全文获取类型
收费全文 | 252篇 |
免费 | 15篇 |
专业分类
各国政治 | 14篇 |
工人农民 | 16篇 |
世界政治 | 14篇 |
外交国际关系 | 14篇 |
法律 | 155篇 |
中国政治 | 6篇 |
政治理论 | 47篇 |
综合类 | 1篇 |
出版年
2023年 | 5篇 |
2022年 | 2篇 |
2021年 | 3篇 |
2020年 | 5篇 |
2019年 | 8篇 |
2018年 | 18篇 |
2017年 | 8篇 |
2016年 | 21篇 |
2015年 | 13篇 |
2014年 | 8篇 |
2013年 | 33篇 |
2012年 | 14篇 |
2011年 | 13篇 |
2010年 | 11篇 |
2009年 | 9篇 |
2008年 | 12篇 |
2007年 | 10篇 |
2006年 | 10篇 |
2005年 | 7篇 |
2004年 | 8篇 |
2003年 | 7篇 |
2002年 | 7篇 |
2001年 | 3篇 |
1999年 | 2篇 |
1996年 | 2篇 |
1994年 | 3篇 |
1993年 | 1篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1989年 | 1篇 |
1987年 | 3篇 |
1986年 | 2篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1974年 | 2篇 |
1973年 | 3篇 |
1970年 | 2篇 |
排序方式: 共有267条查询结果,搜索用时 0 毫秒
91.
92.
This article analyses the disputed election of President Park Geun-hye and her administration’s confrontation of left-nationalist politicians and other social movements during her first year in office. We argue that the Park administration’s policies resonate with contemporary discussions of “post-democratisation,” a process whereby social rights are increasingly subordinated to market logics and state power insulated from popular challenges. Under the conservative governments of Lee Myung-bak and Park Geun-hye, this process has been animated by a mode of confrontation known in South Korea as “politics by public security.” This politics targets social conflict and political dissent as threats to national security and has involved both illegal interventions by state institutions – such as the 2012 electoral interference by state agencies including the National Intelligence Service – and a cultural politics that affirms but revises the narrative of Korean democratisation by obfuscating the nature of the democracy movement and by attempting to restore the honour of conservative forces associated with former dictatorships. In order to better understand this conjuncture, we explore its origin within a tacit alliance between both former public security prosecutors-cum-conservative politicians and a movement of conservative intellectuals known as the New Right. 相似文献
93.
94.
The shortage of foster/adoptive parents being licensed to care for children in the public welfare system prompted an evaluation of the Licensure and Home Study Process (LHSP). Ecological systems theory framed the barriers-to-resources interplay among kinship and non-relative caregivers who withdrew or completed the LHSP. This mixed-methods study examined differences in applicant characteristics and types of barriers experienced. Results indicated that applicants responsible for other children in the home paired with welfare system barriers served as a tipping point for withdrawal. Relatives encountered the most barriers and all grandparents withdrew from the LHSP prior to licensure. 相似文献
95.
Kevin M. Beaver Joseph L. Nedelec Christian da Silva Costa Ana Paula Poersch Mônica Celis Stelmach Micheli Cristina Freddi Jamie M. Gajos Cashen Boccio 《Journal of criminal justice》2014
Purpose
Psychopathy and psychopathic personality traits (PPT) have been linked to a long list of negative life outcomes. To date, however, few studies have provided a systematic analysis of whether psychopathic personality traits contribute to increased health burden. The current study was designed to address this gap in the literature.Method
This study analyzed data from the National Longitudinal Study of Adolescent Health and employed a measure of PPT derived from the five-factor model of personality. Analyses were conducted using OLS, logistic, and Poisson regression techniques.Results
The results revealed that relatively higher scores on psychopathic personality traits were associated with a slight increase in a wide range of negative health outcomes. These significant associations were detected for both males and females.Conclusions
We speak to the importance of these findings for the potential to reduce health burden among psychopaths and those who score relatively high on measures of psychopathic personality traits. 相似文献96.
