首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2279篇
  免费   135篇
各国政治   187篇
工人农民   131篇
世界政治   263篇
外交国际关系   163篇
法律   1192篇
中国政治   8篇
政治理论   450篇
综合类   20篇
  2023年   26篇
  2022年   18篇
  2021年   38篇
  2020年   60篇
  2019年   91篇
  2018年   123篇
  2017年   141篇
  2016年   142篇
  2015年   97篇
  2014年   128篇
  2013年   388篇
  2012年   106篇
  2011年   91篇
  2010年   62篇
  2009年   60篇
  2008年   89篇
  2007年   101篇
  2006年   67篇
  2005年   50篇
  2004年   63篇
  2003年   51篇
  2002年   45篇
  2001年   40篇
  2000年   36篇
  1999年   20篇
  1998年   22篇
  1997年   13篇
  1996年   14篇
  1995年   18篇
  1994年   14篇
  1993年   14篇
  1992年   11篇
  1991年   16篇
  1990年   11篇
  1989年   9篇
  1988年   9篇
  1987年   13篇
  1986年   6篇
  1985年   9篇
  1984年   14篇
  1983年   7篇
  1982年   11篇
  1976年   4篇
  1975年   5篇
  1974年   8篇
  1972年   10篇
  1971年   4篇
  1967年   5篇
  1966年   5篇
  1965年   5篇
排序方式: 共有2414条查询结果,搜索用时 31 毫秒
931.
This paper uses data on tenth graders from the 2016 Caring Communities Youth Survey (CCYS) to examine the lifetime abstainer from drugs. The abstainer has been a part of Life Course Development literature; within each of the several ages of onset models. Using a model which examines the abstainer from each drug and all drugs, the effect of Prosocial Factors (peer and school) are examined. Findings indicate a very low relationship between high protective/prosocial factors and abstaining. The research of Moffitt that there may be several subtypes of abstainers is supported.  相似文献   
932.
Journal of Experimental Criminology - This study introduces the California Crime Harm Index (CA-CHI) and explores in what context a Crime Harm Index is a meaningful measure, comparing crime count...  相似文献   
933.
Communication apps can be an important source of evidence in a forensic investigation (e.g., in the investigation of a drug trafficking or terrorism case where the communications apps were used by the accused persons during the transactions or planning activities). This study presents the first evidence‐based forensic taxonomy of Windows Phone communication apps, using an existing two‐dimensional Android forensic taxonomy as a baseline. Specifically, 30 Windows Phone communication apps, including Instant Messaging (IM) and Voice over IP (VoIP) apps, are examined. Artifacts extracted using physical acquisition are analyzed, and seven digital evidence objects of forensic interest are identified, namely: Call Log, Chats, Contacts, Locations, Installed Applications, SMSs and User Accounts. Findings from this study would help to facilitate timely and effective forensic investigations involving Windows Phone communication apps.  相似文献   
934.
Some researchers suggest that the observed boom in the levels of violence in Mexico since 2008 are a consequence of placing federal military forces in states with a significant organized crime presence. However, little has been said about the role of the changeable, competitive, and violent nature of criminal organizations on this increasing violence. Using the literature on inter- and intra-state conflicts as matter of analogy to explain organized crime developments in Mexico, fragmentation and cooperation seem to be determinant forces that alter the equilibrium within Mexican criminal groups, affecting their territorial control. By using a private dataset gathered by the Drug Policy Program at the Center for Economic Research and Teaching (CIDE), we examine the evolution of criminal organizations in Mexico by focusing on their different alliances and fragmentations from December 2006 to December 2011. Our analysis suggests that violence is a consequence not only of the law enforcement actions, but also of the fragmentation and cooperation within and between private groups.  相似文献   
935.
In May 2018, the process which may ultimately lead to the negotiation of a legally binding Global Pact for the environment formally commenced under the auspices of the United Nations General Assembly. Expectations for the Pact are high, evidenced in particular by its multiple and overlapping objectives: to serve as a generic binding instrument of international environmental law (IEL) principles; to integrate, consolidate, unify and ultimately entrench many of the fragmented principles of IEL; and to constitute the first global environmental human rights instrument. In the wake of the impending intergovernmental process, the paper offers a thorough critique of the draft Pact in its present iteration. We do so with the aim of evaluating the strengths and weaknesses of the present draft Pact by interrogating: (a) its diplomatic and symbolic relevance and possible unique contribution at the policy level to global environmental law and governance, and (b) its potential at the operational level of IEL and global environmental governance, focusing on the extent to which the draft Pact accommodates both existing and more recent rules and principles for environmental protection. As the Pact’s primary ambition is to become a universally binding global treaty, it would be churlish not to recognise its potential for innovation, as well as the considerable opportunity that the negotiation of the Pact will have to generate broad-sweeping and positive impacts. However, our central thesis is that only if the Global Pact were to incorporate ambitious normative provisions to strengthen those public and private global governance efforts that aim to halt the deterioration of Earth system integrity, as well as to maintain and improve integrity, will it be able to offer a firm foundation of the type of Anthropocene Law, termed here as the Lex Anthropocenae, required to confront head-on the deep socio-ecological crisis of the Anthropocene.  相似文献   
936.
