首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   120篇
  免费   3篇
各国政治   7篇
工人农民   17篇
世界政治   11篇
外交国际关系   6篇
法律   58篇
政治理论   24篇
  2023年   2篇
  2022年   2篇
  2021年   1篇
  2020年   7篇
  2019年   3篇
  2018年   6篇
  2017年   5篇
  2016年   4篇
  2015年   3篇
  2014年   6篇
  2013年   21篇
  2012年   8篇
  2011年   5篇
  2010年   6篇
  2009年   7篇
  2008年   1篇
  2007年   8篇
  2006年   6篇
  2005年   2篇
  2004年   5篇
  2003年   3篇
  2002年   5篇
  2001年   2篇
  1999年   1篇
  1997年   1篇
  1995年   2篇
  1976年   1篇
排序方式: 共有123条查询结果,搜索用时 15 毫秒
21.
Forensic DNA interpretation is transitioning from manual interpretation based usually on binary decision‐making toward computer‐based systems that model the probability of the profile given different explanations for it, termed probabilistic genotyping (PG). Decision‐making by laboratories to implement probability‐based interpretation should be based on scientific principles for validity and information that supports its utility, such as criteria to support admissibility. The principles behind STRmix? are outlined in this study and include standard mathematics and modeling of peak heights and variability in those heights. All PG methods generate a likelihood ratio (LR) and require the formulation of propositions. Principles underpinning formulations of propositions include the identification of reasonably assumed contributors. Substantial data have been produced that support precision, error rate, and reliability of PG, and in particular, STRmix?. A current issue is access to the code and quality processes used while coding. There are substantial data that describe the performance, strengths, and limitations of STRmix?, one of the available PG software.  相似文献   
22.
Patients affected by cranial trauma with depressed skull fractures and increased intracranial pressure generally undergo neurosurgical intervention. Because craniotomy and craniectomy remove skull fragments and generate new fracture lines, they complicate forensic examination and sometimes prevent a clear identification of skull fracture etiology. A 3-dimensional reconstruction based on preoperative computed tomography (CT) scans, giving a picture of the injuries before surgical intervention, can help the forensic examiner in identifying skull fracture origin and the means of production.We report the case of a 41-year-old-man presenting at the emergency department with a depressed skull fracture at the vertex and bilateral subdural hemorrhage. The patient underwent 2 neurosurgical interventions (craniotomy and craniectomy) but died after 40 days of hospitalization in an intensive care unit. At autopsy, the absence of various bone fragments did not allow us to establish if the skull had been stricken by a blunt object or had hit the ground with high kinetic energy. To analyze bone injuries before craniectomy, a 3-dimensional CT reconstruction based on preoperative scans was performed. A comparative analysis between autoptic and radiological data allowed us to differentiate surgical from traumatic injuries. Moreover, based on the shape and size of the depressed skull fracture (measured from the CT reformations), we inferred that the man had been stricken by a cylindric blunt object with a diameter of about 3 cm.  相似文献   
23.
Introduction of the construct “Dangerous and Severe Personality Disorder” (DSPD) by the UK Home Office and Department of Health has provoked strong debate and opposition. Its aims and that of proposed subsequent legislation was to enhance public protection by identifying and detaining a minority of persons with severe personality disorder who pose a high risk of serious sexual/violent offending. The most serious criticism was the ethical implication of allowing indefinite detention of people without criminal convictions. More recently, policy emphasis has shifted towards treatment. 1396 male prisoners serving sentences of 2+ years for sexual/violent offenses were prospectively interviewed (personality disorders, psychopathy, and risk) at a mean follow-up of 2 years. The prevalence of DSPD was 15%. Significantly more re-offended. Five DSPD offenders would need treatment to prevent one violent act. Based on an estimate of attributable risk, successful treatment of DSPD could reduce violent re-convictions among DSPD offenders by 71% and violent/sexual re-offenses in the prison population by 27%. DSPD criteria correctly identify high risk prisoners but primarily through risk-related demographic features. DSPD does not accurately identify serious sexual/violent re-offenders. The DSPD programme may reduce major violent re-offending if treatment interventions prove effective.  相似文献   
24.
Although the protection of personal data is harmonized within the EU by Directive 95/46/EC and will be further harmonized by the General Data Protection Regulation (GDPR) in 2018, there are significant differences in the ways in which EU member states implemented the protection of privacy and personal data in national laws, policies, and practices. This paper presents the main findings of a research project that compares the protection of privacy and personal data in eight EU member states: France, Germany, the UK, Ireland, Romania, Italy, Sweden, and the Netherlands. The comparison focuses on five major themes: awareness and trust, government policies for personal data protection, the applicable laws and regulations, implementation of those laws and regulations, and supervision and enforcement.The comparison of privacy and data protection regimes across the EU shows some remarkable findings, revealing which countries are frontrunners and which countries are lagging behind on specific aspects. For instance, the roles of and interplay between governments, civil rights organizations, and data protections authorities vary from country to country. Furthermore, with regard to privacy and data protection there are differences in the intensity and scope of political debates, information campaigns, media attention, and public debate. New concepts like privacy impact assessments, privacy by design, data breach notifications and big data are on the agenda in some but not in all countries. Significant differences exist in (the levels of) enforcement by the different data protection authorities, due to different legal competencies, available budgets and personnel, policies, and cultural factors.  相似文献   
25.
Abstract

