全文获取类型
收费全文 | 579篇 |
免费 | 25篇 |
专业分类
各国政治 | 23篇 |
工人农民 | 60篇 |
世界政治 | 33篇 |
外交国际关系 | 40篇 |
法律 | 269篇 |
中国政治 | 9篇 |
政治理论 | 163篇 |
综合类 | 7篇 |
出版年
2023年 | 7篇 |
2022年 | 1篇 |
2021年 | 4篇 |
2020年 | 12篇 |
2019年 | 20篇 |
2018年 | 26篇 |
2017年 | 19篇 |
2016年 | 20篇 |
2015年 | 20篇 |
2014年 | 17篇 |
2013年 | 74篇 |
2012年 | 16篇 |
2011年 | 22篇 |
2010年 | 18篇 |
2009年 | 15篇 |
2008年 | 32篇 |
2007年 | 29篇 |
2006年 | 21篇 |
2005年 | 15篇 |
2004年 | 12篇 |
2003年 | 20篇 |
2002年 | 11篇 |
2001年 | 13篇 |
2000年 | 9篇 |
1999年 | 7篇 |
1998年 | 4篇 |
1997年 | 8篇 |
1996年 | 10篇 |
1995年 | 9篇 |
1994年 | 9篇 |
1993年 | 6篇 |
1992年 | 9篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 7篇 |
1988年 | 10篇 |
1987年 | 9篇 |
1986年 | 18篇 |
1985年 | 16篇 |
1984年 | 3篇 |
1983年 | 4篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 2篇 |
1979年 | 4篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
1969年 | 1篇 |
1943年 | 1篇 |
排序方式: 共有604条查询结果,搜索用时 15 毫秒
251.
Technologies are meant to enable us to contact more people, more often, and in this way “network” with others. Applied to dating, this would appear to be a good thing, as people would thereby benefit from having additional choice. However, the flip side of the coin is that because of the increased choice we get a case of too much information, too many choices, too many potential (and potentially unsatisfying) mates. We find in a qualitative study of online daters that filtering through the many options, partners and choices offered by online dating sites is a prime concern in online dating. Our aim in this paper is to characterize these filtering techniques, and also to discuss their potential social impact. We find that filtering begins at the initial screening process as daters try to “catch out” incongruous behaviour before investing too much energy in someone unsuitable. Participants quickly become increasingly technologically literate of the code-based features of the site in their quest for greater filtering efficiency. They also come to rely on the cultivation of their own filtering “instinct”. In the end, however, the prevalence and ongoing practice of filtering creates what can only be termed a shopping culture of dating, which often serves to sap the dating energies of participants. 相似文献
252.
John Fisher 《亚洲事务》2013,44(2):202-212
This article covers the gathering of intelligence in the nineteenth and early twentieth centuries in Asia, particularly in Turkey, the Caucasus and Central Asia. Inevitably, the Great Game and concerns about Russian intentions loomed large. Initially most information was gathered informally, by travellers, by officers on leave, by civilians, by explorers. And although over time there was a gradual move towards greater professionalism, official resources for information-gathering were very limited until the outbreak of the Great War. The article ends with details of the exploits of men such as William Childs, Norman Bray, Reginald Teague-Jones and Ely Sloane. 相似文献
253.
Education policy has recently focused on improving accountability and incentives of public providers for actual learning outcomes, often with school-based reward programmes for high performers. The Learning Guarantee Programme in Karnataka, India, is prominent among such efforts, providing cash transfers to government schools that achieve learning at specified high levels. This study examines whether schools that self-selected into the incentive programme are different than those that did not. The answer has important implications for how to evaluate the impact of such a programme. Although we find no significant differences in resources and characteristics, we do find significant and substantial differences in test scores prior to selection into the programme, with better performing schools more likely to opt-in. These findings also provide insight into how incentive-based programmes that focus on levels of (rather than changes in) achievement can exacerbate inequality in education. Failing schools, since they are more likely to opt-out of incentive programmes, are likely to require other targeted programmes in order to improve. In addition, our findings reinforce the value of randomised controlled trials to evaluate incentive programmes since evaluations that rely on matching schools based on resources (if, for instance, pre-programme test scores are unavailable) will be biased if resources poorly predict test scores. 相似文献
254.
David Fisher 《Commonwealth Law Bulletin》2013,39(4):755-764
This article summarizes key developments of interest to the Commonwealth in the regulation of international disaster response over the last year. It includes discussion of global and regional instruments impacting on Commonwealth states as well as steps taken at the national level by some Commonwealth members. 相似文献
255.
