首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   579篇
  免费   25篇
各国政治   23篇
工人农民   60篇
世界政治   33篇
外交国际关系   40篇
法律   269篇
中国政治   9篇
政治理论   163篇
综合类   7篇
  2023年   7篇
  2022年   1篇
  2021年   4篇
  2020年   12篇
  2019年   20篇
  2018年   26篇
  2017年   19篇
  2016年   20篇
  2015年   20篇
  2014年   17篇
  2013年   74篇
  2012年   16篇
  2011年   22篇
  2010年   18篇
  2009年   15篇
  2008年   32篇
  2007年   29篇
  2006年   21篇
  2005年   15篇
  2004年   12篇
  2003年   20篇
  2002年   11篇
  2001年   13篇
  2000年   9篇
  1999年   7篇
  1998年   4篇
  1997年   8篇
  1996年   10篇
  1995年   9篇
  1994年   9篇
  1993年   6篇
  1992年   9篇
  1991年   2篇
  1990年   2篇
  1989年   7篇
  1988年   10篇
  1987年   9篇
  1986年   18篇
  1985年   16篇
  1984年   3篇
  1983年   4篇
  1982年   3篇
  1981年   3篇
  1980年   2篇
  1979年   4篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
  1969年   1篇
  1943年   1篇
排序方式: 共有604条查询结果,搜索用时 15 毫秒
251.
Technologies are meant to enable us to contact more people, more often, and in this way “network” with others. Applied to dating, this would appear to be a good thing, as people would thereby benefit from having additional choice. However, the flip side of the coin is that because of the increased choice we get a case of too much information, too many choices, too many potential (and potentially unsatisfying) mates. We find in a qualitative study of online daters that filtering through the many options, partners and choices offered by online dating sites is a prime concern in online dating. Our aim in this paper is to characterize these filtering techniques, and also to discuss their potential social impact. We find that filtering begins at the initial screening process as daters try to “catch out” incongruous behaviour before investing too much energy in someone unsuitable. Participants quickly become increasingly technologically literate of the code-based features of the site in their quest for greater filtering efficiency. They also come to rely on the cultivation of their own filtering “instinct”. In the end, however, the prevalence and ongoing practice of filtering creates what can only be termed a shopping culture of dating, which often serves to sap the dating energies of participants.  相似文献   
252.
John Fisher 《亚洲事务》2013,44(2):202-212
This article covers the gathering of intelligence in the nineteenth and early twentieth centuries in Asia, particularly in Turkey, the Caucasus and Central Asia. Inevitably, the Great Game and concerns about Russian intentions loomed large. Initially most information was gathered informally, by travellers, by officers on leave, by civilians, by explorers. And although over time there was a gradual move towards greater professionalism, official resources for information-gathering were very limited until the outbreak of the Great War. The article ends with details of the exploits of men such as William Childs, Norman Bray, Reginald Teague-Jones and Ely Sloane.  相似文献   
253.
Education policy has recently focused on improving accountability and incentives of public providers for actual learning outcomes, often with school-based reward programmes for high performers. The Learning Guarantee Programme in Karnataka, India, is prominent among such efforts, providing cash transfers to government schools that achieve learning at specified high levels. This study examines whether schools that self-selected into the incentive programme are different than those that did not. The answer has important implications for how to evaluate the impact of such a programme. Although we find no significant differences in resources and characteristics, we do find significant and substantial differences in test scores prior to selection into the programme, with better performing schools more likely to opt-in. These findings also provide insight into how incentive-based programmes that focus on levels of (rather than changes in) achievement can exacerbate inequality in education. Failing schools, since they are more likely to opt-out of incentive programmes, are likely to require other targeted programmes in order to improve. In addition, our findings reinforce the value of randomised controlled trials to evaluate incentive programmes since evaluations that rely on matching schools based on resources (if, for instance, pre-programme test scores are unavailable) will be biased if resources poorly predict test scores.  相似文献   
254.
This article summarizes key developments of interest to the Commonwealth in the regulation of international disaster response over the last year. It includes discussion of global and regional instruments impacting on Commonwealth states as well as steps taken at the national level by some Commonwealth members.  相似文献   
255.
Deception researchers have attempted to improve people’s ability to detect deceit by teaching them which cues to pay attention to. Such training only yields limited success because, we argue, the nonverbal and verbal cues that liars spontaneously display are faint and unreliable. In recent years, the emphasis has radically changed and the current focus is on developing interview techniques that elicit and enhance cues to deception. We give an overview of this innovative research. We also consider to what extent current deception research can be used to fight terrorism. We argue that researchers should pay particular attention to settings that are neglected so far but relevant for terrorism, such as (i) lying about intentions, (ii) examining people when they are secretly observed and (iii) interviewing suspects together. We will commence this paper with general information that puts our reasoning into context. That is, we turn briefly to physiological and neurological lie detection methods that are often discussed in the media, then to the theoretical underpinnings of nonverbal and verbal cues to deceit, and the research methods typically used in nonverbal and verbal lie detection research.  相似文献   
256.
