全文获取类型
收费全文 | 498篇 |
免费 | 15篇 |
专业分类
各国政治 | 28篇 |
工人农民 | 23篇 |
世界政治 | 66篇 |
外交国际关系 | 37篇 |
法律 | 211篇 |
中国政治 | 4篇 |
政治理论 | 131篇 |
综合类 | 13篇 |
出版年
2023年 | 2篇 |
2021年 | 3篇 |
2020年 | 8篇 |
2019年 | 17篇 |
2018年 | 11篇 |
2017年 | 14篇 |
2016年 | 20篇 |
2015年 | 9篇 |
2014年 | 12篇 |
2013年 | 96篇 |
2012年 | 16篇 |
2011年 | 13篇 |
2010年 | 13篇 |
2009年 | 10篇 |
2008年 | 26篇 |
2007年 | 14篇 |
2006年 | 19篇 |
2005年 | 9篇 |
2004年 | 19篇 |
2003年 | 15篇 |
2002年 | 12篇 |
2001年 | 7篇 |
2000年 | 11篇 |
1999年 | 3篇 |
1998年 | 10篇 |
1997年 | 9篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 9篇 |
1993年 | 9篇 |
1992年 | 5篇 |
1991年 | 5篇 |
1990年 | 3篇 |
1989年 | 5篇 |
1988年 | 2篇 |
1987年 | 7篇 |
1986年 | 4篇 |
1985年 | 7篇 |
1984年 | 7篇 |
1983年 | 5篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 6篇 |
1978年 | 2篇 |
1977年 | 3篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 2篇 |
1970年 | 2篇 |
1968年 | 2篇 |
排序方式: 共有513条查询结果,搜索用时 0 毫秒
381.
382.
Graham Harrison 《英国政治学与国际关系杂志》2005,7(2):240-260
This article considers the World Bank as a political thinker. This involves an interpretation of the values, methodologies, and theoretical references contained within the Bank's governance documentation. Generally, the Bank steers away from a serious engagement with the nature of states, or the dynamics of reform execution, even in its more detailed policy documents in reform areas such as administrative reform. But, by looking at the World Bank's involvement in African states, we can understand the ways in which the World Bank works with certain expectations concerning how reforms will work. The article critically analyses the Bank's 'political vision' by comparing it with prominent theories of African politics. The article concludes that the World Bank's governance agenda misses three pivotal aspects of African politics: the unity of political and economic power, the extreme openness of African states to external pressures, and the salience of historically-embedded cultural and political relations. These three points directly raise important questions about the prospects of good governance reforms in Africa, and the involvement of the Bank therein. 相似文献
383.
Graham Smith 《The Modern law review》2001,64(3):372-392
The police complaints process is the sole means by which criminal proceedings are initiated against police officers after allegations by members of the public that they were the victim of an offence committed by officers when in the execution or purported execution of their duty. Yet this state of the law has hardly figured in recent debate, which has seen the complaints process examined almost exclusively as the preliminary stage of the disciplinary process. This paper considers police complaints, the criminal liability of the officer and the implications for reform of the process after incorporation of the European Convention on Human Rights. 相似文献
384.
Social Capital and Urban Governance: Adding a More Contextualized 'Top-down' Perspective 总被引:1,自引:0,他引:1
There is growing interest in the social sciences in the concept of social capital and the role it plays in facilitating collaborative and collective actions. Within political science, it is the work of Robert Putnam which has dominated social capital research. This paper argues that the 'Putnam-school' approach is lacking in two main respects. First, the role played by public authorities in the creation of social capital is neglected. Second, the implications for governance cannot simply be read off from associational activity and 'stocks' of social capital. The concept of the political opportunity structure is offered and adapted to develop a framework for social capital analysis. Original empirical material from Birmingham is drawn upon and compared to earlier studies of the city in order to support and illustrate the arguments of the paper. 相似文献
385.
Others have investigated the role that DNA profiling could play as a method for identifying the perpetrator of manual strangulation. These studies have demonstrated that it is possible to collect offender DNA from the skin surface of a victim following physical contact. It is not known whether nonself biological material is normally present on the skin surface due to adventitious transfer occurring during innocent everyday interactions. To test the hypothesis that detectable amounts of nonself DNA are normally present on the skin surface of healthy adult individuals due to the adventitious transfer of DNA occurring during normal day-to-day social interactions, we designed an experiment in three phases. Phase 1 was used to deduce which DNA collection, extraction, and amplification methods were suited to investigating this question. During phase 2, the neck surface of 24 healthy adult volunteers was swabbed. DNA was extracted using the QIAamp DNA mini kit and amplified using the SGM Plus PCR amplification kit, using 28 PCR cycles. The work carried out during phase 3 involved a simulated assault to investigate primary and secondary transfer of DNA during physical contact. It was found that 23% of neck areas swabbed during phase 2 of this investigation showed nondonor alleles in the resulting DNA profile, with 5% of areas showing six or more nondonor alleles. The results of phase 3 showed that primary, secondary, and zero transfer of victim and/or offender DNA could be observed after physical contact and that alleles from an unknown source could still be detected in this more controlled experiment. The data presented in this paper demonstrate that DNA profiles generated after swabbing the skin surface of healthy adults can include components of an unknown source, present due to adventitious transfer. These components, if present in large quantities, have the potential to interfere with DNA profile interpretation of swabs taken for the investigation of physical assault by DNA profiling. 相似文献
386.
