首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   138篇
  免费   1篇
各国政治   12篇
工人农民   11篇
世界政治   7篇
外交国际关系   11篇
法律   79篇
中国政治   1篇
政治理论   18篇
  2023年   2篇
  2021年   2篇
  2020年   2篇
  2019年   7篇
  2018年   7篇
  2016年   6篇
  2015年   3篇
  2014年   6篇
  2013年   22篇
  2012年   5篇
  2011年   8篇
  2010年   3篇
  2009年   6篇
  2008年   1篇
  2007年   8篇
  2006年   5篇
  2005年   3篇
  2004年   5篇
  2003年   6篇
  2002年   6篇
  2001年   1篇
  2000年   1篇
  1999年   5篇
  1998年   3篇
  1997年   1篇
  1996年   1篇
  1994年   1篇
  1992年   2篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1985年   1篇
  1984年   2篇
  1983年   2篇
  1982年   1篇
  1981年   1篇
  1978年   1篇
排序方式: 共有139条查询结果,搜索用时 15 毫秒
21.
Substantial research has demonstrated the value of using risk assessment tools for the prediction and management of violence risk, including for intimate partner violence (IPV) (Mills, Kroner, and Morgan 2011). Such tools have been advocated for use by police officers (Hilton, Grant, and Rice 2010), but little is known about police officers’ perceptions of using these tools to inform their decision-making. Using a sample of 159 Canadian police officers (73% male, M age =?41.8 years, SD?=?8.9), the current study examined police officer’s experiences with IPV risk tools, their attitudes about using such tools, and identified predictors of these attitudes using an online survey. Most of this sample had previously used an IPV risk tool, which was most commonly the Brief Spousal Assault Form for the Evaluation of Risk (64.1%). Most police officers rated use of risk tools as at least somewhat to extremely helpful (73.5%), and 67.4% indicated that they would use a risk tool with sufficient training on it. Regression analyses indicated that police officers’ perceived IPV risk tool usefulness was significantly predicted by older respondent age and greater perceived need for guidance in responding to IPV calls. In conclusion, most police officers view IPV risk screening as valuable for informing their responses to such calls for service and are likely to embrace such decision-aids with sufficient training on their potential impact for enhancing safety.  相似文献   
22.
It is important to understand the extent of transfer of explosive particles to different surfaces in order to better evaluate potential cross-contamination by explosives in crowded security controls such as those at airports. This work investigated the transfer of nine explosive residues (ANFO, dynamite, black powder, TNT, HMTD, PETN, NH4NO3, KNO3, NaClO3) through fingerprints from one surface to another. First, the extent of adhesion of explosive residues from different surfaces to the bare finger, nitrile and latex gloves was studied. Then, the transfer of explosive residues from one surface to another through fingerprints was investigated. Cotton fabric (hereinafter referred to as cotton) as clothing material and polycarbonate plastic (hereinafter referred to as polycarbonate) as luggage material were chosen for the experiments. These surfaces containing explosive particles were imaged using a reflex camera before and after the particles were transferred. Afterwards the images were processed in MATLAB where pixels corresponding to explosive residues were quantified. Results demonstrated that transfer of explosive residues frequently occurred with certain differences among materials. Generally, the amount of explosive particles adhered to the finger decreased in the following order: skin>latex>nitrile, while the transfer of particles from the finger to another surface was the opposite. The adhesion of explosive residues from polycarbonate to the finger was found to be better compared to cotton, while the amount of particles transferred to cotton was higher.  相似文献   
23.
One of the verbal approaches to the detection of deceit is based on research on human memory that tries to identify the characteristics that differentiate between internal and external memories (reality monitoring). This approach has attempted to extrapolate the contributions of reality monitoring (RM) research to the deception area. In this paper, we have attempted to review all available studies conducted in several countries in order to yield some general conclusions concerning the discriminative power of this approach. Regarding individual criteria, the empirical results are not very encouraging: few criteria discriminate significantly across studies, and there are several variables that moderate their effect. Some of the contradictory findings may have emerged because of differences in the operationalizations and procedures used across individual studies. However, more promising results have been reported in recent studies, and the approach as a whole appears to discriminate above chance level, reaching accuracy rates that are similar to those of criteria-based content analysis (CBCA). Some suggestions for future research are made.  相似文献   
24.