Though a large body of research has found that peer social network characteristics influence both offending and victimization, relatively little is known about the influence of social network characteristics on adolescent sexual victimization. Attractiveness and sociability largely indicate popularity for teenage females, which in turn leads to earlier onset of dating, greater dating options, and potential risk of sexual victimization—an observation not tested in the criminological and criminal justice literature. We suggest and evaluate 2 competing hypotheses: that popularity within a network insulates females from sexual victimization and that popularity may increase exposure to delinquent others and facilitate sexual victimization. Results suggest that popularity does not have a consistent effect but instead that its role is conditioned by the deviance of the network. Popularity is associated with an increase in the likelihood of victimization when peer deviance is high but with a decrease when peer deviance is low. We further demonstrate that an interaction between a female's own drinking and the proportion of her friends that are male strongly affects her likelihood of sexual victimization. Implications for policy and future research are explored.  相似文献   
257.
This article reinterprets the discursive terms and cultural meanings that redefined the legal campaign against Big Tobacco during recent decades. We underline the palpable shift from a conventional tort‐based logic of products liability claims, which most analysts emphasize, to a logic incorporating key features identified with criminal law or “crimtorts.” The study builds on legal mobilization theory and combines narrative history of events with systematic analysis of media coverage across a twenty‐year period to demonstrate how Big Tobacco was criminalized over two decades.  相似文献   
258.
This article discusses the Don't Stand By: Hate Crime Research Report (DSB) (Mencap, 2011), which documents failings in policing practices related to reporting and responding to disability hate crime. Such failings, we argue, constitute not so much direct discrimination but acts of ‘normalcy’. Normalcy is the process whereby taken for granted ideas about what is normal become naturalised; in this respect being non-disabled is seen as normal. Acts of normalcy, whilst less tangible, are by no means less violent or harmful than acts of ‘real discrimination’ or ‘real violence’ (Goodley and Rumswick-Cole, 2011). Systemic and cultural normalcy within the police is not new, as can be seen in the case of Stephen Lawrence.  相似文献   
259.
In the current study, we tested the utility of applying the Verifiability Approach (VA) within an international airport setting. The VA works on the notion that truth tellers provide more verifiable details than liars and has shown to be successful within other empirical deception detection scenarios. Three hundred and ninety-nine airside participants (those originating from Europe, Asia and African) were asked questions regarding their travel plans. We asked participants to either lie (n?=?195) or tell the truth (n?=?204) about their planned activities. The critical question required participants to provide information that would convince the investigator that they were telling the truth. We then transcribed and coded their responses for verifiable details; that is, details that could potentially be checked by an investigator. Overall, truth tellers provided significantly more verifiable details than liars. Furthermore, when taking their geographical origin into account, there was no interaction effect between veracity and region. Additionally, truth tellers provided a higher verifiable/total detail ratio than liars, which again showed no interaction effect between veracity and region. These findings support the suitability of the VA as a cross-cultural veracity tool and implications for its use as an additional security aid are discussed.  相似文献   
260.
In Experiment 1, we examined whether three interview styles used by the police, accusatory, information-gathering and behaviour analysis, reveal verbal cues to deceit, measured with the Criteria-Based Content Analysis (CBCA) and Reality Monitoring (RM) methods. A total of 120 mock suspects told the truth or lied about a staged event and were interviewed by a police officer employing one of these three interview styles. The results showed that accusatory interviews, which typically result in suspects making short denials, contained the fewest verbal cues to deceit. Moreover, RM distinguished between truth tellers and liars better than CBCA. Finally, manual RM coding resulted in more verbal cues to deception than automatic coding of the RM criteria utilising the Linguistic Inquiry and Word Count (LIWC) software programme.In Experiment 2, we examined the effects of the three police interview styles on the ability to detect deception. Sixty-eight police officers watched some of the videotaped interviews of Experiment 1 and made veracity and confidence judgements. Accuracy scores did not differ between the three interview styles; however, watching accusatory interviews resulted in more false accusations (accusing truth tellers of lying) than watching information-gathering interviews. Furthermore, only in accusatory interviews, judgements of mendacity were associated with higher confidence. We discuss the possible danger of conducting accusatory interviews.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号