首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   238篇
  免费   8篇
各国政治   14篇
工人农民   4篇
世界政治   22篇
外交国际关系   16篇
法律   123篇
中国政治   6篇
政治理论   61篇
  2021年   3篇
  2020年   5篇
  2019年   3篇
  2018年   10篇
  2017年   8篇
  2016年   13篇
  2015年   6篇
  2014年   8篇
  2013年   38篇
  2012年   5篇
  2011年   5篇
  2010年   4篇
  2009年   8篇
  2008年   7篇
  2007年   5篇
  2006年   5篇
  2005年   6篇
  2004年   11篇
  2003年   7篇
  2002年   13篇
  2001年   3篇
  2000年   6篇
  1999年   6篇
  1998年   3篇
  1997年   2篇
  1996年   3篇
  1995年   2篇
  1994年   2篇
  1992年   1篇
  1991年   2篇
  1990年   2篇
  1989年   2篇
  1988年   3篇
  1987年   2篇
  1986年   3篇
  1985年   2篇
  1984年   3篇
  1982年   2篇
  1981年   3篇
  1980年   1篇
  1979年   1篇
  1978年   3篇
  1977年   3篇
  1976年   2篇
  1975年   2篇
  1974年   2篇
  1973年   1篇
  1972年   2篇
  1970年   4篇
  1969年   2篇
排序方式: 共有246条查询结果,搜索用时 15 毫秒
81.
We previously wrote critically on the UK's welfare computerization programme of the 1980s and in this article we investigate the latest programme. Our argument is that welfare is being seen and is being understood in a technological context rather than a truly welfare one— that is, that the technology behind the computerization projects model views of how welfare recipients should be processed. In the 1980s, the computer model that was being applied was one of data processing (i.e. the 'business model'). In the 2000s, it is the model of computer-based communication (i.e. the 'Internet model'). But further, the new technological communication model is being effused with an ethical aspect— that those who do not communicate are lacking in socio-ethical responsibility to society, and are deemed not to be truly living up to their role as citizens.  相似文献   
82.
Ray  Larry  Smith  David 《Law and Critique》2001,12(3):203-221
In the UK and USA ‘Hate crime’ has become a topic of public controversy and social mobilization around issues of violence and harassment. This has largely but not exclusively addressed racism, homophobia and gender based violence. This article has three objectives. First, to situate hate crime legislation within a broad theory of modernity;secondly to examine the politics of its emergence as a public issue; thirdly to use data from the authors' recent research in Greater Manchester to illuminate the complexity of the concept of ‘hate crime’. The centrality of ‘hate crime’ to current debates derives from the importance of rights-based regulation of complex societies and the juridical management of emotional life. Hatred and violence have become problematic behaviour thrown into relief by a long term civilizing process. Hate crimes have thus acquired powerful rhetorical focus for mobilization of victim and identity politics. With reference to racist violence in Oldham and elsewhere in Greater Manchester, we argue that in its application and construction, however, ‘hate crime’ is a complex phenomenon that might dramatize rather than regulate the problems it seeks to address. This revised version was published online in July 2006 with corrections to the Cover Date.  相似文献   
83.
We examine the puzzling phenomenon that authoritarian governments are perceived to be more responsive than democratic governments. By comparing China and Taiwan by both large-N statistical analyses and in-depth case studies, we show that the answer lies in the differences between democratic and authoritarian institutions. First, failing to elect one’s preferred candidate in democracies predisposes voters to critical assessment of government responsiveness. There is no such predisposition in authoritarian countries where elections are nonexistent or nominal. Second, elections incentivize democratic leaders to over-respond to certain groups. There is no such mechanism in authoritarian countries. Third, the solid and clear legitimacy established by electoral victories shield democratic leaders from particularistic demands made through unconventional channels. Without such legitimacy, authoritarian leaders are compelled to cement legitimacy by increasing responsiveness.  相似文献   
84.
Research examining detection of verbal deception reveals that lay observers generally perform at chance. Yet, in the criminal justice system, laypersons that have not undergone specialist investigative training are frequently called upon to make veracity judgements (e.g., solicitors; magistrates; juries). We sought to improve performance by manipulating the timing of information revelation during investigative interviews. A total of 151 participants played an interactive computer game as either a truth‐teller or a deceiver, and were interviewed afterwards. Game information known to the interviewer was revealed either early, at the end of the interview, or gradually throughout. Subsequently, 30 laypersons individually viewed a random selection of interviews (five deceivers and five truth‐tellers from each condition), and made veracity and confidence judgements. Veracity judgements were most accurate in the gradual condition, < .001, η2 = .97 (above chance), and observers were more confident in those judgements, < .001, η2 = .99. Deceptive interviewees reported the gradual interviews to be the most cognitively demanding, < .001; η2 = .24. Our findings suggest that the detection of verbal deception by non‐expert observers can be enhanced by employing interview techniques that maximize deceivers' cognitive load, while allowing truth‐tellers the opportunity to respond to evidence incrementally.  相似文献   
85.
86.
87.
88.
89.
90.
This rejoinder to Professor Cohen's Comment is intended to elaborate on approaches we utilized in our original paper. Some of our specification was necessitated by data availability (e.g., the specification of the sanction process). We attempt to clarify our approach in regard to the intervention process. We provide an explanation of the modeling that could underly a test of the hypothesis that the control effect is a product of the arrest process—a test that we had regarded as informative but peripheral to our main points. As noted, a significant part of that test utilizes the full range of control variables available to us. Finally, we enumerate what we felt to be the main points of our paper—points we are afraid might otherwise be lost in this discussion of methodology.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号