全文获取类型
收费全文 | 1168篇 |
免费 | 15篇 |
专业分类
各国政治 | 28篇 |
工人农民 | 54篇 |
世界政治 | 48篇 |
外交国际关系 | 483篇 |
法律 | 414篇 |
中国政治 | 15篇 |
政治理论 | 139篇 |
综合类 | 2篇 |
出版年
2023年 | 6篇 |
2020年 | 9篇 |
2019年 | 12篇 |
2018年 | 15篇 |
2017年 | 14篇 |
2016年 | 13篇 |
2015年 | 10篇 |
2014年 | 47篇 |
2013年 | 119篇 |
2012年 | 69篇 |
2011年 | 112篇 |
2010年 | 70篇 |
2009年 | 80篇 |
2008年 | 44篇 |
2007年 | 43篇 |
2006年 | 61篇 |
2005年 | 52篇 |
2004年 | 61篇 |
2003年 | 60篇 |
2002年 | 52篇 |
2001年 | 17篇 |
2000年 | 9篇 |
1999年 | 22篇 |
1998年 | 6篇 |
1997年 | 8篇 |
1996年 | 8篇 |
1995年 | 12篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 7篇 |
1991年 | 8篇 |
1990年 | 7篇 |
1989年 | 13篇 |
1988年 | 9篇 |
1987年 | 8篇 |
1986年 | 10篇 |
1985年 | 4篇 |
1984年 | 5篇 |
1983年 | 7篇 |
1982年 | 5篇 |
1981年 | 6篇 |
1979年 | 8篇 |
1978年 | 6篇 |
1977年 | 4篇 |
1973年 | 3篇 |
1972年 | 3篇 |
1971年 | 3篇 |
1970年 | 3篇 |
1968年 | 5篇 |
1966年 | 3篇 |
排序方式: 共有1183条查询结果,搜索用时 15 毫秒
871.
Charles M. KatzAuthor Vitae Vincent J. WebbAuthor VitaeKate FoxAuthor Vitae Jennifer N. ShafferAuthor Vitae 《Journal of criminal justice》2011,39(1):48
Purpose
Research examining factors that precipitate gang violence has contributed substantially to our understanding of gangs and gang activity with respect to offending, yet we still know relatively little about how gangs influence members’ risk of victimization. The current study examines three hypotheses: (1) gang involvement and involvement in other risky lifestyles is related to violent victimization, (2) involvement in gang crime is associated with violent victimization, and (3) the presence of rival gangs is related to violent victimization.Methods
The present study uses data obtained from 909 recently booked juvenile arrestees who were interviewed as part of the Arizona Arrestee Drug Abuse Monitoring (ADAM) program.Results
Our findings indicated that prevalence of violent victimization was highest among gang members, followed by former gang members, gang associates, and non-gang members. After controlling for involvement in gang crime, however, gang membership per se did not significantly influence the juveniles’ risk of serious violent victimization.Conclusions
Our results call into question the conclusion that gang membership alone increases the likelihood of violent victimization vis-à-vis lifestyle/routine activities and/or collective liability. Instead our findings support prior research on the victim-offender overlap, that offending behaviors increase the risk of victimization. 相似文献872.
A DNA-based macroarray was designed to quickly and accurately identify certain Amanita mushroom specimens at the species level. The macroarray included probes for Amanita phalloides and Amanita ocreata, toxic species responsible for most mushroom poisonings, and Amanita lanei and Amanita velosa, edible species sometimes confused with toxic species, based on sequences of the highly variable internal transcribed spacer (ITS) region of rDNA. A cryptic species related to A. ocreata and one related to A. lanei, identifiable by ITS sequences, were also included. Specific multiple oligonucleotide probes were spotted onto nylon membranes and the optimal hybridization temperatures were determined. The Amanita DNA array was highly specific, sensitive (0.5 ng DNA/μL and higher were detected), and reproducible. In two case studies, the method proved useful when only small amounts of mushroom tissue remained after a suspected poisoning. An identification could be completed in 12 h. 相似文献
873.
Mark Taylor John Haggerty David Gresty Tom BerryAuthor vitae 《Computer Law & Security Report》2011,27(6):647-652
In this paper we examine the legal aspects of the forensic investigation of peer-to-peer networks. Organisations may encounter instances where employees have used peer-to-peer software for a variety of types of computer misuse including the dissemination of copyrighted materials or indecent images, or instances where peer-to-peer software has been involved in the transmission of malware for malicious or criminal purposes. In this paper we examine the process of the forensic investigation of peer-to-peer networks, and the issues relating to obtaining digital evidence from such peer-to-peer networks. 相似文献
874.
