首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   191篇
  免费   13篇
各国政治   9篇
工人农民   16篇
世界政治   24篇
外交国际关系   6篇
法律   112篇
中国政治   1篇
政治理论   35篇
综合类   1篇
  2023年   2篇
  2021年   6篇
  2020年   4篇
  2019年   5篇
  2018年   9篇
  2017年   7篇
  2016年   8篇
  2015年   4篇
  2014年   8篇
  2013年   27篇
  2012年   8篇
  2011年   6篇
  2010年   5篇
  2009年   7篇
  2008年   19篇
  2007年   7篇
  2006年   4篇
  2005年   3篇
  2004年   6篇
  2003年   3篇
  2002年   5篇
  2001年   5篇
  2000年   3篇
  1999年   4篇
  1998年   3篇
  1997年   3篇
  1996年   3篇
  1995年   3篇
  1994年   4篇
  1993年   1篇
  1992年   3篇
  1991年   1篇
  1989年   1篇
  1987年   3篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1982年   1篇
  1981年   2篇
  1980年   4篇
  1979年   1篇
  1975年   1篇
  1973年   1篇
  1969年   1篇
排序方式: 共有204条查询结果,搜索用时 31 毫秒
71.
Recent changes in patterns of public service provision, sometimes associated with the 'regulatory state', have been said to have eroded citizenship and diminished accountability. This paper responds to these challenges by outlining a toolbox of four transparency mechanisms – information, choice, representation, and voice – as alternative devices that can be built into the architecture of public service regimes, to increase responsiveness and answerability. Using insights drawn from cybernetics and transaction cost analysis, this paper looks at the consequences of different choices of combinations of mechanisms in allocating authority in line with competing administrative doctrines of fiduciary trusteeship and consumer sovereignty. Attention is drawn to differences in 'cost profiles' between different public services that can facilitate or inhibit consumer choice as a basis for understanding the suitability of different combinations of mechanisms to specific public services. A contingency model determining the suitability of particular mechanisms to particular services of different 'cost-profiles' is presented. Given the variety of public services and among different public service architectures in the regulatory state, it is argued that this differentiated approach to transparency and accountability provides a more effective response to holding public services accountable than narrower traditional notions of political accountability.  相似文献   
72.
This research examined the impact of eyewitness identification decisions on student-investigators. Undergraduates played the role of police investigators and interviewed student-witnesses who had been shown either a good or poor view of the perpetrator in a videotaped crime. Based on information obtained from the witness, student-investigators then chose a suspect from a database containing information about potential suspects and rated the probability that their suspect was the culprit. Investigators then administered a photo lineup to witnesses, and re-rated the probability that their suspect was guilty. Student-investigators were highly influenced by eyewitness identification decisions, typically overestimating the information gained from the identification decision (except under conditions that led witnesses to be very accurate), and were generally unable to differentiate between accurate and inaccurate witnesses.
Melissa A. BoyceEmail:
  相似文献   
73.
The present study utilizes the National College Health Risk Behavior Survey to examine the relationship between health-risk behaviors and sexual victimization among a sample of college women. A prospective design is utilized to examine the relationship between health-risk behaviors as measured at baseline and sexual victimization during a 3-month follow-up period. After controlling for age and parents' education, a history of adolescent sexual victimization was associated with the following health-risk behaviors as measured at pretest: increased likelihood of cigarette smoking, marijuana use, suicidal ideation, experience of physical violence within a dating relationship, use of diet pills and vomiting or laxatives to lose weight, multiple sexual partners, and early sexual intercourse. Prospectively, women's history of adolescent sexual victimization was the strongest predictor of sexual victimization during the 3-month follow-up. Implications of univariate associations between early sexual intercourse, suicidal ideation, and problematic weight loss behaviors and subsequent experience of sexual victimization are discussed.  相似文献   
74.
In Experiment 1 mock jurors watched a videotape simulation of a sexual abuse trial that included a 10-year-old child witness testifying in one of three different modalities: (1) The child testified in court while directly confronting the defendant (open court condition). (2) The child testified in court with a protective shield placed between the child and the defendant (shield condition). (3) The child testified outside the courtroom and the child's testimony was presented to the jury and the defendant on a video monitor (video condition). The mock jurors judged the guilt of the defendant after watching the entire trial. The modality of the child's testimony had no impact on conviction rates. In Experiment 2 subjects watched the same trial that was used in Experiment 1. The trial was stopped immediately after the child testified (the child was the first witness to take the stand), and subjects judged the guilt of the defendant. The modality of the child's testimony had a significant impact on conviction rates. Subjects in the open court condition were more likely to convict the defendant than subjects in the shield and videotape conditions. These findings are relevant to Supreme Court decisions regarding the use of protective devices with child witnesses.  相似文献   
75.
76.
77.
78.
In 2007, Brazil entered the European Union’s (EU) list of strategic partners; a token of recognition of the place Brazil occupies in current global affairs. Although promoting bilateral environmental convergence is a stated priority, cooperation between the EU and Brazil in this policy field is largely under-researched, raising interesting questions as to whether the current state of play could support EU claims for the normative orientation of its external environmental policy. Through an analysis of partnership activities in the fields of deforestation and biofuels, we suggest that while normative intentions may be regarded as a motivating force, critically viewing EU foreign environmental policy through a ‘soft imperialism’ lens could offer a more holistic understanding of the current state of bilateral cooperation. While the normative power thesis can be substantiated with regard to deforestation, we argue that by erecting barriers to shield its domestic biofuels production, the EU is placing trade competitiveness and economic growth above its normative aspirations. Subsequently, the partial adoption of sustainable development as an EU norm leads to policy incoherence and contradictory actions.  相似文献   
79.
The shadow of violence that elections cast remains poorly understood. A key obstacle impeding cross-national empirical analysis of electoral violence has been the varied nature of such violence. To address this challenge, I examine terrorist attacks as one particular form of electoral violence. By tracking the incidence of terrorist violence relative to election dates over time and across countries using an original dataset for the period from 2000–2005, I find strong support for the hypothesis that terrorist violence increases as we move closer to an election date. In fact, terrorist violence approximates a normal distribution centered on the election date.  相似文献   
80.
It is widely believed that cyberspace is offense dominant because of technical characteristics that undermine deterrence and defense. This argument mistakes the ease of deception on the Internet for a categorical ease of attack. As intelligence agencies have long known, deception is a double-edged sword. Covert attackers must exercise restraint against complex targets in order to avoid compromises resulting in mission failure or retaliation. More importantly, defenders can also employ deceptive concealment and ruses to confuse or ensnare aggressors. Indeed, deception can reinvigorate traditional strategies of deterrence and defense against cyber threats, as computer security practitioners have already discovered. The strategy of deception has other important implications: as deterrence became foundational in the nuclear era, deception should rise in prominence in a world that increasingly depends on technology to mediate interaction.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号