Drawing on Sutherland’s theory of behaviour systems in crime, this study investigates social media fraud (SMF) facilitated by botnets to understand the onset and maturation of this new online offending behaviour. We find legitimate actors in the system – Internet of Things manufacturers, online social networks, hosting companies and law enforcement agencies – share a way of life that prioritises private gains and avoids implicit responsibility for security. They arrive at a Nash equilibrium that provides a weak and disorganised social response to crime. SMF providers, on the other hand, are cleverly organised and exploit weaknesses in security, adapting to change and developing working relationship with those who benefit from their activities and share their lenient behaviour towards fraudulent activities. We conclude that the rise in cybercrime is a result of the behaviours of all actors in the system, not just those who offend.  相似文献   
937.
The advent of cloud computing has brought the computing power of corporate data processing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices along with the power and capability of a service. Using logical as opposed to physical partitions across cloud servers, providers supply flexible and scalable resources. Furthermore, the possibility for multitenant accounts promises considerable freedom when establishing access controls for cloud content. For forensic analysts conducting data acquisition, cloud resources present unique challenges. Inherent properties such as dynamic content, multiple sources, and nonlocal content make it difficult for a standard to be developed for evidence gathering in satisfaction of United States federal evidentiary standards in criminal litigation. Development of such standards, while essential for reliable production of evidence at trial, may not be entirely possible given the guarantees to privacy granted by the Fourth Amendment and the Electronic Communications Privacy Act. Privacy of information on a cloud is complicated because the data is stored on resources owned by a third-party provider, accessible by users of an account group, and monitored according to a service level agreement. This research constructs a balancing test for competing considerations of a forensic investigator acquiring information from a cloud.  相似文献   
938.
Translated texts sometimes reflect the writing tradition of the targeted law, but the equivalence of the source legal message, however, must be delivered in the target text. Translating law into a different legal culture cannot be accomplished without comparing laws, whose knowledge is essential to achieving legal equivalence. The way the target text is written should match its culture. Translating law is the moment when languages, cultures and laws meet. To materialize, this encounter has to be based on an ad hoc knowledge of the laws at stake. Then comparative law, translators’ “fellow traveler”, comes into play, preparing them for the exchange. To achieve this, “one only needs two receptions which intersect” (Carbonnier). This move is successful when concepts and notions overlap and the letter of law (substance) and its wording (form) merge, revealing “the spirit of the laws”. Comparative analysis is the way to achieve this result (I). It is conducted here under the light of jurilinguistics with an analysis of terms and concepts presenting various translation difficulties, demonstrating the necessity of comparative law (II). The lessons to be learned are aimed at all language professionals wishing to draw inspiration from the jurilinguists’comparative analysis approach to their work.  相似文献   
939.
This research focused on the effect of the built environment on Bogotá’s violent crime by using the Risk Terrain Modeling (RTM) technique. The current study used 17 ecological variables, including micro-level data on the spatial distribution of socio-economic strata, and the location of an array of businesses and other features of the landscape. As suggested by the results of this study, the spatial distribution of violent crime in Bogotá is highly correlated with the allocation of socio-economic strata throughout its geography. A statistically valid RTM analysis identified the micro-level risk factors associated with three types of violent crime incidents, namely homicide, assault, and theft incidents. These results suggest that future violent crime incidents are more likely to occur at a reduced number of high-risk micro-places. Moreover, while homicide and assault incidents were more likely to cluster within the poorest areas of the city, theft incidents presented a higher risk of victimization near the city center, where economic activity and suitable targets concentrate. This study offers a unique account regarding the effect of socio-economic segregation on violent crime victimization across Bogotá’s geography and within different socio-economic strata classifications.  相似文献   
940.
The ready availability of butane makes butane abuse frequent. Fatalities are rare. This study presents two cases of death by butane overdose. The postmortem analyses were carried out using headspace gas chromatography–mass spectrometry. It revealed femoral blood butane concentrations of 18 and 22 mg/L, respectively, as well as specific combinations of adjuvants in each victim. In one of the victims, brain and fatty tissue also contained butane, pointing to chronic consumption. The originality of this study is to show that the identification of specific combinations of adjuvants can be helpful for identifying the brand of deodorant used. Also, sampling the skin and mucosa can help identify the method of drug delivery. The histological examination documented both the direct toxic effect of the gas on the respiratory mucosa and signs of chronic abuse. Volatile substance intoxications should be systematically considered in case of sudden death in a teenager.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号