首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   422篇
  免费   17篇
各国政治   22篇
工人农民   14篇
世界政治   43篇
外交国际关系   27篇
法律   194篇
中国政治   3篇
政治理论   130篇
综合类   6篇
  2021年   3篇
  2019年   6篇
  2018年   12篇
  2017年   12篇
  2016年   17篇
  2015年   16篇
  2014年   12篇
  2013年   61篇
  2012年   7篇
  2011年   9篇
  2010年   10篇
  2009年   22篇
  2008年   18篇
  2007年   18篇
  2006年   9篇
  2005年   10篇
  2004年   6篇
  2003年   10篇
  2002年   15篇
  2001年   10篇
  2000年   5篇
  1999年   3篇
  1998年   5篇
  1997年   5篇
  1996年   8篇
  1995年   5篇
  1994年   7篇
  1993年   4篇
  1992年   5篇
  1991年   9篇
  1990年   5篇
  1989年   7篇
  1988年   7篇
  1987年   7篇
  1986年   4篇
  1985年   5篇
  1984年   8篇
  1983年   5篇
  1982年   7篇
  1979年   2篇
  1978年   2篇
  1976年   2篇
  1975年   3篇
  1974年   4篇
  1972年   6篇
  1971年   2篇
  1967年   2篇
  1966年   3篇
  1965年   3篇
  1964年   2篇
排序方式: 共有439条查询结果,搜索用时 171 毫秒
431.
The advent of cloud computing has led to a dispersal of user data across international borders. More than ever before, law enforcement investigations into cybercrime and online criminal activity require cooperation between agencies from multiple countries. This paper examines recent changes to the law in Australia in relation to the power of law enforcement agencies to effectively investigate cybercrime insofar as individuals and organisations make use of cloud infrastructure in connection with criminal activity. It concludes that effective law enforcement operations in this area require harmonious laws across jurisdictions and streamlines procedures for granting assistance between law enforcement agencies. In conjunction with these mechanical developments, this paper posits that law enforcement officers require a systematised understanding of cloud infrastructure and its operation in order to effectively make use of their powers.  相似文献   
432.
This study investigated the ability of individuals with experience in gait analysis to identify people by observing features of gait recorded by closed circuit television cameras (CCTV). Seven experienced analysts each viewed five samples of footage. Each sample showed a “target walker” and five “suspect walkers.” The task of the experienced analysts was to determine which, if any, of the “suspect walkers” was the “target walker.” All of the participant “walkers” wore identical loose fitting clothing to mask anatomical and body contour features, and balaclavas to obscure facial features. The overall results showed that the experienced analysts made a correct decision in 124 of 175 cases (71%), significantly better than would have been expected to have occurred by chance (p < 0.05). A significant variation in correct decisions (p < 0.05) was shown to occur between the various angles from which the footage was recorded, footage recorded in the saggital plane showing the highest number of correct decisions. Significantly more correct decisions (p < 0.05) were also shown to occur when the footage of the “target walker” and that of the “suspect walker” were taken from the same angle. The results suggest that individuals with experience in gait analysis perform well in the comparative identification of suspects from CCTV footage, and therefore do have a role to play as expert witnesses in this field.  相似文献   
433.
ABSTRACT

Prior taxometric research on child molesters and general sex offenders has produced inconsistent and contradictory results. There are theoretical, practical, and policy reasons, however, to assume that a psychopathy taxon may exist in sex offenders and that a taxometric study might shed light on this issue. The mean above minus below a cut (MAMBAC), maximum covariance (MAXCOV), and latent-mode factor analysis (L-Mode) taxometric procedures were employed in three overlapping samples: 188 sex offenders with non-relative child victims, 555 sex offenders with non-relative child or adolescent victims or child incest victims, and a mixed sample of 1404 sex offenders. The taxometric analyses revealed evidence of continuous latent structure in all three samples. These results suggest that psychopathy in sex offenders, child molesters in particular, is organised quantitatively (continuous) rather than qualitatively (categorical).  相似文献   
434.
