首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1168篇
  免费   15篇
各国政治   28篇
工人农民   54篇
世界政治   48篇
外交国际关系   483篇
法律   414篇
中国政治   15篇
政治理论   139篇
综合类   2篇
  2023年   6篇
  2020年   9篇
  2019年   12篇
  2018年   15篇
  2017年   14篇
  2016年   13篇
  2015年   10篇
  2014年   47篇
  2013年   119篇
  2012年   69篇
  2011年   112篇
  2010年   70篇
  2009年   80篇
  2008年   44篇
  2007年   43篇
  2006年   61篇
  2005年   52篇
  2004年   61篇
  2003年   60篇
  2002年   52篇
  2001年   17篇
  2000年   9篇
  1999年   22篇
  1998年   6篇
  1997年   8篇
  1996年   8篇
  1995年   12篇
  1994年   6篇
  1993年   5篇
  1992年   7篇
  1991年   8篇
  1990年   7篇
  1989年   13篇
  1988年   9篇
  1987年   8篇
  1986年   10篇
  1985年   4篇
  1984年   5篇
  1983年   7篇
  1982年   5篇
  1981年   6篇
  1979年   8篇
  1978年   6篇
  1977年   4篇
  1973年   3篇
  1972年   3篇
  1971年   3篇
  1970年   3篇
  1968年   5篇
  1966年   3篇
排序方式: 共有1183条查询结果,搜索用时 15 毫秒
871.

Purpose

Research examining factors that precipitate gang violence has contributed substantially to our understanding of gangs and gang activity with respect to offending, yet we still know relatively little about how gangs influence members’ risk of victimization. The current study examines three hypotheses: (1) gang involvement and involvement in other risky lifestyles is related to violent victimization, (2) involvement in gang crime is associated with violent victimization, and (3) the presence of rival gangs is related to violent victimization.

Methods

The present study uses data obtained from 909 recently booked juvenile arrestees who were interviewed as part of the Arizona Arrestee Drug Abuse Monitoring (ADAM) program.

Results

Our findings indicated that prevalence of violent victimization was highest among gang members, followed by former gang members, gang associates, and non-gang members. After controlling for involvement in gang crime, however, gang membership per se did not significantly influence the juveniles’ risk of serious violent victimization.

