全文获取类型
收费全文 | 827篇 |
免费 | 29篇 |
专业分类
各国政治 | 100篇 |
工人农民 | 39篇 |
世界政治 | 90篇 |
外交国际关系 | 52篇 |
法律 | 334篇 |
中国政治 | 4篇 |
政治理论 | 210篇 |
综合类 | 27篇 |
出版年
2024年 | 2篇 |
2023年 | 3篇 |
2022年 | 2篇 |
2021年 | 9篇 |
2020年 | 5篇 |
2019年 | 19篇 |
2018年 | 23篇 |
2017年 | 27篇 |
2016年 | 27篇 |
2015年 | 19篇 |
2014年 | 19篇 |
2013年 | 157篇 |
2012年 | 22篇 |
2011年 | 22篇 |
2010年 | 23篇 |
2009年 | 22篇 |
2008年 | 28篇 |
2007年 | 24篇 |
2006年 | 33篇 |
2005年 | 26篇 |
2004年 | 26篇 |
2003年 | 27篇 |
2002年 | 28篇 |
2001年 | 22篇 |
2000年 | 27篇 |
1999年 | 16篇 |
1998年 | 17篇 |
1997年 | 20篇 |
1996年 | 17篇 |
1995年 | 9篇 |
1994年 | 19篇 |
1993年 | 13篇 |
1992年 | 14篇 |
1991年 | 11篇 |
1990年 | 4篇 |
1989年 | 5篇 |
1988年 | 8篇 |
1987年 | 6篇 |
1986年 | 4篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 9篇 |
1982年 | 5篇 |
1981年 | 6篇 |
1980年 | 6篇 |
1978年 | 2篇 |
1976年 | 4篇 |
1974年 | 2篇 |
1966年 | 1篇 |
1943年 | 1篇 |
排序方式: 共有856条查询结果,搜索用时 31 毫秒
131.
Journal of Experimental Criminology - Procedural justice training for police officers is designed to improve officers’ interactions with the public. Aside from the fact that it is a given... 相似文献
132.
133.
Ian EdwardsAuthor Vitae 《Computer Law & Security Report》2011,27(2):189-190
The English High Court has considered the meaning of “making available to the public” by online transmission in the context of database rights and has determined that the act of making available is only committed in the country where the host server is located, and not the country where the material is accessed by the public. 相似文献
134.
Neumann C Evett IW Skerrett JE Mateos-Garcia I 《Forensic science international》2011,207(1-3):101-105
The authors have published elsewhere a quantitative method for assessing weight of evidence in the case where a finger mark from a crime scene is compared with a control print taken from a single finger of a suspect. The approach is based on the notion of calculating a likelihood ratio (LR) that addresses a pair of propositions relating to the single finger that was the origin of the crime mark. In practice, things are rather different because the crime mark will not just be compared with a single finger from a suspect but with a set of prints from all of his/her fingers; likewise, when the mark is compared with a database, this will consist of ten print records from random individuals. It is clear that "finger propositions" are not realistic in this situation and we show how our approach may be generalised to address a pair of propositions that relate to the person that made the crime mark. It often is the case that information is present at the crime scene that enables some inference to be drawn relating to which of the offender's ten fingers left a particular mark of interest. This kind of inference may profitably be drawn into the formal analysis. We illustrate our approach with an example. 相似文献
135.
Freckelton I 《Journal of law and medicine》2011,19(2):209-224
A series of developments in relation to the accountability of expert witnesses and the admissibility of their opinions is taking place. This extends to encroachments in the United Kingdom on expert witness immunity, the imposition of disciplinary liability for registered health practitioners in Australia and the United Kingdom, and recommendations from the United Kingdom Law Commission for a systematised procedure for reliability determination as a prerequisite for admissibility rulings. This combination of measures is indicative of international concern about the contemporary role of expert witnesses. It highlights the need for both empirical information about whether the anecdotal and experiential concerns about expert evidence are well-founded and for the provision of better and clearer guidance to experts and litigators alike about the underpinnings and methodologies that are permissible for admissible and probative expert opinions. 相似文献
136.
137.
Freckelton I 《Journal of law and medicine》2007,15(2):171-175
There is a need for the law to evolve so that corporations are obliged to make proper provision for liabilities to unascertained future creditors. However, implementation of long-tail liabilities is far from straightforward and has many repercussions for both corporations and personal injury law. In October 2005 the Parliamentary Secretary to the Treasurer requested the Corporations and Markets Advisory Committee to consider a "referred proposal" designed to achieve comprehensive and principled law reform. Analysis of the referred proposal reveals many shortcomings, a number of which have been addressed by the Committee in its June 2007 Discussion Paper, Long-Tail Liabilities: The Treatment of Unascertained Future Personal Injury Claims. This editorial urges further and reflective analysis of the referred proposal and of the Committee's tentative suggestions in order to achieve a balance among the entitlements of unascertained future creditors, other known creditors, shareholders, corporations' financial viability, and the conceptual integrity of corporations law. 相似文献
138.
Ian A. Elliott Hilary J. Eldridge Sherry Ashfield Anthony R. Beech 《Journal of family violence》2010,25(6):595-602
Despite nearly a century of knowledge indicating a significant number of women engaging in sexual activities with children,
the phenomenon has not yet been fully acknowledged. Recently, however, there has been a marked increase in research in this
area. However, due to the relatively small numbers of detections or convictions there remains a lack of data regarding: (1)
the specific clinical characteristics of female sex offenders; and (2) how these clinical factors link to re-offending and
treatment need. The following study examines potential risk, protective, and treatment factors that are highlighted through
the process of clinical intervention, using an adapted version of the Beech and Ward (2004) risk framework. We describe how female sex offenders typically display clinical deficits in the same risk domains as their
male counterparts, while noting the ways in which these deficits manifest in this population. In addition, we compare these
vulnerability factors in four established types of female sex offender. 相似文献
139.
Ian Walden 《Computer Law & Security Report》2018,34(4):901-907
The shared concern expressed in the two quotes below is that modern technologies provide criminals with a capability to evade investigation. This comment piece examines some of the policy and legal options available to governments and law enforcement agencies to try to address this concern. While accepting the claim that this phenomenon represents a real challenge to law enforcement agencies, we currently have insufficient evidence to show the true extent of the problem. What this piece does not accept is the implication contained in the quotes, and often made explicit by others, that the use of encryption represents a fundamental and irreversible shift in the balance of power between criminals and their investigators from what previously prevailed. Such claims tend to lack historical perspective, which is one of the themes of this 200th issue of Computer Law and Security Review. 相似文献
140.
Ian Lloyd 《Computer Law & Security Report》2018,34(4):779-783
This article considers the development of data protection laws from a position on the periphery of legal consciousness to the situation where it is the subject of intensive legal and media publicity. Focusing on the recent controversies surrounding the use of Facebook apps for political purposes, the article will consider the role and limitations of data and privacy protection laws. The question will be posed – if not answered – whether national or regional laws can be effective in what increasingly is a global information society. 相似文献