篇
  2018年   6篇
  2017年   6篇
  2016年   5篇
  2015年   2篇
  2014年   3篇
  2013年   13篇
  2012年   7篇
  2011年   3篇
  2010年   2篇
  2009年   6篇
  2008年   5篇
  2007年   3篇
  2006年   2篇
  2005年   2篇
  2004年   2篇
  2003年   1篇
  2001年   1篇
  2000年   1篇
  1998年   1篇
  1988年   1篇
  1986年   1篇
  1981年   1篇
排序方式: 共有86条查询结果,搜索用时 15 毫秒
41.
The perpetration of bullying is a significant issue among researchers, policymakers, and the general public. Although researchers have examined the link between bullying and subsequent antisocial behavior, data and methodological limitations have hampered firm conclusions. This study uses longitudinal data from 411 males in the Cambridge Study in Delinquent Development from ages 8 to 56 in order to examine the relationship between adolescent bullying and distinct late middle adulthood trajectories of offending, in which different groups of males follow different offending pathways. Results show that self-reported bullying predicts only certain adult offending trajectories but that the effect becomes insignificant once controls are introduced for childhood risk factors, although this may be due to the small number of the most chronic offenders. Study implications and directions for future research are noted.  相似文献   
42.
43.
This study examined the relationship among child abuse (physical, emotional, and sexual), social support from friends and family, and social functioning in a sample of low-income African American children (N?=?152). With the exception of the association between sexual abuse and peer support, all of the correlations among study variables were significant. The relationship between child physical and emotional abuse and social functioning were mediated by both family and peer support; however, only family (not peer) support was a significant mediator in the sexual abuse-social functioning link. Additionally, there was no difference found in the strength of mediation via family support versus peer support. Results suggest that mental health professionals should inquire about and attempt to increase children’s levels of social support from family and peers when working with abused youth in order to promote healthy psychological and psychosocial outcomes.  相似文献   
44.
ABSTRACT

Security Sector Reform (SSR) remains a key feature of peacebuilding interventions and is usually undertaken by a state alongside national and international partners. External actors engaged in SSR tend to follow a normative agenda that often has little regard for the context in post-conflict societies. Despite recurrent criticism, SSR practices of international organisations and bilateral donors often remain focused on state institutions, and often do not sufficiently attend to alternative providers of security or existing normative frameworks of security. This article provides a critical overview of existing research and introduces the special issue on ‘Co-operation, Contestation and Complexity in Post-Conflict Security Sector Reform’. We explore three aspects that add an important piece to the puzzle of what constitutes effective SSR. First, the variation of norm adoption, norm contestation and norm imposition in post-conflict countries that might explain the mixed results in terms of peacebuilding. Second, the multitude of different security actors within and beyond the state which often leads to multiple patterns of co-operation and contestation within reform programmes. And third, how both the multiplicity of and tension between norms and actors further complicate efforts to build peace or, as complexity theory would posit, influence the complex and non-linear social system that is the conflict-affected environment.  相似文献   
45.
For the reliable quantification of Δ9-tetrahydrocannabinolic acid A (THCA-A), the biogenetic precursor of Δ9-tetrahydrocannabinol (THC), in biological matrices by LC-MS/MS and GC-MS(/MS), an isotopically labeled internal standard was synthesized starting from Δ9-tetrahydrocannabinol-D(3) (THC-D(3)). Synthesis strategy was based on a method reported by Mechoulam et al. in 1969 using magnesium methyl carbonate (MMC) as carboxylation reagent for the synthesis of cannabinoid acids. Preliminary experiments with THC to optimize yield of the product (THCA-A) resulted in the synthesis of the positional isomer tetrahydrocannabinolic acid B (THCA-B) as a byproduct. Using the optimized conditions for the desired isomer, THCA-A-D(3) was prepared and isolated with a yield of approx. 10% after two synthesis cycles. Isotope purity was estimated to be >99% by relative abundance of the molecular ions. The synthesized compound proved to be suitable as an internal standard for quantification of THCA-A in serum and hair samples of cannabis consumers.  相似文献   
46.
