首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   102篇
  免费   0篇
各国政治   2篇
工人农民   13篇
世界政治   3篇
外交国际关系   4篇
法律   60篇
中国政治   3篇
政治理论   15篇
综合类   2篇
  2020年   3篇
  2018年   5篇
  2017年   2篇
  2016年   2篇
  2015年   2篇
  2014年   4篇
  2013年   20篇
  2012年   1篇
  2011年   1篇
  2010年   4篇
  2009年   6篇
  2008年   5篇
  2007年   1篇
  2006年   5篇
  2005年   3篇
  2004年   4篇
  2003年   5篇
  2002年   3篇
  2001年   1篇
  2000年   1篇
  1999年   3篇
  1998年   1篇
  1997年   5篇
  1995年   2篇
  1994年   4篇
  1993年   2篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1982年   1篇
排序方式: 共有102条查询结果,搜索用时 46 毫秒
41.
The nexus with transnational organized crime is increasingly a focus for security planners in their analyses of terror groups. Their approach is best described by the phrase “methods, not motives.” While the motives of terrorists and organized criminals remain divergent most often, our research indicates this is not always the case. For that reason, this report argues that such a general approach has become too restrictive and can be misleading since the interaction between terrorism and organized crime is growing deeper and more complex all the time. In short, the lines of separation are no longer unequivocal. The report analyzes the relationship between international organized crime and terrorism in a systematic way in order to highlight the shortcomings of the “methods, not motives” argument. In so doing, the report considers the factors that most closely correspond to crime-terror interaction and identifies those regions of developed and developing states most likely to foster such interactions. Likewise, the paper will suggest an evolutionary spectrum of crime-terror interactions that serves as a common basis for discussion of such often used terms as “nexus.” The centerpiece of the report is a groundbreaking methodology for analysts and investigators to overcome this growing complexity, identify crime-terror interactions more quickly and to assess their importance with confidence. The approach is derived from a standard intelligence analytical framework, and has already proven its utility in law enforcement investigations. The report is the product of a recently concluded and peer-reviewed 18-month NIJ sponsored research project, and includes empirical evidence drawn from numerous case studies developed in the course of the research program. This project was supported by Grant No. 2003-IJ-CX-1019 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the authors and do not necessarily represent the official position or policies of the US Department of Justice. Research assistance on this project was provided by Allison Irby, Douglas M. Hart, Patricia A. Craig-Hart, Dr. Phil Williams, Steven Simon, Nabi Abdullaev, and Bartosz Stanislawski. Drafting and editing help was provided by Laura Covill.  相似文献   
42.
‘Strategic foresight’ is a technique used by institutions to prepare for a technology‐charged future. It involves considering how the institution might look in the future. In doing so, it enables the institution to prepare for and achieve the preferred future. This article explores what the process of strategic foresight has to offer common law criminal justice systems, with a particular emphasis on the role of expert evidence in criminal jury trials. A hypothetical vision for the future set in 2030, which foresees the adoption of technological advances in the courtroom, is compared and contrasted with processes from a 2012 murder trial. We examine how a well‐designed digital courtroom could enhance the delivery of expert evidence. Considering ‘alternative future law scenarios’ can illuminate what a legal system is likely to need in times to come and can identify the necessary steps for beneficial adaptation via research, policies, and training.  相似文献   
43.
Abstract

Cognitive–behavioural treatment of sexual offenders assumes that sexual offenders are motivated by deviant attitudes, perceptions and values. Although aspects of deviant schema can be assessed by questionnaires, self-report measures are limited by the respondent's willingness to be forthright and by the fact that, typically, these cognitive processes occur quickly, revealing signs of automaticity. Recent research by Smith and Waterman has suggested that the deviant schema of sexual offenders could be assessed using a version of the Stroop colour-naming task. Long latency periods to sexual colour words imply a longer information-processing route and evidence of pre-established (deviant) sexual cognitive schema. Stroop techniques may offer the advantage of eliminating limitations that arise when using self-report techniques, such as fakeability and social desirability concerns. The current study replicates and extends Smith and Waterman's results using samples of sexual offenders, non-sexual violent offenders and non-violent offenders. The cumulative results of the two studies suggests that Stroop techniques have promise, but that further work is required before measures are available that have sufficient reliability and validity to be used in applied contexts.  相似文献   
44.
The Velvet Revolution of 1989 ended the socialist period in former Czechoslovakia. Sixteen years after the transition toward democratic policing, we explore the integrity contours of the Czech police. In the summer of 2005, we surveyed more than 600 police officers from East Bohemia regarding their perceptions about the seriousness of police corruption, the appropriate punishment such misconduct deserves and would receive, and their willingness to report misconduct. The results indicate that the majority of the respondents correctly labeled behaviors described in our questionnaire as rule‐violating. Furthermore, with the exception of the least serious forms of corruption, they supported and expected the two most serious forms of discipline: a cut in salary and dismissal. Finally, the majority of the respondents said that they would not be willing to tolerate the most serious forms of corruption in silence.  相似文献   
45.
This article considers whether children born through assisted human reproduction are entitled to information about their biological origins. It examines the issue both from a clinical perspective, citing social science research and the personal narratives of donor‐conceived children, and from a legal perspective, outlining the extent of a child's “right to know” in different jurisdictions. The article suggests that a uniform legal approach is needed that will recognize the right of all children to access details about their identity and conception, for the sake of their psychological well‐being. The article includes a fact scenario that considers the situation of a donor‐conceived child who has become the subject of a custody dispute, and who has not been told the circumstances of his conception.  相似文献   
46.
Sibling violence is presumed to be the most common form of family violence and the least studied. Based on data from “Physical Violence in American Families, 1976,” this paper assesses the family environment factors associated with sibling physical violence. Of a range of potential family influences, measures of family disorganization were the most significant predictors of sibling violence, overriding the characteristics of children or particular family demands. What mattered most to the occurrence of sibling violence was a child’s actual experience of physical violence at the hands of a parent, maternal disciplinary practices and whether husbands lose their temper. These findings point to the deleterious effect of corporal punishment, and suggest sibling violence in families is associated with more ominous family and gender dynamics.
Shelley EriksenEmail:
  相似文献   
47.
48.
Prior research on the use of alcohol by police officers has shown that there are correlations between the officers’ alcohol consumption and stress or social relationships within the police sub-culture. By looking at 1,328 full time officers from municipal, county, and state departments, the researchers found that there were correlations between these two reasons as in prior literature. Surprisingly, the officers drew a clear distinction between drinking alcohol as a social outlet and drinking alcohol to fit in with their peers. As a result, this study explains a third reason the officers used when consuming alcohol. The officers most at risk for drinking problems admitted that fitting in was highest on their list of why they drank alcohol.  相似文献   
49.
ABSTRACT

The research project ‘Calling the Shots: Women and contemporary film culture in the UK, 2000–2015’ investigates contemporary women's film history through two primary routes: the statistical analyses of the numbers of women in six key above-the-line professions (director, writer, producer, executive producer, cinematographer and editor), and interviews with 50 women in those same roles (by August 2018 we had interviewed 58). This paper focuses specifically on the permutations of the interview process for constructing women's film history in the contemporary period. Taking into consideration the theoretical, methodological and political issues at stake in recording oral histories of working women filmmakers, we contemplate the consequences of collecting and writing history that is still in medias res.  相似文献   
50.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号