首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   159篇
  免费   9篇
各国政治   5篇
工人农民   6篇
世界政治   22篇
外交国际关系   11篇
法律   56篇
中国政治   2篇
政治理论   64篇
综合类   2篇
  2023年   7篇
  2022年   1篇
  2021年   2篇
  2020年   7篇
  2019年   8篇
  2018年   8篇
  2017年   10篇
  2016年   6篇
  2015年   4篇
  2014年   2篇
  2013年   31篇
  2012年   9篇
  2011年   4篇
  2010年   1篇
  2009年   2篇
  2008年   3篇
  2007年   3篇
  2006年   6篇
  2005年   5篇
  2004年   5篇
  2003年   6篇
  2002年   5篇
  2001年   4篇
  2000年   2篇
  1998年   1篇
  1997年   3篇
  1996年   2篇
  1995年   1篇
  1994年   5篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1988年   1篇
  1985年   1篇
  1982年   1篇
  1980年   2篇
  1979年   2篇
  1976年   1篇
  1970年   1篇
  1965年   1篇
排序方式: 共有168条查询结果,搜索用时 15 毫秒
31.
Hirshleifer  Jack  Osborne  Evan 《Public Choice》2001,108(1-2):169-195
In lawsuits, relative success depends upon two main factors:the true degree of fault, and the efforts invested on eachside. A proposed Litigation Success Function displays thisdependence while satisfying other essential properties. Undertwo different protocols, Nash-Cournot and Stackelberg,solutions are obtained for the litigation efforts,proportionate success, and values of the lawsuit on each side.Outcomes are evaluated in terms of two normative criteria; (i)achieving `justice' (interpreted as equality between Defendantfault and relative Plaintiff success) and (ii) minimizingaggregate litigation cost. Achievement of these aims isdetermined by the decisiveness of litigation effort relativeto true fault.  相似文献   
32.
CONNECTING ALL     
After joining China Mobile as an Internet of Things(lol)engineer in 2010,Chen Fang found that the Machine-to-Machine Center where he worked had only about a dozen employees.Now,the number stands at over 200."At that time,I worked to develop modems and sensors for smart home appliances,"said Chen,who received his master's degree in communication engineering from Chongqing University of Posts and Telecommunications.'The loT had just begun to develop in China back then."  相似文献   
33.
34.

Purpose

Conduct the first empirical intra-urban examination of community-level connections between street robbery and temperature. Examine whether community socioeconomic status (SES) and crime-relevant land uses strengthen or weaken the temperature impact. A theoretical framework relying on routine activity theory, crime pattern theory, and resident-based control dynamics organized predictions.

Data and methods

For Philadelphia census tracts (n = 381), monthly street robbery counts and temperature data for 36 consecutive months were combined with census and land use data, and analyzed with multilevel models.

Results

Community robbery counts were higher when temperatures were higher, and in lower SES communities. In support of previous work with property crime, but in contrast to previous work with assault, the effects of temperature were stronger in higher SES communities. In support of the integrated model, commercial land use prevalence and subway stations were associated with heightened temperature impacts on robbery.

Conclusions

Community-level fixed and random effects of temperature on urban robbery counts persist when controlling for land use and community structure; further, the random effects depend in part on both. There are implications for understanding indigenous guardianship or informal resident-based place management dynamics, and for planning seasonal police deployments.  相似文献   
35.
36.
Abstract

This article offers a broad conceptual framework for understanding the rise of common‐interest housing developments (CIDs), including gated communities, townhouse and condominium projects, and other planned communities. The article begins by describing the CID as an institution and the essential characteristics and varieties of CIDs. Second, the rapid spread of CIDs is attributed to the incentives currently operating on real estate developers, municipal governments, and consumers. Third, this institution is placed in the context of definitions of public and private, and the categories of state, market, and civil society.

The article then presents the eight different “big‐picture” interpretations of this overall phenomenon that could inform the public policy framework within which CIDs are situated. They can be seen as an imperfectly realized version of the “rational choice” or “public choice” model, and reform efforts should be aimed at making choice mechanisms more effective.  相似文献   
37.
ABSTRACT

To answer the question of who wants to work for the government, scholars have relied on a few approaches, including sector preference, sector-based comparison of work motives, and sector-switching patterns of job mobility. The present study offers a related but distinct approach: perceived sector mismatch. The attractiveness of public sector jobs differs greatly across countries; thus, in order to present a more comprehensive study, we examine data from the U.S., New Zealand, and Taiwan, where attitudes towards public sector jobs differ significantly as a result of different public service laws and traditions. Across all three samples, we find that, among private sector employees, the preference for a public service job is related to socio-economic disadvantage. Among public sector workers, reasons for perceived sector mismatch vary, but often suggesting job dissatisfaction in current public sector jobs, rather than perceived advantages of the private sector (including compensation). These findings are followed by theoretical and practical implications from this comparative study.  相似文献   
38.
The purpose of this paper is to analyze the efforts of the Project on Emerging Nanotechnologies (PEN) in seeking to influence nanotechnology policy in the United States. Using the conceptual framework of anticipatory governance to guide the analysis, a series of strategies that PEN adopted will be described, including leveraging external expertise, developing cross‐disciplinary research products, providing a future‐oriented view on policy analysis, and building a brand for communications and outreach. This case study is a useful example in demonstrating the recent conceptual shift away from relying on government‐led technology assessment efforts to consider the longer‐term implications of new technologies toward the concept of anticipatory governance that includes a more substantive role for nongovernmental actors, that in providing forward‐looking, actionable intelligence for decision makers. Considering the example of PEN also highlights the critical role that boundary‐spanning organizations play in linking together disparate communities of expertise.  相似文献   
39.
This study revisited the Philadelphia Foot Patrol Experiment and explored the longitudinal deterrent effects of foot patrol in violent crime hot spots using Sherman's (1990) concepts of initial and residual deterrence decay as a theoretical framework. It also explored whether the displacement uncovered during the initial evaluation decayed after the experiment ended. Multilevel growth curve models revealed that beats staffed for 22 weeks had a decaying deterrent effect during the course of the experiment, whereas those staffed for 12 weeks did not. None of the beats had residual deterrence effects relative to the control areas. The displacement uncovered had decayed during the 3 months after the experiment, and it is theoretically plausible that previously displaced offenders returned to the original target areas causing inverse displacement. These results are discussed in the context of Durlauf and Nagin's (2011) recent proposal that prison sentences should be shortened, mandatory minimum statutes repealed, and the cost savings generated by these policy changes shifted into policing budgets to convey more effectively the certainty of detection. It is concluded that if Durlauf and Nagin's proposal is to succeed, then more holistic policing strategies would likely be necessary. Foot patrol as a specific policing tactic seems to fit nicely into a variety of policing paradigms, and suggestions for incorporating them to move beyond strictly enforcement‐based responses are presented.  相似文献   
40.
Abstract

This article looks at an earlier episode in the history of the UK border security apparatus by examining how the immigration control system was used in the 1970s and 1980s to detect potential terrorists from the Middle East and North Africa. Using recently opened archival records, it shows that the UK government introduced a strict system of visa checks, interviews, and other measures to nearly all Middle Eastern and North African visitors to the UK to prevent the entry of suspected terrorist personnel. By using these highly arbitrary measures, it became the modus operandi of the UK authorities to treat all Middle Eastern and North Africans as potential terrorists until convinced otherwise.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号