This study examined the relations between childhood maltreatment, daily life hassles, and intimate partner violence among low-income, suicidal, abused African American women (N = 208). Findings indicated a significant association between childhood maltreatment and intimate partner violence, such that women who experienced childhood maltreatment were more likely to experience intimate partner violence as adults than those who reported no childhood maltreatment history. Also, results from bootstrapping analyses revealed that daily life stressors mediated the link between childhood maltreatment and both physical and nonphysical forms of intimate partner violence. These findings highlight the importance of thoroughly assessing for a history of childhood maltreatment, current intimate partner violence, and the nature and extent of daily hassles when working with low-income African American women, as well as helping abused women with a history of childhood maltreatment to cope effectively with the daily life hassles that they encounter.  相似文献   
47.
Which opportunities due to digitization are exploited by criminals? And how do criminals gather the required ICT-expertise to take advantage of these opportunities? This exploratory study provides insight into criminals seeking ICT-expertise by analyzing five Dutch cases. This paper shows that criminals seeking ICT-expertise take advantage of companies and employees in the ICT-sector that act in a gray area. It is noteworthy that the initial contact of criminals seeking ICT-expertise is often immediately directed to criminal collaboration. In these cases, ‘capacity’ is more important than ‘contact’. Furthermore, this paper discusses the role of forums for criminals seeking ICT-expertise. Criminals take advantage of the transfer of knowledge on forums and the existence of crimeware-as-a-service. Finally, this study falsifies the statement that there is a clear division between traditional offender groups taking advantage of the possibilities arising from ICT, and crime groups operating exclusively online. In practice, there are many connections between online and offline activities.  相似文献   
48.
In this case study we want to reduce the gap in research on the influence of organized interests at the federal state level. We analyse the “Gesetz zur Stärkung von innerstädtischen Geschäftsquartieren” (INGE) by applying social network analysis and statistical models. First, we show that the set of actors changes compared to the federal level. Second, we find that striving for influence pays off for non-state actors because influential actors find themselves close to the law. Third, we explain the degree of the actors’ influence. An OLS-regression shows that formal resources like governmental power as well as informal resources such as expertise and support increase influence. The use of informal resources is reflected in interactions in communication networks and specific network positions. Furthermore, we discuss this specific process of interaction between state and societal actors from the point of view of democratic theory.  相似文献   
49.
Improvements have been made in identifying the prevalence of risk factors/indicators for violent extremism. A consistent problem is the lack of base rates. How to develop base rates is of equal concern. This study has two aims: (i) compare two methods for developing base rates; the Unmatched Count Technique (UCT) and direct questioning, (ii) generate base rates in a general population sample and compare these to a sample of lone-actor terrorists (n = 125). We surveyed 2108 subjects from the general population. Participants were recruited from an online access panel and randomly assigned to one of three conditions; direct survey, control, or UCT. Survey items were based on a lone-actor terrorist codebook developed from the wider literature. Direct questioning was more suitable under our study conditions where UCT resulted in deflation effects. Comparing the base rates identified a number of significant differences: (i) lone-actor terrorists demonstrated propensity indicators related to a cognitive susceptibility, and a crime- and/or violence-supportive morality more often; the general sample demonstrated protective factors more often, (ii) lone-actor terrorists demonstrated situational indicators related to a crime- and/or violence-supportive morality more often, whereas the general sample experienced situational stressors more often, (iii) lone-actor terrorists demonstrated indicators related to exposure to extremism more often. Results suggest there are measurable differences in the prevalence of risk factors between lone-actor terrorists and the general population. However, no single factor “predicts” violent extremism. This bears implications for our understanding of the interrelation of risk and protective factors, and for the risk assessment of violent extremism.  相似文献   
50.
We investigate the impact of policy consistency on frontline workers’ perceptions of policy meaningfulness and legitimacy. The results from an experiment involving 779 teachers indicate that policy consistency does have a positive effect on legitimacy and to a lesser extent on meaningfulness. However, the extent depends on policy content and the degree of autonomy. Overall, our findings emphasize the potential positive impact of policy consistency. Although this, to some extent, conflicts with the nature of political decision‐ and policy‐making (i.e., democratically elected governments have been mandated to change policy), our study suggests that policy consistency could be a valuable strategy for governments to strengthen successful policy implementation. This adds a new perspective to the continuing debate within policy implementation and street‐level bureaucracy research on how to account for the complex, messy and sometimes contradictory implementation of public policies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号