Shaun Whitehead Jen Mailley Ian Storer John McCardle George Torrens Graham Farrell 《European Journal on Criminal Policy and Research》2008,14(1):39-60
Anti-theft designs relating to mobile phones are reviewed. The physical and electronic design of handsets includes visual
deterrents, owner-identification, and handset tracking options. The systems design of phone networks includes the blacklisting
of stolen phones. Other measures include biometric-locking of handsets, and designs that encourage ‘safe’ phone use and transportation.
Characteristics that promote anti-theft designs are proposed and form the acronym ‘IN SAFE HANDS’: identifiable, neutral,
seen, attached, findable, executable, hidden, automatic, necessary, detectable, and secure. The set of characteristics is
presented as a heuristic device to aid designing-out crime from frequently stolen electronic goods.
相似文献
Graham FarrellEmail: |
387.
Graham Erion 《Review of European Community & International Environmental Law》2009,18(2):164-171
This article considers the role that securities litigation can play in forcing public companies to disclose climate change risks to their investors and potential shareholders. Such disclosure can prove to be a strong incentive for companies to manage their greenhouse gas emissions and climate change exposure better. Securities regulators in North America have, for the most part, resisted efforts effectively to enforce obligations by companies to disclose climate change risks. This led to a recent action by the Office of the Attorney-General in New York, which exemplifies the role that litigation can play in this area. Investors themselves may soon bring their own actions against companies over their carbon disclosure, the basis for which is already provided in securities legislation. 相似文献
388.
Graham GreenleafAuthor Vitae 《Computer Law & Security Report》2009,25(1):28-43
The APEC Privacy Framework was developed from 2003, adopted by APEC in 2004 and finalised in 2005. It was intended as a means of improving the standard of information privacy protection throughout the APEC countries of the Asia–Pacific, and of facilitating the trans-border flow of personal information between those countries. In 2007 a number of ‘Pathfinder’ projects for cross-border data transfers were launched under the Framework. In the five years since the process commenced, what has it achieved, and what is it likely to achieve? This paper argues that the APEC Privacy Framework has had many flaws from its inception, including Privacy Principles that are unnecessarily weak, and no meaningful enforcement requirements. Since its adoption in 2004, little attempt has been made to encourage its use as a minimal standard for privacy legislation in developing countries (which might have been useful), and it is having little impact on the significant number of legislative developments now taking place. 相似文献
389.
Although a number of methods have been proposed to control for word-count differences between truthful and deceptive accounts, there is no uniformity amongst researchers using the Reality Monitoring (RM) criteria as to when, why or how to standardise for word-count differences. Another factor that also has received little attention in the literature is whether the number of others present when a person is providing an account alters the lexical profile of accounts such that RM scores are affected. To investigate these issues, 62 autobiographical statements, 31 truthful and 31 deceptive, were generated under 3 conditions, no person present, 1 and 2 persons present, and were analysed before and after standardisation for word-count and duration. Results showed that the criteria successfully discriminated between truthful and deceptive accounts when no attempt to control for word-count was made and, to a lesser extent, when accounts were standardised for duration; however, they failed to discriminate after accounts had been standardised for length. The presence of others did not affect the ability to distinguish between truthful and deceptive accounts. The results highlight the difficulties involved in developing normative standardisation criteria which could be used in the field to classify individual or small numbers of cases. 相似文献
390.
Dental Age Estimation: Pattern Recognition of Root Canal Widths of Mandibular Molars. A Novel Mandibular Maturity Marker at the 18‐Year Threshold 下载免费PDF全文
Graham J. Roberts M.D.S. Victoria S. Lucas Ph.D. Manoharan Andiappan M.Sc. Fraser McDonald Ph.D. 《Journal of forensic sciences》2017,62(2):351-354
The final stage of third molar development is used to assign a subject to above the 18‐year threshold. Some subjects exhibiting this final stage are less than 18 years. Radiographs from 1000 females and 1000 males age 16.00–25.99 years were examined. Each half‐year age band comprised 50 females and 50 males. Three categories of root canal widths (RCW) of the LL6, LL7, and LL8 [FDI 36, 37, and 38] were defined. Reproducibility was achieved by re‐assessing the same subjects 12 months apart. For females, the minimum value for RCW‐A was 16.33 years, RCW‐B 17.23 years, and RCW‐C 18.45 years. For males, the minimum values were RCW‐A 17.16 years, RCW‐B 18.29 years, and RCW‐C 18.16 years. The presence of RCW‐C in a female, and the presence of RCW‐B or RCW‐C in a male is compelling evidence that the subject is above the 18‐year threshold. 相似文献