25.
Abstract

European leaders frequently vaunt the European Union's distinctiveness in adopting and pursuing a comprehensive approach to security. The EU's profile as an international actor is designed to span across all dimensions of security. As a result, its security policy portfolio involves a large number of institutional actors and policies that need to be coordinated. The ambition of the EU to provide security in a comprehensive manner raises challenges at the politico–strategic level, at the level of operational and policy planning and in day-to-day implementation. So far, the field is lacking an inclusive analytical framework for the analysis of providing security through a distinctively comprehensive civil–military, economic and political organisation. This article seeks to close this gap by providing suggestions for how the wide range of issues related to comprehensive security could be structured, and by framing the matter theoretically and with reference to existing conceptual work and empirical research.  相似文献   
26.
Political instability and debt problems characterise Latin America in the last two decades. This article estimated a logit model of debt arrears including economic as well as political variables. Our results suggested that both economic and political indicators affected debt repayment in Latin America during 1971–86. We also cast a shadow on the viewpoint that authoritarian and military regimes have an advantage over democratically elected governments with regard to debt related issues.  相似文献   
27.
Bullet embolism of the arterial, venous and paradoxical types are well known but rare complications of penetrating missile injuries. Retrograde transthoracic venous bullet embolization is extremely rare with only four cases previously reported in the literature. Single gunshot can cause multiple wounds, mainly because the bullet passes through an intermediate target before striking the victim. We present the autopsy findings of a retrograde transthoracic bullet embolism to the right external iliac vein after a single gunshot with multiple wounds in the left arm and thorax. Problems related to medico-legal investigations of gunshots are reviewed.  相似文献   
28.
The Migrant Clinicians Network’s Familias con Voz (Families with a Voice) project aims to train migrant men and women to become intimate partner violence (IPV) peer educators in their communities. In preparation for implementing educational activities, a community survey was conducted with 298 participants in three Texas border counties. Verbal abuse, such as name calling, was the most frequent type of violence reported. Men perceived anger as a cause of partner violence significantly more than women. Only 22% of respondents reported knowing of a shelter they could turn to for help. Surprisingly, a majority of participants cited “seeking help from the police” when asked about ways to decrease partner violence. Survey results offer insight into developing effective intervention programs by capturing the intended audiences’ beliefs and attitudes. Additionally, survey results reveal possible strategies for how to tackle IPV in U.S.-Mexico border migrant farmworker communities.
Candace KugelEmail:
  相似文献   
29.
ABSTRACT

The rule of law is a moral ideal that protects distinctive legal values such as generality, equality before the law, the independence of courts, and due process rights. I argue that one of the main goals of an international rule of the law is the protection of individual and state autonomy from the arbitrary interference of international institutions, and that the best way to codify this protection is through constitutional rules restraining the reach of international law into the internal affairs of a state. State autonomy does not have any intrinsic value or moral status of its own. Its value is derivative, resulting from the role it plays as the most efficient means of protecting autonomy for individuals and groups. Therefore, the goal of protecting state autonomy form the encroachment of international law will have to be constrained by, and balanced against the more fundamental goal of an international rule of law, the protection of the autonomy of individual persons, best realized through the entrenchment of basic human rights.  相似文献   
30.
This study aimed to explore the family profile of adolescent-to-parent abuse cases. Concretely, this paper examines whether or not there is a different family profile of parent-abuse offenders compared with other types of offenders and with non-offender adolescents. The sample included 90 adolescents who were clustered into three groups (parent-abuse offenders, other type of offenders, and non-offender adolescents). Participants completed measures of quality of communication with parents and parents’ educational styles. They were also evaluated using a brief interview with questions about family structure. Results indicate offenders who assault their parents have a different family structure and dynamics. Differences were found concerning the type of household, family size, and family incomes. In addition, parent-abuse offenders reported a lower quality of communication with both parents perceiving them as less warm, more rejecting, and less inductive than did the other groups.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号