Conclusions

Our results call into question the conclusion that gang membership alone increases the likelihood of violent victimization vis-à-vis lifestyle/routine activities and/or collective liability. Instead our findings support prior research on the victim-offender overlap, that offending behaviors increase the risk of victimization.  相似文献   
872.
A DNA-based macroarray was designed to quickly and accurately identify certain Amanita mushroom specimens at the species level. The macroarray included probes for Amanita phalloides and Amanita ocreata, toxic species responsible for most mushroom poisonings, and Amanita lanei and Amanita velosa, edible species sometimes confused with toxic species, based on sequences of the highly variable internal transcribed spacer (ITS) region of rDNA. A cryptic species related to A. ocreata and one related to A. lanei, identifiable by ITS sequences, were also included. Specific multiple oligonucleotide probes were spotted onto nylon membranes and the optimal hybridization temperatures were determined. The Amanita DNA array was highly specific, sensitive (0.5 ng DNA/μL and higher were detected), and reproducible. In two case studies, the method proved useful when only small amounts of mushroom tissue remained after a suspected poisoning. An identification could be completed in 12 h.  相似文献   
873.
In this paper we examine the legal aspects of the forensic investigation of peer-to-peer networks. Organisations may encounter instances where employees have used peer-to-peer software for a variety of types of computer misuse including the dissemination of copyrighted materials or indecent images, or instances where peer-to-peer software has been involved in the transmission of malware for malicious or criminal purposes. In this paper we examine the process of the forensic investigation of peer-to-peer networks, and the issues relating to obtaining digital evidence from such peer-to-peer networks.  相似文献   
874.
875.
Innovation is a shared purpose of both intellectual property (IP) and competition law. However, sometimes competition law conflicts with the interests of IP holders. This paper searches for an adequate criterion of practical concordance, which consists of evaluating, in the concrete situation, which of those regulations best performs the purpose of promoting innovation. It is considered that requirements of competition law shape IP regulations, but the internal limits of protection therein identified are not enough to safeguard concerns of competition law. In particular, European courts held that, in exceptional circumstances, IP holders with market dominant position can be compelled to grant licenses of IP protected goods, such as copyrighted information and software. Such lifting of the IP exclusion power finds its rationale in preserving competition and promoting innovation, which is particularly sensitive within the dynamic software market.  相似文献   
876.
Inspired by the cloud computing hypes, this paper responds to some of the hypes, but not to all. The hype in this paper refers to the level of the adequacy of data protection and privacy in a cloud computing (the Cloud) environment. Paradoxically, this paper proffers observational insights that surround the Cloud from the perspectives of data protection and privacy. It examines briefly the efforts of January 2010 led by Microsoft and anticipating “liability” scenarios. The liability rhetorically refers to the illegal access in the Cloud. This paper does not focus entirely on the technology sophistication; however, it analyses two scenarios of illegal access. To mitigate the liability, it suggests a “Cloud Compliant Strategy (CCS)” being a proposed model to control the Cloud. The observational insights of this paper have also intertwined with the adequacy of data protection from the lenses of the European Union (EU) Data Protection Directive 95/46/EC (DPD) and Safe Harbor provisions (SH).  相似文献   
877.
The Council of Europe is engaging in a process of revising its Data Protection Convention (Convention 108) to meet and overcome these challenges. The Council of Europe celebrates this year the 30th Anniversary of its Data Protection Convention (usually referred to as Convention 108) which has served as the backbone of international law in over 40 European countries and has influenced policy and legislation far beyond Europe’s shores. With new data protection challenges arising every day, the Convention is revising its Data Protection Convention. Computer Law and Security Review (CLSR) together with the Intl. Association of IT Lawyers (IAITL) and ILAWS have submitted comments in response to the Expert Committee’s public consultation on this document. CLSR aims to position itself at the forefront of policy discussion drawing upon the high quality scholarly contributions from leading experts around the world.  相似文献   
878.
The deterioration of relations between Israel and Turkey, culminating in the “Gaza flotilla” affair of June 2010, are part of a reorientation in the Turkish foreign policy over the past several years: a move away from the West and toward Muslim states and non-state groups, including such radical actors as Iran, Hamas and Hizballah. This article reviews the rationale for the Israeli-Turkish strategic partnership in the 1990s and the early years of this century. It then documents deviations in Turkish foreign policy from Western patterns. Next it examines how changes in Turkey's twenty-first century strategic environment, as well as in the domestic arena, led to a reorientation of Turkish foreign policy and to current tensions in bilateral relations. And finally, it assesses the impact of the changes in Turkish foreign policy on the Greater Middle East and global politics.  相似文献   
879.
Beginning with a historical perspective on foreign fighters, this article then seeks to clarify ambiguities and biases that shape how we often analyze the foreign fighter phenomenon. The central focus is then on the evolving trends and activities of the movement. A new generation of fighters has emerged who are comfortable as terrorists, recruiters, trainers and media propagandist, among other specialties. The author concludes by assessing the significance of the problem today.  相似文献   
880.
This article argues that multilateral mechanisms for addressing security issues in East Asia are weak and that a key reason is the hollowness of China's ostensible and much-touted commitment to multilateralism. This is especially troubling when the region faces major security challenges and regional relations (and China's approach to them) appear to be moving from “economics in command” to “security in command.” The article concludes with a prediction that “A coordinated approach to combining alliances and quasi-alliances exclusive of China with multilateralism inclusive of it will best test China's intentions during this decade.”  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号