首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1086篇
  免费   65篇
各国政治   90篇
工人农民   36篇
世界政治   84篇
外交国际关系   108篇
法律   454篇
中国政治   8篇
政治理论   364篇
综合类   7篇
  2023年   6篇
  2022年   7篇
  2021年   20篇
  2020年   35篇
  2019年   42篇
  2018年   46篇
  2017年   59篇
  2016年   44篇
  2015年   46篇
  2014年   39篇
  2013年   189篇
  2012年   33篇
  2011年   47篇
  2010年   22篇
  2009年   38篇
  2008年   31篇
  2007年   41篇
  2006年   38篇
  2005年   34篇
  2004年   32篇
  2003年   31篇
  2002年   43篇
  2001年   18篇
  2000年   24篇
  1999年   16篇
  1998年   20篇
  1997年   18篇
  1996年   13篇
  1995年   5篇
  1994年   18篇
  1993年   10篇
  1992年   8篇
  1991年   6篇
  1990年   9篇
  1989年   6篇
  1988年   3篇
  1987年   3篇
  1986年   8篇
  1985年   4篇
  1984年   2篇
  1983年   5篇
  1982年   3篇
  1981年   3篇
  1980年   4篇
  1979年   4篇
  1978年   3篇
  1977年   3篇
  1976年   4篇
  1973年   2篇
  1964年   2篇
排序方式: 共有1151条查询结果,搜索用时 15 毫秒
191.
Abstract

Mothers in prison separated from their young children are an overlooked group. Attachment theory could provide a useful model to underpin interventions and better support women affected by separation from their infants. Current policy draws on a limited body of evidence and research has developed considerably since its first design. This review systematically searched all relevant UK prison policy and government documents with regards to mother and child separation in prison and analysed the extent to which these documents draw on attachment theory. Following initial searches, 58 documents were thematically analysed. Attachment was implicitly referred to in most documents but only explicitly mentioned in four. Global themes identified included ‘separation as trauma’. However, document groups varied in focusing either on the mother or the child and there were no joint perspectives. Developing and researching specific attachment-informed interventions might be one way forward as would further attachment-based research in this area.  相似文献   
192.
Despite important progress in knowledge about interview ‘best practice’ with child victims, few studies had yet evaluated the impact of interviewers’ personal characteristics on adherence to these ‘best practice’. This study was designed to determine whether interviewers’ personal characteristics are associated with adherence to a structured interview protocol (National Institute of Child and Human Development), the use of open-ended questions and the amount of details provided in children’s responses during investigative interviews with alleged victims of child sexual abuse. 114 interviews were scored from 13 police investigators after they followed a one-week training program. Results showed that experience, emotional intelligence, Extraversion, Agreeableness, Conscientiousness and Neuroticism were related with adherence to the protocol and ratio of open-ended questions. Cognitive abilities were related to the amount of details obtained from the child. Generalized estimating equations were used to compare relative contribution of each variable. These findings raise questions about how investigative interviewers are selected and trained.  相似文献   
193.
194.

Purpose

Family factors have long been considered an important contributor to the criminogenic process. Family Preservation (FP) programs attempt to improve family functioning and, thereby, dissuade future delinquency. Despite years of delivery, the limited research concerning the influence of FP programs on juvenile delinquency remains inconclusive.

Methods

This study examined the effectiveness of an FP program implemented in a metropolitan county of a large Southern state. Subjects were adjudicated male juveniles referred to the program by the courts. Recidivism outcomes for FP participants were compared against those of a simple random sample of non-participants.

Results

Findings suggest that FP does not impact recidivism among study participants. Issues with treatment fidelity may be responsible for the lack of results for this program.

Conclusion

These findings fail to lend support to the FP program. However, they do demonstrate the importance of treatment fidelity in juvenile justice programming.  相似文献   
195.
Regional prosperity increasingly depends on a region’s capacity to have command over the production of ideas. Measuring the production of ideas with patents, the objective of this paper is to analyze how the number of utility patents granted to inventors in U.S. States in different technologies changed between 1997 and 2007 and how States took advantage of the new opportunities and adapted to the changing technology landscape. The paper uses shift-share analysis, traditionally used in employment studies, for analyzing change in patents by technology categories developed by the NBER. The shift-share results show that only a few states were able to take advantage of the information technology driven increases in patents. California dominates in patent production and may be providing spillover benefits to neighboring states. The shift-share decompositions are used as variables in a fixed-effect panel-regression model of state economic growth. The regression results show that the shift-share decompositions provide statistically significant information in explaining growth after accounting for a State’s stock of patents, suggesting that States should concentrate on effective ways to boost their stock of knowledge in rapidly growing technologies to improve state economic growth.  相似文献   
196.
The use of computers in the commission of crime, so-called ??cybercrime??, presents a considerable challenge to law enforcement. Central to the prosecution of cybercrime is the offence of unauthorised access to a computer, or ??hacking??. Originally conceived of as analogous to trespass, the trend in some jurisdictions has been toward punishing access to computer data per se. This issue also arises under the Council of Europe Convention on Cybercrime which criminalizes ??offences against the confidentiality, integrity and availability of computer data and systems??. As the criminal law traditionally provides protection only to limited forms of information, the increasing use of the criminal law to protect computer data therefore confers on it a status not enjoyed by information stored in other forms. Drawing upon the laws of Australia, the United Kingdom and the United States, this article explores the increasing criminalization of access to computer data. It describes the evolution of cybercrime laws and considers ways in which problems of over breadth may be avoided. Questions will also be raised as to the appropriate role of the criminal law in protecting information.  相似文献   
197.
We present a formal model of an intelligence agency that must divide its resources between the collection and analysis of information pertaining to terror plots. The model highlights the negative consequences of queues which form when collection exceeds analytic capacity. We incorporate the response of a terrorist organization to the operating characteristics of the intelligence system it faces, and solve for equilibrium strategies for the intelligence system and terrorist organization. Our results demonstrate the importance of properly balancing resources between collection and analysis, and stand in contrast to the observed state of overcollection in US intelligence agencies.  相似文献   
198.
199.
200.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号