首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   129篇
  免费   8篇
各国政治   3篇
工人农民   15篇
世界政治   18篇
外交国际关系   8篇
法律   56篇
中国政治   1篇
政治理论   35篇
综合类   1篇
  2023年   2篇
  2022年   1篇
  2021年   1篇
  2020年   6篇
  2019年   2篇
  2018年   5篇
  2017年   4篇
  2016年   5篇
  2015年   7篇
  2014年   9篇
  2013年   18篇
  2012年   6篇
  2011年   5篇
  2010年   5篇
  2009年   6篇
  2008年   4篇
  2007年   3篇
  2006年   4篇
  2005年   7篇
  2004年   3篇
  2003年   1篇
  2002年   1篇
  2001年   10篇
  2000年   2篇
  1999年   4篇
  1998年   4篇
  1997年   1篇
  1996年   1篇
  1988年   1篇
  1985年   2篇
  1984年   1篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1974年   1篇
  1971年   1篇
排序方式: 共有137条查询结果,搜索用时 15 毫秒
51.
Critical Criminology - Gangs are often associated with violence and chaos, but they can also be institutional vectors for the imposition of particular forms of social order, based on their...  相似文献   
52.
Until 1999, Kosovo was a little-known province of Serbia. NATO's intervention, however, changed this. Suddenly, everyone was talking about Kosovo and the plight of the Kosovo Albanians. Today, Kosovo is no longer a major talking point; few authors are now writing about post-independence Kosovo and the many challenges that confront the young state. Particularly striking is the relative absence of scholarly writings that discuss the Gordian knot of northern Kosovo. Seeking to rectify this neglect, this article has three core aims: to provide new empirical insights into the situation on the ground in northern Kosovo, to explore Serb and Albanian viewpoints regarding the status of the north (and in particular to examine Serb fears and concerns) and to discuss possible solutions. It argues that granting the north a special, autonomous status within Kosovo is the ultimate way to resolve the “northern problem,” and indeed this now seems the most likely solution following the recent conclusion of the First Agreement on Principles Governing the Normalization of Relations. This research is based on five weeks of fieldwork in Kosovo in July and August 2012. During this time, the author conducted 56 semi-structured interviews, 29 of which took place in northern Kosovo.  相似文献   
53.
Abstract

Understanding how import prices adjust to exchange rates helps anticipate inflation effects and monetary policy responses. This article examines exchange rate pass-through to the monthly import price index in South Africa during 1980–2009. Short-horizon pass-through estimates are calculated using both single equation equilibrium correction models and systems (Johansen) models, controlling for both domestic and foreign costs. Average pass-through is incomplete at about 50 per cent within a year and 30 per cent in six months, and in the long-run, from the Johansen analysis including feedback effects, is about 55 per cent. There is evidence of slower pass-through under inflation targeting; pass-through is found to decline with recent exchange rate volatility and there is evidence for asymmetry, with greater pass-through occurring for small appreciations.  相似文献   
54.
Abstract

Global integration has increased the international linkages of financial markets for emerging market countries. A key channel for the international transmission of inflation and economic cycles is from exchange rate movements to domestic prices, known as exchange rate pass-through (ERPT). This article reviews the conceptual, methodological and policy issues connected with ERPT in emerging market and developing countries, and critically surveys selected empirical studies. A key contribution is to categorise and compare the heterogeneous methodologies used to extract ERPT measures in the empirical literature. Single equation models and systems methods are contrasted; frequent misspecifications that produce unreliable ERPT estimates are highlighted. The discerning policy-maker needs to ascertain by which methods ERPT measures were calculated, the controls and restrictions applied, and the time frame and stability of the estimates.  相似文献   
55.
To date, little research has documented how teens might misuse technology to harass, control, and abuse their dating partners. This study examined the extent of cyber dating abuse—abuse via technology and new media—in youth relationships and how it relates to other forms of teen dating violence. A total of 5,647 youth from ten schools in three northeastern states participated in the survey, of which 3,745 reported currently being in a dating relationship or having been in one during the prior year (52 % were female; 74 % White). Just over a quarter of youth in a current or recent relationship said that they experienced some form of cyber dating abuse victimization in the prior year, with females reporting more cyber dating abuse victimization than males (particularly sexual cyber dating abuse). One out of ten youth said that they had perpetrated cyber dating abuse, with females reporting greater levels of non-sexual cyber dating abuse perpetration than males; by contrast, male youth were significantly more likely to report perpetrating sexual cyber dating abuse. Victims of sexual cyber dating abuse were seven times more likely to have also experienced sexual coercion (55 vs. 8 %) than were non-victims, and perpetrators of sexual cyber dating abuse were 17 times more likely to have also perpetrated sexual coercion (34 vs. 2 %) than were non-perpetrators. Implications for practice and future research are discussed.  相似文献   
56.
57.
58.
This study investigated the relationship between 10 characteristics of childhood sexual abuse and dissociation in adulthood. A structured clinical interview, the Dissociative Experiences Scale, and the Dissociation Subscale of the Symptom Checklist 90 - Revised were administered to 118 women survivors seeking psychotherapy. Separate stepwise multiple regression analyses were conducted for each dissociation scale to determine which abuse characteristics were predictive of dissociation. In both analyses, the same four variables were significantly related to dissociation: age at onset, coercive sexual acts, objectifying sexual acts, and concurrent multiple perpetrators. Implications of findings for future research and clinical practice are explored.  相似文献   
59.
Prior research on factors influencing sentence severity has produced ambiguous findings. To resolve some of this ambiguity, a crime-specific approach to data analysis is proposed and tested. The research sample consists of 468 convictions resulting from 619 indictments for the crimes of murder, rape, aggravated assault, and robbery. Independent variables examined include seven offender and case-processing characteristics. The dependent variable, sentence severity, is measured first as a dichotomous variable (probation or prison) and then as an interval variable (prison-sentence length). After determining that crime type explains a significant proportion of the total variance in sentence severity, the dependent variables are then regressed on the variable list. Four regressions are performed for each dependent variable; the first analysis uses all cases in the sample, while the remaining analyses focus separately on the crimes of murder, assault, and robbery. The research indicates that the aggregate and crime-specific analyses produce substantively different results, both in terms of the factors found to influence sentence severity and the total amount of variance explained. Findings demonstrate the utility of crime-specific analysis.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号