875.
Alexandre L.D. PereiraAuthor Vitae 《Computer Law & Security Report》2011,27(2):175-179
Innovation is a shared purpose of both intellectual property (IP) and competition law. However, sometimes competition law conflicts with the interests of IP holders. This paper searches for an adequate criterion of practical concordance, which consists of evaluating, in the concrete situation, which of those regulations best performs the purpose of promoting innovation. It is considered that requirements of competition law shape IP regulations, but the internal limits of protection therein identified are not enough to safeguard concerns of competition law. In particular, European courts held that, in exceptional circumstances, IP holders with market dominant position can be compelled to grant licenses of IP protected goods, such as copyrighted information and software. Such lifting of the IP exclusion power finds its rationale in preserving competition and promoting innovation, which is particularly sensitive within the dynamic software market. 相似文献
876.
Noriswadi IsmailAuthor Vitae 《Computer Law & Security Report》2011,27(3):250-257
Inspired by the cloud computing hypes, this paper responds to some of the hypes, but not to all. The hype in this paper refers to the level of the adequacy of data protection and privacy in a cloud computing (the Cloud) environment. Paradoxically, this paper proffers observational insights that surround the Cloud from the perspectives of data protection and privacy. It examines briefly the efforts of January 2010 led by Microsoft and anticipating “liability” scenarios. The liability rhetorically refers to the illegal access in the Cloud. This paper does not focus entirely on the technology sophistication; however, it analyses two scenarios of illegal access. To mitigate the liability, it suggests a “Cloud Compliant Strategy (CCS)” being a proposed model to control the Cloud. The observational insights of this paper have also intertwined with the adequacy of data protection from the lenses of the European Union (EU) Data Protection Directive 95/46/EC (DPD) and Safe Harbor provisions (SH). 相似文献
877.
Sylvia KierkegaardAuthor VitaeNigel WatersAuthor Vitae Graham GreenleafAuthor VitaeLee A. BygraveAuthor Vitae Ian LloydAuthor VitaeSteve SaxbyAuthor Vitae 《Computer Law & Security Report》2011,27(3):223-231
The Council of Europe is engaging in a process of revising its Data Protection Convention (Convention 108) to meet and overcome these challenges. The Council of Europe celebrates this year the 30th Anniversary of its Data Protection Convention (usually referred to as Convention 108) which has served as the backbone of international law in over 40 European countries and has influenced policy and legislation far beyond Europe’s shores. With new data protection challenges arising every day, the Convention is revising its Data Protection Convention. Computer Law and Security Review (CLSR) together with the Intl. Association of IT Lawyers (IAITL) and ILAWS have submitted comments in response to the Expert Committee’s public consultation on this document. CLSR aims to position itself at the forefront of policy discussion drawing upon the high quality scholarly contributions from leading experts around the world. 相似文献
878.
Efraim Inbar Author Vitae 《Orbis》2011,55(1):132-146
The deterioration of relations between Israel and Turkey, culminating in the “Gaza flotilla” affair of June 2010, are part of a reorientation in the Turkish foreign policy over the past several years: a move away from the West and toward Muslim states and non-state groups, including such radical actors as Iran, Hamas and Hizballah. This article reviews the rationale for the Israeli-Turkish strategic partnership in the 1990s and the early years of this century. It then documents deviations in Turkish foreign policy from Western patterns. Next it examines how changes in Turkey's twenty-first century strategic environment, as well as in the domestic arena, led to a reorientation of Turkish foreign policy and to current tensions in bilateral relations. And finally, it assesses the impact of the changes in Turkish foreign policy on the Greater Middle East and global politics. 相似文献
879.
Barak Mendelsohn Author Vitae 《Orbis》2011,55(2):189-202
Beginning with a historical perspective on foreign fighters, this article then seeks to clarify ambiguities and biases that shape how we often analyze the foreign fighter phenomenon. The central focus is then on the evolving trends and activities of the movement. A new generation of fighters has emerged who are comfortable as terrorists, recruiters, trainers and media propagandist, among other specialties. The author concludes by assessing the significance of the problem today. 相似文献
880.
Gilbert Rozman Author Vitae 《Orbis》2011,55(2):298-313
This article argues that multilateral mechanisms for addressing security issues in East Asia are weak and that a key reason is the hollowness of China's ostensible and much-touted commitment to multilateralism. This is especially troubling when the region faces major security challenges and regional relations (and China's approach to them) appear to be moving from “economics in command” to “security in command.” The article concludes with a prediction that “A coordinated approach to combining alliances and quasi-alliances exclusive of China with multilateralism inclusive of it will best test China's intentions during this decade.” 相似文献