Jamie Grace 《International Journal of Law, Crime and Justice》2013,41(4):303-321
Criminality information practices involve public authorities in the UK (and elsewhere) gathering, retaining and sharing information that connects with an identifiable individual; all with the ostensible aim of upholding and improving standards of public protection. This piece first charts the landscape of contemporary criminality information practices in the UK today. The article then examines recent legal emphases and policy directions for public protection networks. Consideration is then given in the piece to privacy rights and values and the difficulties in providing an exact typology and grounding for these. The piece then outlines a suggested framework for correct legal regulation, as well as a through commentary on the work done by Catherine Bellamy et al. to empirically determine the extent to which public protection information sharing can in fact occur in correct adherence to legal regulation. A socio-legal analysis is undertaken of the nature of public protection networks as variants on Goffman's performance teams within a dramaturgical routine that foregrounds stigmatisation of perceived ‘risky’ individuals as an aspect of that routine. This piece also explores the processes of institutional isomorphism as a reaction to shifting policy directions and legal doctrines, acting as a driving force towards a hierarchical performance of criminality information practices by public protection networks. Three conclusions are offered up for consideration: firstly, that the growing complexity of the law and regulation relating to criminality information practices might improve privacy values in the criminal justice system and help to add precision to necessary processes of stigmatisation in relation to the aim of public protection. Secondly, that these shifts in the law still need ongoing revisions, in order that a hierarchical approach to criminality information practices can be arrived at over time. Thirdly, that if the permanency of potential stigmatisation through the indefinite retention of criminality information cannot change, due to the competing pressure on the criminal justice system from public protection duties, then consultation with ‘risky’ individuals where practicable, before criminality information connected to them is shared across public protection networks becomes essential as a privacy-enhancing value and practice. 相似文献
97.
Abstract We introduce the latest member of the intelligence family. Joining IMINT, HUMINT, SIGINT and others is ‘SOCMINT’ – social media intelligence. In an age of ubiquitous social media it is the responsibility of the security community to admit SOCMINT into the national intelligence framework, but only when two important tests are passed. First, that it rests on solid methodological bedrock of collection, evidence, verification, understanding and application. Second, that the moral hazard it entails can be legitimately managed. This article offers a framework for how this can be done. 相似文献
98.
Lisa Stolzenberg Stewart J. D’Alessio Jamie L. Flexon 《American Journal of Criminal Justice》2017,42(1):188-197
We use National Incident-Based Reporting System (NIBRS) data and an AutoRegressive Integrative Moving Average (ARIMA) study design to investigate the effect of moon illumination on reported crime occurring outdoors between the hours of 10 pm to 2 am in 13 U.S. states and the District of Columbia. Prior research analyzed a confounded dependent variable that amalgamated indoor and outdoor crimes. This situation is problematic in that there is little reason to speculate a relationship between moon illumination and indoor crime because artificial illumination is used within dwellings. Findings show that while moon illumination has little influence on total crime and indoor crime, the intensity of moonlight does have a substantive positive effect on outdoor criminal activity. As moon illumination intensifies, outdoor crime increases markedly. Plausible explanations for this relationship are discussed. 相似文献
99.
Fulfer JL Tyler JJ Choi NJ Young JA Verhulst SJ Kovach R Dorsey JK 《Journal of interpersonal violence》2007,22(2):238-249
A screening instrument for detecting intimate partner violence (IPV) was developed using indirect questions. The authors identified 5 of 18 items studied that clearly distinguished victims of IPV from a random group of health conference attendees with a sensitivity of 85% and a specificity of 87%. This 5-item instrument (SAFE-T) was then tested on 435 women presenting to three emergency departments and the results compared to a direct question regarding current abuse. The SAFE-T questions detected only 54% of the women who admitted being abused and correctly classified 81% of the women who said they were not victims. The 1-year prevalence of IPV in this sample of women presenting to an emergency department was 11.6%. The authors conclude that indirect questioning of women appears to be more effective at ruling out IPV in an emergency department population and may be less useful for women "early" in an abusive relationship. 相似文献
100.
Concrete is a common construction material found in residential and commercial buildings, bridges and parking lots that is a composite matrix containing aggregate held together with cement. The porous nature of concrete can make the collection and genotyping of biological fluids, such as blood, challenging. Forensic evidence can become embedded within the matrix, potentially reducing the amount of DNA available for analysis. In forensic science, “direct” amplification refers to a genotyping method that amplifies a DNA profile directly from a sample without DNA extraction, saving time and money. We investigated a novel application of Whatman? FTA? Elute cards in their ability to directly amplify PowerPlex® Fusion and Y23 profiles from minute amounts of blood that had been deposited on different concrete structures. In comparison to traditional collection methods, directly profiling blood stained construction materials using FTA? Elute cards increased the percentage loci amplified and significantly improved both allele peak height and peak height ratio while reducing allelic drop-out. FTA? Elute cards can provide a reliable, inexpensive and superior alternative to traditional methods. 相似文献