Deception researchers have attempted to improve people’s ability to detect deceit by teaching them which cues to pay attention to. Such training only yields limited success because, we argue, the nonverbal and verbal cues that liars spontaneously display are faint and unreliable. In recent years, the emphasis has radically changed and the current focus is on developing interview techniques that elicit and enhance cues to deception. We give an overview of this innovative research. We also consider to what extent current deception research can be used to fight terrorism. We argue that researchers should pay particular attention to settings that are neglected so far but relevant for terrorism, such as (i) lying about intentions, (ii) examining people when they are secretly observed and (iii) interviewing suspects together. We will commence this paper with general information that puts our reasoning into context. That is, we turn briefly to physiological and neurological lie detection methods that are often discussed in the media, then to the theoretical underpinnings of nonverbal and verbal cues to deceit, and the research methods typically used in nonverbal and verbal lie detection research. 相似文献
256.
John Stogner Bonnie S. Fisher Eric A. Stewart Christopher J. Schreck 《Women & Criminal Justice》2013,23(1):62-81
Though a large body of research has found that peer social network characteristics influence both offending and victimization, relatively little is known about the influence of social network characteristics on adolescent sexual victimization. Attractiveness and sociability largely indicate popularity for teenage females, which in turn leads to earlier onset of dating, greater dating options, and potential risk of sexual victimization—an observation not tested in the criminological and criminal justice literature. We suggest and evaluate 2 competing hypotheses: that popularity within a network insulates females from sexual victimization and that popularity may increase exposure to delinquent others and facilitate sexual victimization. Results suggest that popularity does not have a consistent effect but instead that its role is conditioned by the deviance of the network. Popularity is associated with an increase in the likelihood of victimization when peer deviance is high but with a decrease when peer deviance is low. We further demonstrate that an interaction between a female's own drinking and the proportion of her friends that are male strongly affects her likelihood of sexual victimization. Implications for policy and future research are explored. 相似文献
257.
This article reinterprets the discursive terms and cultural meanings that redefined the legal campaign against Big Tobacco during recent decades. We underline the palpable shift from a conventional tort‐based logic of products liability claims, which most analysts emphasize, to a logic incorporating key features identified with criminal law or “crimtorts.” The study builds on legal mobilization theory and combines narrative history of events with systematic analysis of media coverage across a twenty‐year period to demonstrate how Big Tobacco was criminalized over two decades. 相似文献
258.
This article discusses the Don't Stand By: Hate Crime Research Report (DSB) (Mencap, 2011), which documents failings in policing practices related to reporting and responding to disability hate crime. Such failings, we argue, constitute not so much direct discrimination but acts of ‘normalcy’. Normalcy is the process whereby taken for granted ideas about what is normal become naturalised; in this respect being non-disabled is seen as normal. Acts of normalcy, whilst less tangible, are by no means less violent or harmful than acts of ‘real discrimination’ or ‘real violence’ (Goodley and Rumswick-Cole, 2011). Systemic and cultural normalcy within the police is not new, as can be seen in the case of Stephen Lawrence. 相似文献
259.
In the current study, we tested the utility of applying the Verifiability Approach (VA) within an international airport setting. The VA works on the notion that truth tellers provide more verifiable details than liars and has shown to be successful within other empirical deception detection scenarios. Three hundred and ninety-nine airside participants (those originating from Europe, Asia and African) were asked questions regarding their travel plans. We asked participants to either lie (n?=?195) or tell the truth (n?=?204) about their planned activities. The critical question required participants to provide information that would convince the investigator that they were telling the truth. We then transcribed and coded their responses for verifiable details; that is, details that could potentially be checked by an investigator. Overall, truth tellers provided significantly more verifiable details than liars. Furthermore, when taking their geographical origin into account, there was no interaction effect between veracity and region. Additionally, truth tellers provided a higher verifiable/total detail ratio than liars, which again showed no interaction effect between veracity and region. These findings support the suitability of the VA as a cross-cultural veracity tool and implications for its use as an additional security aid are discussed. 相似文献
260.
In Experiment 1, we examined whether three interview styles used by the police, accusatory, information-gathering and behaviour analysis, reveal verbal cues to deceit, measured with the Criteria-Based Content Analysis (CBCA) and Reality Monitoring (RM) methods. A total of 120 mock suspects told the truth or lied about a staged event and were interviewed by a police officer employing one of these three interview styles. The results showed that accusatory interviews, which typically result in suspects making short denials, contained the fewest verbal cues to deceit. Moreover, RM distinguished between truth tellers and liars better than CBCA. Finally, manual RM coding resulted in more verbal cues to deception than automatic coding of the RM criteria utilising the Linguistic Inquiry and Word Count (LIWC) software programme.In Experiment 2, we examined the effects of the three police interview styles on the ability to detect deception. Sixty-eight police officers watched some of the videotaped interviews of Experiment 1 and made veracity and confidence judgements. Accuracy scores did not differ between the three interview styles; however, watching accusatory interviews resulted in more false accusations (accusing truth tellers of lying) than watching information-gathering interviews. Furthermore, only in accusatory interviews, judgements of mendacity were associated with higher confidence. We discuss the possible danger of conducting accusatory interviews. 相似文献