Given the relatively new phenomenon of online child exploitation – an important area of criminological and policy concern – it is difficult to obtain long term trend data on reported convictions. Existing legislative and prosecution-based approaches, while important, are unlikely to be adequate. This analysis of the legislative and prosecution-based responses in five Commonwealth countries (Australia, Canada, New Zealand, South Africa and United Kingdom), highlights the need for clear national and international definitions as the lack of consistency in the international legislative environment creates opportunities for sexual exploitation of children. To provide a multi-faceted and non-prosecutorial approach to address online child exploitation including the commercial exploitation of children, this paper identifies five potential research questions.  相似文献   
435.
Alternative fuels, specifically biodiesel, biodiesel blends, and E85 fuel, have been gaining a market share over the past few years. With the emergence of these fuels, fire debris analysts should be able to recognize their characteristics since these fuels may be encountered in casework. In this study, pure biodiesel (B100) and a 20% blend of pure biodiesel with petroleum diesel (B20) are examined as liquids and are extracted from debris samples using both passive headspace concentration and solvent extraction. Typical fire debris instrumental conditions are used to analyze these samples. Components of B100 and B20 may be observed in debris samples extracted using the passive headspace concentration method, but the chromatographic patterns are different from the pure liquid samples. When solvent extraction is used as a secondary extraction method on debris samples, the resulting patterns are consistent with the pure liquids of B100 and B20. E85 fuel, a blend of 85% ethanol and 15% gasoline, can be extracted using a typical fire debris extraction technique but requires slight modifications to typical fire debris instrumental conditions. E85 is shown at various stages of evaporation to demonstrate the resiliency of the ethanol. Additionally, samples of E85 were placed on carpet, burned and extinguished to demonstrate the effects of the suppression medium on the retention of ethanol.  相似文献   
436.
Policies for preventing or mitigating unfavorable economic conditions, such as inflation, balance-of-payments deficits, and recessions are usually determined by successful policies used in the past, but these policies may not be relevant for certain problems in the future due to changes in conditions. In the past, developing countries with balance of payments problems seeking help from the IMF were usually required to reduce their budget deficits, restrict the money supply, and make other macroeconomic restrictions. However, financial crises experienced by the East Asian countries in 1995–1996 arose mainly from declines in their securities markets accompanied by capital exports and sharp currency depreciation. The IMF provided generous assistance conditioned on the recipients' applying restrictive macroeconomic measures, even though there was no inflation or excessive monetary expansion. The cause of the financial crises was primarily capital outflows generated by defaults on loans made by banks largely for real estate projects, and in some cases resulting bank failures. The capital outflow and the sharp depreciation of the currencies, coupled with macroeconomic restrictions, led to recession and unemployment in these countries. The article goes on to discuss the policies the IMF should have promoted. Its credits should have been used to sustain imports rather than to support currencies and maintain debt service repayments.  相似文献   
437.
What explains why some authoritarian governments fail to take all the steps they can to preserve their positions of power during democratic transitions? This article examines this question using the example of the leading pro-military party in Myanmar, which lost badly to the National League for Democracy (NLD) in the transitioning elections of 2015. This article argues that a key to understanding how the military failed to perpetuate its power in the electoral sphere resides in its choice of electoral system. In 2010, the military junta chose an electoral system, first-past-the-post, that was distinctly ill-suited to preserve its power. We explore several hypotheses for why this occurred and ultimately conclude that the military and its allies did not understand electoral systems well enough to act strategically and that they overestimated their support relative to the NLD. This failure of authoritarian learning has important implications for understanding authoritarian politics, democratic transitions, and the challenges faced by authoritarian governments seeking to make such transitions.  相似文献   
438.
English is increasingly used as an indispensable interlanguage, the commonthird language of non-native speakers, in international negotiations.In technical or commercial talks, where interlocutors share a stock ofexpert knowledge, semantic problems are relatively easily overcome. Inemotive and complex negotiations to resolve protracted international conflict,however, intriguing problems of interpretation arise. Though interlocutorsspeak in English, they are unlikely to think or work in English.Back home the political debate is conducted in the mother tongue. Thus thesemantic fields, the full range of meanings and connotations, of keyabstract concepts at the heart of the negotiation may not be conveyed intranslation. The ill-fated Syrian-Israeli peace talks are drawn upon to exemplifythe argument.  相似文献   
439.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号