首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   398篇
  免费   6篇
各国政治   21篇
工人农民   44篇
世界政治   52篇
外交国际关系   11篇
法律   164篇
中国政治   8篇
政治理论   102篇
综合类   2篇
  2023年   3篇
  2021年   2篇
  2020年   12篇
  2019年   7篇
  2018年   10篇
  2017年   9篇
  2016年   10篇
  2015年   6篇
  2014年   15篇
  2013年   58篇
  2012年   8篇
  2011年   8篇
  2010年   9篇
  2009年   15篇
  2008年   6篇
  2007年   19篇
  2006年   16篇
  2005年   14篇
  2004年   15篇
  2003年   10篇
  2002年   17篇
  2001年   10篇
  2000年   10篇
  1999年   7篇
  1998年   4篇
  1997年   7篇
  1996年   6篇
  1995年   2篇
  1994年   5篇
  1993年   5篇
  1992年   2篇
  1991年   7篇
  1990年   6篇
  1989年   6篇
  1988年   8篇
  1987年   2篇
  1986年   4篇
  1985年   2篇
  1984年   2篇
  1983年   6篇
  1982年   2篇
  1981年   9篇
  1980年   3篇
  1979年   7篇
  1978年   5篇
  1976年   1篇
  1975年   2篇
  1971年   1篇
  1970年   1篇
  1943年   1篇
排序方式: 共有404条查询结果,搜索用时 15 毫秒
71.
This paper provides an evaluation of consultations undertaken by Devon County Council and is based on interviews with over 40 managers. Information is supplied about the details given to consultees, the methodological expertise of council employees, the extent to which consultations were co-ordinated across the authority and the results/impact of the consultations. This evidence is used to identify issues with a widespread application.  相似文献   
72.
A call to awareness regarding sex trafficking has increased research, bolstered social justice efforts, improved education, and influenced federal laws that protect victims and prosecute traffickers. Federal laws on sex trafficking are now being used through undercover sting operations via the Internet to arrest and prosecute buyers who attempt to engage in commercial sex with minors. A narrative analysis was completed to create an in-depth case study outlining the correspondences between a buyer and an undercover agent advertising trafficked children for sex. Readers are afforded a rare opportunity to examine actual emails related to the purchase of a child for sexual exploitation. The emails were used against the buyer as evidence within the court of law. The authors assert that the following case study will contribute to the body of literature on the victim selection processes and cognitive distortions employed by buyers of children for sex.  相似文献   
73.
Two laboratory studies with 332 student participants investigated secondary confessions (provided by an informant instead of the suspect). Participants allegedly caused or witnessed a simulated computer crash, then were asked to give primary or secondary confessions during interrogation. Study 1 replicated the false evidence effect for primary confessions. Secondary confessions were obtained at a high rate, which was increased by false evidence in combination with incentive to confess. In Study 2 a confederate either confessed to or denied crashing the computer. Incentive increased the rate of secondary confession only in the presence of a denial; that is, incentive increased the number of false secondary confessions only. Implications for the use of incentives during informant interrogation are discussed.  相似文献   
74.
I am now yearning for my second home.China,you are very hard to get out of one’s system,and I will return in a couple of weeks!I have just spent three months back in Australia,where the cost of living is so high that it is almost impossible to live without a second source of income.Fortunately,in my case this comes from my writing.While in Australia I negotiated two contracts,one of which was  相似文献   
75.
This article discusses issues that restorative justice programs may face during implementation and lessons learned from an exploratory study. We examined various perspectives of multiple participants who experienced a Victim-Offender Mediation (VOM) program in a mid-sized Midwestern city in the U.S. The primary data source comprised 34 interviews with 37 participants including adult crime victims, juvenile offenders and their parents, mediators, and representatives from referring agencies. Observations complemented the interview data. Findings revealed patterns of victim marginalization during the processes used: victims were not prepared appropriately; were at times pressured by mediators to behave in certain ways; and, occasionally felt intimidated by offenders and/or their families. We discuss some factors that may have influenced the emergence of these patterns. This study revealed gaps between the guiding principles of restorative justice theory and field practices, particularly sensitivity toward victims to meet their needs. We suggest that restorative justice programs should consider using a monitoring system to ensure that the processes used remain consistent with the values and principles of restorative justice.  相似文献   
76.
77.
National identity is constructed through successive identifications with significant Others. This article discusses the phenomenon of change and continuity in Czech identity. It is focused here on the identification towards the EU, which has become the most significant Other of today in two ways: (a) (change) contributing to overcoming the identity crisis provoked by the drastic changes that occurred between 1989 and 1993 (change of regime, disappearance of the USSR and the break-up of Czechoslovakia), and therefore the subsequent drastic changes in relations with past significant Others: communism, the USSR, and the Slovaks; and (b) (continuity) reaffirming one of the fundamental elements during the national revival in the nineteenth century, democracy, upon which the various identifications towards the EU have been aligned. According to the differing interpretations of what democracy means, and three other criteria of the “levels of Othering,” the EU has been “imagined,” on the one hand, as an entity where Czechs can flourish in their identity and ensure their freedom and democratic values (positive Other), and, on the other, as an “oppressor” entity which portrays democratic deficit, restricts freedom, and threatens Czech national identity (negative Other).  相似文献   
78.
79.
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号