首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   324篇
  免费   11篇
各国政治   25篇
工人农民   17篇
世界政治   48篇
外交国际关系   14篇
法律   153篇
中国政治   4篇
政治理论   73篇
综合类   1篇
  2023年   4篇
  2022年   1篇
  2021年   2篇
  2020年   4篇
  2019年   10篇
  2018年   8篇
  2017年   11篇
  2016年   12篇
  2015年   6篇
  2014年   6篇
  2013年   46篇
  2012年   9篇
  2011年   13篇
  2010年   7篇
  2009年   4篇
  2008年   7篇
  2007年   13篇
  2006年   11篇
  2005年   6篇
  2004年   10篇
  2003年   10篇
  2002年   7篇
  2001年   11篇
  2000年   11篇
  1999年   13篇
  1998年   12篇
  1997年   5篇
  1996年   4篇
  1995年   6篇
  1994年   6篇
  1993年   2篇
  1992年   8篇
  1991年   4篇
  1989年   7篇
  1988年   2篇
  1987年   2篇
  1986年   6篇
  1985年   7篇
  1984年   1篇
  1982年   5篇
  1981年   2篇
  1980年   2篇
  1979年   3篇
  1978年   3篇
  1977年   2篇
  1976年   1篇
  1974年   2篇
  1973年   1篇
排序方式: 共有335条查询结果,搜索用时 15 毫秒
161.
162.

This study (N = 218) examines potential moderators of the confidence–accuracy (CA) relation in eyewitness identifications. The design included five experimental interventions (accountability, context reinstatement, retrospective narration, hypothesis disconfirmation, and hypothesis generation), as well as one trait measure (public self-consciousness). Although the interventions were hypothesized to enhance the CA relation relative to a control condition, they did not do so. In fact, quite contrary to our initial expectations, only participants in the control condition displayed unqualified insight into their identification accuracy. We conclude that attempts to enhance awareness of the thoughts and reasoning process involved in an identification decision may frequently have minimal, or even counterproductive, effects. Instead, results of decision process measures suggest that the CA relation might be more effectively enhanced by increasing the salience of relatively automatic decision criteria (e.g., “did his face 'pop out' at me?”) and decreasing the salience of algorithmic identification strategies (e.g., “was I thorough in making my decision?”).

  相似文献   
163.
At all levels, governments around the world are moving toward the provision of open data, that is, the direct provision to citizens, the private sector, and other third parties, of raw government datasets, controlled by a relatively permissible license. In tandem with this distribution of open data is the promotion of civic hackathons, or “app contests” by government. The civic hackathon is designed to offer prize money to developers as a way to spur innovative use of open data, more specifically the creation of commercial software applications that deliver services to citizens. Within this context, we propose that the civic hackathon has the potential to act in multiple ways, possibly as a backdoor to the traditional government procurement process, and as a form of civic engagement. We move beyond much of the hype of civic hackathons, critically framing an approach to understanding civic hackathons through these two lenses. Key questions for future research emphasize the emerging, and important, nature of this research path.  相似文献   
164.
165.

Objective

Involuntary commitment and treatment (IC&T) of people affected by mental illness may have reference to considerations of dangerousness and/or need for care. While attempts have been made to classify mental health legislation according to whether IC&T has obligatory dangerousness criteria, there is no standardised procedure for making classification decisions. The aim of this study was to develop and trial a classification procedure and apply it to Australia's mental health legislation.

Method

We developed benchmarks for ‘need for care’ and ‘dangerousness’ and applied these benchmarks to classify the mental health legislation of Australia's 8 states and territories. Our focus was on civil commitment legislation rather than criminal commitment legislation.

Results

One state changed its legislation during the course of the study resulting in two classificatory exercises. In our initial classification, we were able to classify IC&T provisions in legislation from 6 of the 8 jurisdictions as being based on either ‘need for care’ or ‘dangerousness’. Two jurisdictions used a terminology that was outside the established benchmarks. In our second classification, we were also able to successfully classify IC&T provisions in 6 of the 8 jurisdictions. Of the 6 Acts that could be classified, all based IC&T on ‘need for care’ and none contained mandatory ‘dangerousness’ criteria.

