首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   182篇
  免费   9篇
各国政治   18篇
工人农民   14篇
世界政治   30篇
外交国际关系   10篇
法律   81篇
政治理论   38篇
  2023年   3篇
  2022年   1篇
  2021年   1篇
  2020年   6篇
  2019年   10篇
  2018年   5篇
  2017年   10篇
  2016年   8篇
  2015年   6篇
  2014年   2篇
  2013年   39篇
  2012年   9篇
  2011年   6篇
  2010年   4篇
  2009年   11篇
  2008年   7篇
  2007年   7篇
  2006年   5篇
  2005年   7篇
  2004年   4篇
  2003年   6篇
  2002年   7篇
  2001年   2篇
  2000年   4篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
  1995年   2篇
  1994年   3篇
  1993年   1篇
  1992年   2篇
  1991年   2篇
  1990年   4篇
  1987年   1篇
  1985年   1篇
  1974年   1篇
排序方式: 共有191条查询结果,搜索用时 15 毫秒
121.
122.
Experts play a critical role in forensic decision making, even when cognition is offloaded and distributed between human and machine. In this paper, we investigated the impact of using Automated Fingerprint Identification Systems (AFIS) on human decision makers. We provided 3680 AFIS lists (a total of 55,200 comparisons) to 23 latent fingerprint examiners as part of their normal casework. We manipulated the position of the matching print in the AFIS list. The data showed that latent fingerprint examiners were affected by the position of the matching print in terms of false exclusions and false inconclusives. Furthermore, the data showed that false identification errors were more likely at the top of the list and that such errors occurred even when the correct match was present further down the list. These effects need to be studied and considered carefully, so as to optimize human decision making when using technologies such as AFIS.  相似文献   
123.
This study took advantage of the new open-source Extremist Crime Database (ECDB) to overcome obstacles to studying domestic far-right terrorism from a criminological perspective. In the past, exclusive definitions and inclusion criteria have limited available data on violent crimes committed by domestic far-right terrorists, and official data on violent crimes fail to capture offenders’ links to domestic far-right terrorism and ideological motivation (e.g., anti-government, anti-abortion, anti-religion). Therefore, little is known about the nature of far-right terrorist violence and how such violence is similar to and different from routine or more common forms of violence. Focusing on homicides, this study addressed why and how open-source terrorism data and official crime data can be comparatively analyzed. In doing so, we also demonstrate the utility of synthesizing terrorism and official crime data sources. Data on 108 far-right terrorist homicides were taken from the ECDB. Data on 540 common homicides (five comparison homicides for each far-right terrorist homicide) were randomly sampled from the 2000 Supplementary Homicide Reports. Using multiple imputation by chained equations and logistic regression, we imputed missing values and estimated models to compare the two homicide types on 12 different victim, offender, and event characteristics. Relative to common homicides, we found that far-right terrorist homicides were significantly more likely to have white offenders, multiple victims, multiple offenders, and to occur between strangers, and they were significantly less likely to have white victims, to be carried out with a firearm, and to occur in cities with more than 100,000 residents.  相似文献   
124.
125.
126.
127.
128.
Purpose. This study examined the verbal and non‐verbal behaviours exhibited by criminal offender and non‐offender participants while they related planned truthful and deceptive accounts about emotional autobiographical events. Methods. In a 2 × 2 (participant group × veracity) quasi‐experimental design, offenders (N = 27) and university students (N = 38) provided videotaped accounts of four autobiographical emotional events: two honest and two fabricated (counterbalanced). Patterns of behaviour exhibited during the truthful and the deceptive accounts were then compared. Results. In general, offenders and non‐offenders showed similar patterns of deceptive behaviour. Deceptive accounts by both groups contained fewer details than honest accounts. Deception was associated with an increase in illustrator usage and self‐manipulations; however, univariate analyses indicated only that offenders exhibited significantly more self‐manipulations when lying. A significant interaction emerged in which offenders showed a reduction in smiles when lying about the emotional events, while students showed no difference. Conclusions. Offenders and students showed similar patterns of lying on most cues. However, unlike non‐offenders, offenders smiled less and showed an increase in self‐manipulations when lying. We theorize that offenders may have been aware that smiling and laughing are negatively related to perceived credibility in the speaker and used self‐manipulations to distract listeners from the content of their lies.  相似文献   
129.
130.
Speed Kills     
Over the past two decades, a misguided, militaristic war on drugs has been waged through a variety of means, including drug interdiction programs on the streets and highways of the United States, and high-profile campaigns in the United States media designed to construct drug use as a dangerous social problem. Yet during this same period, a far more deadly social problem - the death of some 40,000 people a year in automobile accidents along these same streets and highways — has largely been excluded from public consciousness and public debate. Recently, a convergence of circumstances in New Mexico made visible this imbalance in public awareness and public policy, and perhaps even began to remedy it. The roadside shrines that decorate the highways of New Mexico and other states likewise serve this purpose, encoding the collective tragedy of automotive death in the cultural landscape. In their tragic beauty and ongoing accumulation, these shrines challenge critical criminologists to find a new focus, a new everyday criminology of the automobile that can expand the existing criminology of automotive corporate crime. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号