首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   131篇
  免费   7篇
各国政治   8篇
工人农民   8篇
世界政治   19篇
外交国际关系   11篇
法律   54篇
政治理论   35篇
综合类   3篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   2篇
  2018年   3篇
  2017年   3篇
  2016年   5篇
  2015年   6篇
  2014年   7篇
  2013年   20篇
  2012年   3篇
  2011年   4篇
  2010年   3篇
  2009年   5篇
  2008年   1篇
  2007年   7篇
  2006年   8篇
  2005年   4篇
  2004年   2篇
  2003年   7篇
  2002年   6篇
  2001年   5篇
  2000年   4篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1992年   2篇
  1991年   2篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1985年   2篇
  1984年   2篇
  1983年   3篇
  1982年   1篇
  1981年   2篇
  1976年   2篇
  1975年   1篇
  1973年   1篇
  1968年   1篇
排序方式: 共有138条查询结果,搜索用时 15 毫秒
31.
32.
33.
The Periodic Mobile Forensics (PMF) system investigates user behavior on mobile devices. It applies forensic techniques to an enterprise mobile infrastructure, utilizing an on‐device agent named TractorBeam. The agent collects changed storage locations for later acquisition, reconstruction, and analysis. TractorBeam provides its data to an enterprise infrastructure that consists of a cloud‐based queuing service, relational database, and analytical framework for running forensic processes. During a 3‐month experiment with Purdue University, TractorBeam was utilized in a simulated operational setting across 34 users to evaluate techniques to identify masquerading users (i.e., users other than the intended device user). The research team surmises that all masqueraders are undesirable to an enterprise, even when a masquerader lacks malicious intent. The PMF system reconstructed 821 forensic images, extracted one million audit events, and accurately detected masqueraders. Evaluation revealed that developed methods reduced storage requirements 50‐fold. This paper describes the PMF architecture, performance of TractorBeam throughout the protocol, and results of the masquerading user analysis.  相似文献   
34.
In this article, the author takes a unique approach to adoption, criticizing the law's heavy emphasis on adoption while not promoting other permanency alternatives. The author advocates the use and promulgation of subsidized guardianship and cooperative adoption as positive alternatives to traditional adoption. First, the author considers the Adoption and Safe Families Act (ASFA). Discussions of therapeutic jurisprudence and preventive law follow. Then, she talks about family systems theory and cultural competence, leading to discussion of her two favorite alternatives. After examining these theories and approaches, she concludes that these options do a better job of maintaining family relations and correspond more closely with psychological theory.  相似文献   
35.
36.
This article presents results of a national U.S. survey of psychiatrists' views about legal grounds for involuntary civil commitment. Data from 739 Respondents revealed strong support for "danger to self," "danger to others," and "grave disability" as grounds, but weak support for "illness relapse." Psychiatrists did not support commitment for addiction to drugs or alcohol nor for sexual predators. Logit regression revealed few significant associations between Respondents' choice of grounds and other variables, such as race, employment setting, experience with commitment, and political climate of the state. Respondents' support for the various commitment grounds was found to be most significantly associated with what Respondents believed the law to be in their state; Respondents tended to support the grounds they believed to be the law. The reasons for the strong association between Respondents' beliefs and wants concerning commitment grounds is explored. It is suggested that Respondents have adopted their states' commitment grounds as their preferences through a process of internalization of norms. Implications of this hypothesis are discussed.  相似文献   
37.
This study compared vicarious trauma in a random sample of male and female clinicians who treat survivors (n=95) and those who treat offenders (n=252). A national survey was conducted with members of the Association for the Treatment of Sexual Abusers (ATSA) and the American Professional Society on the Abuse of Children (APSAC). These data were used to test the relative contribution of variables theorized to contribute to two vicarious trauma effects (avoidance and intrusions) using the Impact of Event Scale. The sample reported high levels of avoidance and intrusions. Variables associated with vicarious trauma differed based on client population served. Sequential regression analyses were used to examine theoretically derived variables. Implications for practice and further research are discussed.  相似文献   
38.
In policy research a frequent aim is to estimate treatment effects separately by subgroups. This endeavor becomes a methodological challenge when the subgroups are defined by post‐treatment, rather than pre‐treatment, variables because if analyses are performed in the same way as with pre‐treatment variables, causal interpretations are no longer valid. The authors illustrate a new approach to this challenge within the context of the Infant Health and Development Program, a multisite randomized study that provided at‐risk children with intensive, center‐based child care. This strategy is used to examine the differential causal effects of access to high‐quality child care for children who would otherwise have participated in one of three child care options: no non‐maternal care, home‐based non‐maternal care, and center‐based care. Results of this study indicate that children participating in the first two types of care would have gained the most from high‐quality center‐based care and, moreover, would have more consistently retained the bulk of these positive benefits over time. These results may have implications for policy, particularly with regard to the debate about the potential implications of providing universal child care. © 2002 by the Association for Public Policy Analysis and Management.  相似文献   
39.
40.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号