The use of swearwords has hardly been investigated scientifically. Virtually nothing is known about the efficacy of swearing. The present studies set out to investigate whether the inclusion of swearwords in a testimony increases the believability of that statement. In study 1, respondents were simply asked whether they believed that using swearwords is a sign of credibility, a sign of deceit, or neither. In the second and third study, participants had to read fictitious testimonies of a suspect and a victim, respectively. Participants were exposed to testimonies with or without swearwords. The results suggested that people self-reported to find swearwords a sign of deceit (study 1), but when actually confronted with a statement, the opposite turned out to be the case (studies 2 and 3). That is, testimonies containing swearwords were perceived as more credible than swearword-free testimonies. Hence it is concluded that swearing increases believability of statements.  相似文献   
26.
In the German-speaking scientific community, empirically oriented family sociologists are often interested exclusively in current family situations. Only rarely is there in-depth consideration of the continued influence of familial and socio-historical contexts on individual life histories. While giving due regard to the effect of cataclysmic events and disruptions along with long-term and gradually changing patterns, this article seeks to develop a historical context that permits distinct levels of time to be identified, supporting further empirical work in family research. The closely interwoven fabric of individual and family histories is examined through the analysis of family histories and dynamics from the perspective of biographical narrators over a time span that transcends a single lifetime. The life stories of three East German women—grandmother (age 77), mother (age 49), and daughter (age 28)—give profound insights into the realities of socialism, women's professional careers, the contradictions of daily life, the upheavals attendant on the collapse of communism, and the challenges involved in the transition from socialism to capitalism.  相似文献   
27.
Between 1820 and 1930 over 5 million Germans emigrated to overseas destinations, most to the U.S. By the 1850s the number of German migrants living in the U.S. was large, a consequence partly of cumulative causation. I provide evidence for the dramatic increase in networks by using micro-level data for the German principality of Hesse-Cassel in the mid-nineteenth century. A conservative measurement of network relationships finds that after 25 years almost half of them were related to a previous family member from the same village. Migrants who used family networks tended to move in small units. Usually only a few years separated networked family members, but some links lasted over a decade. Women were unlikely to start a network but more likely than men to travel to the U.S. Within some families, migrants switched from continental destinations to the U.S., perhaps due to the failure of the 1848 March Revolution.  相似文献   
28.

Objectives

This study provides a Finnish replication of a recent Swiss experiment (Walser and Killias: J Exp Criminol 8:17–28, 2012) on the supervision mode effects in computerized delinquency surveys in schools. This study supplements the Swiss study by using individual level randomization and two additional outcome variables: meta-questions of response integrity and incidence-counting heuristics.

Methods

A total of 924 ninth grade students (15–16 years old) in southern Finland were randomly assigned (at the level of individuals) to supervision either by their teachers or by an external research assistant. Students then responded to an online self-report delinquency survey. Chi-square and t tests were used to compare prevalence levels and means.

Results

In both last year and lifetime recall periods, only one offence type (unspecified theft) showed significantly different outcomes, with external supervision yielding a higher prevalence figure. For other offences, no supervision effects were found. When females and males were separately examined, limited evidence of gender-specific supervision effects emerged. Thus, females appear to report more thefts in external supervision while males report more violence in teacher supervision. No statistically significant supervision effects were found in questions probing response integrity and counting heuristics.

Conclusion

Using teacher supervision in online self-report delinquency surveys does not appear to compromise the validity of the survey results. The findings thus largely corroborate the results of the earlier Swiss test. How supervision condition interacts with respondent characteristics apart from gender calls for further scrutiny.  相似文献   
29.
30.
The Global Initiative to Combat Nuclear Terrorism (GICNT) is an innovative, multi-pronged action aimed at enhancing the domestic capacities of a state, as well as its ability to interconnect internationally and to deal with the risk of a terrorist attack involving nuclear or radioactive materials. The GICNT, a joint US-Russian initiative, has now evolved into an informal network of over 70 countries. It pursues an objective of boosting the protection, detection, prosecution and response capabilities of a state by fostering cooperation on three levels: between a government and its agencies; between government and the private sector; and between like-minded states. Given its comprehensive approach to the nuclear terrorism threat, the initiative has great potential. Nevertheless, structural flaws such as the absence of any evaluation mechanism and the exclusion of military-related nuclear materials and sites are likely to make its impact far less global than expected.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号