Conclusions

The classification system developed for this study provided a transparent and probably reliable means of classifying 75% of Australia's mental health legislation. The inherent ambiguity of the terminology used in two jurisdictions means that further development of classification may not be possible until the meaning of the terms used has been addressed in case law. With respect to the 6 jurisdictions for which classification was possible, the findings suggest that Australia's mental health legislation relies on ‘need for care’ and not on ‘dangerousness’ as the guiding principle for IC&T.  相似文献   
166.
This study examined the interrelationships among mattering to friends, self-esteem, spirituality, and perpetration of relational aggression in friendships among 457 college students. While the three self-belief variables were positively related to each other, only spirituality and mattering to friends discriminated between men and women. Women reported higher spirituality and mattering to friends, and men reported slightly higher self-esteem. Perpetration of relational aggression was negatively related to mattering to friends and self-esteem and was not related to spirituality. Findings are discussed in light of Erikson's theory of adolescent development and Gilligan's theory of interpersonal relationships.  相似文献   
167.
The Yellowstone to Yukon Conservation Initiative (Y2Y) was created in 1993 to advance conservation in a 1.2 million km2 portion of the North American Rocky Mountains. We assembled 21 people with influence over Y2Y in a workshop to elucidate perspectives on challenges and solutions for this organization at a key point in its evolution, and used Q method to define four perspectives on challenges and three on solutions. Participants were differentiated by four models for effecting change—vision-based advocacy, practice-based learning, political engagement, and scientific management—with emphasis on the first three. Those with authority in Y2Y aligned with vision-based advocacy and expressed ambivalence about practice-based adaptive learning and rigorous appraisals of existing strategies. Workshop results were consistent with an apparent trend toward organizational maturation focused on stabilizing revenues, developing formal organizational arrangements, and focusing strategies. Consolidation of power in Y2Y around a long-standing formula does not bode well for the effectiveness of Y2Y. We recommend that leaders in Y2Y and similar organizations focused on large-scale conservation to create and maintain an open system—philosophically and operationally—that capitalizes on the diverse perspectives and skills of individuals who are attracted to such efforts. We also recommend that the Y2Y initiative be followed closely to harvest additional lessons for potential application to large-scale conservation efforts elsewhere.  相似文献   
168.
EU update     
This is the latest edition of Baker & McKenzie’s column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
169.
The purpose of this study is to test the accuracy of seven discriminant function equations that have been derived by Steyn and Is?an for sex determination using measurements of the femur and tibia of South Africans of European descent (SAED). While the validity of some of the discriminant functions has been assessed by the authors who derived them, no previous independent study has been carried out to assess the accuracy of these equations. These equations have not been tested on skeletons located outside of the Gauteng province. A suite of measurements were taken on 272 femora and 256 tibiae obtained from four South African skeletal collections. The validity of each of the previously published equations for the femur was confirmed. However, two functions of the tibia showed low accuracy rates, most likely due to difficulties in recording the distal epiphyseal breadth measurement, and thus were found to be poor assessors of sex.  相似文献   
170.
This article examines how the Judicial Committee of the Privy Council makes constitutional comparisons between ‘related’ constitutions that are or were within its jurisdiction, deploying its own precedents, as a pragmatic method of resolving idiosyncratic questions that arise across multiple constitutions. In particular, it considers the Committee's approach to the longstanding question of the interpretation of the opening section of Caribbean constitutional bills of rights, which has far reaching implications for the scope of constitutional protection of human rights. The JCPC's answer over time to this question reveals the fault lines for this supranational constitutional court as its jurisdiction peters out yet remains. The gaze of comparativism is very harsh as older constitutions are evaluated in light of newer ones and also as fossilised constitutional interpretations presented in earlier JCPC cases where the Committee no longer has jurisdiction are given new life in contemporary cases.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号