全文获取类型
收费全文 | 422篇 |
免费 | 17篇 |
专业分类
各国政治 | 22篇 |
工人农民 | 14篇 |
世界政治 | 43篇 |
外交国际关系 | 27篇 |
法律 | 194篇 |
中国政治 | 3篇 |
政治理论 | 130篇 |
综合类 | 6篇 |
出版年
2021年 | 3篇 |
2019年 | 6篇 |
2018年 | 12篇 |
2017年 | 12篇 |
2016年 | 17篇 |
2015年 | 16篇 |
2014年 | 12篇 |
2013年 | 61篇 |
2012年 | 7篇 |
2011年 | 9篇 |
2010年 | 10篇 |
2009年 | 22篇 |
2008年 | 18篇 |
2007年 | 18篇 |
2006年 | 9篇 |
2005年 | 10篇 |
2004年 | 6篇 |
2003年 | 10篇 |
2002年 | 15篇 |
2001年 | 10篇 |
2000年 | 5篇 |
1999年 | 3篇 |
1998年 | 5篇 |
1997年 | 5篇 |
1996年 | 8篇 |
1995年 | 5篇 |
1994年 | 7篇 |
1993年 | 4篇 |
1992年 | 5篇 |
1991年 | 9篇 |
1990年 | 5篇 |
1989年 | 7篇 |
1988年 | 7篇 |
1987年 | 7篇 |
1986年 | 4篇 |
1985年 | 5篇 |
1984年 | 8篇 |
1983年 | 5篇 |
1982年 | 7篇 |
1979年 | 2篇 |
1978年 | 2篇 |
1976年 | 2篇 |
1975年 | 3篇 |
1974年 | 4篇 |
1972年 | 6篇 |
1971年 | 2篇 |
1967年 | 2篇 |
1966年 | 3篇 |
1965年 | 3篇 |
1964年 | 2篇 |
排序方式: 共有439条查询结果,搜索用时 171 毫秒
431.
Christopher Hooper Ben Martini Kim-Kwang Raymond Choo 《Computer Law & Security Report》2013,29(2):152-163
The advent of cloud computing has led to a dispersal of user data across international borders. More than ever before, law enforcement investigations into cybercrime and online criminal activity require cooperation between agencies from multiple countries. This paper examines recent changes to the law in Australia in relation to the power of law enforcement agencies to effectively investigate cybercrime insofar as individuals and organisations make use of cloud infrastructure in connection with criminal activity. It concludes that effective law enforcement operations in this area require harmonious laws across jurisdictions and streamlines procedures for granting assistance between law enforcement agencies. In conjunction with these mechanical developments, this paper posits that law enforcement officers require a systematised understanding of cloud infrastructure and its operation in order to effectively make use of their powers. 相似文献
432.
Ivan Birch Louis Raymond Anastasia Christou Milan Angelo Fernando Nigel Harrison Flo Paul 《Science & justice》2013,53(3):339-342
This study investigated the ability of individuals with experience in gait analysis to identify people by observing features of gait recorded by closed circuit television cameras (CCTV). Seven experienced analysts each viewed five samples of footage. Each sample showed a “target walker” and five “suspect walkers.” The task of the experienced analysts was to determine which, if any, of the “suspect walkers” was the “target walker.” All of the participant “walkers” wore identical loose fitting clothing to mask anatomical and body contour features, and balaclavas to obscure facial features. The overall results showed that the experienced analysts made a correct decision in 124 of 175 cases (71%), significantly better than would have been expected to have occurred by chance (p < 0.05). A significant variation in correct decisions (p < 0.05) was shown to occur between the various angles from which the footage was recorded, footage recorded in the saggital plane showing the highest number of correct decisions. Significantly more correct decisions (p < 0.05) were also shown to occur when the footage of the “target walker” and that of the “suspect walker” were taken from the same angle. The results suggest that individuals with experience in gait analysis perform well in the comparative identification of suspects from CCTV footage, and therefore do have a role to play as expert witnesses in this field. 相似文献
433.
Glenn D. Walters Raymond A. Knight Jan Looman Jeffrey Abracen 《Journal of Sexual Aggression》2013,19(3):379-393
ABSTRACTPrior taxometric research on child molesters and general sex offenders has produced inconsistent and contradictory results. There are theoretical, practical, and policy reasons, however, to assume that a psychopathy taxon may exist in sex offenders and that a taxometric study might shed light on this issue. The mean above minus below a cut (MAMBAC), maximum covariance (MAXCOV), and latent-mode factor analysis (L-Mode) taxometric procedures were employed in three overlapping samples: 188 sex offenders with non-relative child victims, 555 sex offenders with non-relative child or adolescent victims or child incest victims, and a mixed sample of 1404 sex offenders. The taxometric analyses revealed evidence of continuous latent structure in all three samples. These results suggest that psychopathy in sex offenders, child molesters in particular, is organised quantitatively (continuous) rather than qualitatively (categorical). 相似文献
434.
Given the relatively new phenomenon of online child exploitation – an important area of criminological and policy concern – it is difficult to obtain long term trend data on reported convictions. Existing legislative and prosecution-based approaches, while important, are unlikely to be adequate. This analysis of the legislative and prosecution-based responses in five Commonwealth countries (Australia, Canada, New Zealand, South Africa and United Kingdom), highlights the need for clear national and international definitions as the lack of consistency in the international legislative environment creates opportunities for sexual exploitation of children. To provide a multi-faceted and non-prosecutorial approach to address online child exploitation including the commercial exploitation of children, this paper identifies five potential research questions. 相似文献
435.
Alternative fuels, specifically biodiesel, biodiesel blends, and E85 fuel, have been gaining a market share over the past few years. With the emergence of these fuels, fire debris analysts should be able to recognize their characteristics since these fuels may be encountered in casework. In this study, pure biodiesel (B100) and a 20% blend of pure biodiesel with petroleum diesel (B20) are examined as liquids and are extracted from debris samples using both passive headspace concentration and solvent extraction. Typical fire debris instrumental conditions are used to analyze these samples. Components of B100 and B20 may be observed in debris samples extracted using the passive headspace concentration method, but the chromatographic patterns are different from the pure liquid samples. When solvent extraction is used as a secondary extraction method on debris samples, the resulting patterns are consistent with the pure liquids of B100 and B20. E85 fuel, a blend of 85% ethanol and 15% gasoline, can be extracted using a typical fire debris extraction technique but requires slight modifications to typical fire debris instrumental conditions. E85 is shown at various stages of evaporation to demonstrate the resiliency of the ethanol. Additionally, samples of E85 were placed on carpet, burned and extinguished to demonstrate the effects of the suppression medium on the retention of ethanol. 相似文献
436.
Raymond F. Mikesell 《Journal of Comparative Policy Analysis》2000,2(1):127-133
Policies for preventing or mitigating unfavorable economic conditions, such as inflation, balance-of-payments deficits, and recessions are usually determined by successful policies used in the past, but these policies may not be relevant for certain problems in the future due to changes in conditions. In the past, developing countries with balance of payments problems seeking help from the IMF were usually required to reduce their budget deficits, restrict the money supply, and make other macroeconomic restrictions. However, financial crises experienced by the East Asian countries in 1995–1996 arose mainly from declines in their securities markets accompanied by capital exports and sharp currency depreciation. The IMF provided generous assistance conditioned on the recipients' applying restrictive macroeconomic measures, even though there was no inflation or excessive monetary expansion. The cause of the financial crises was primarily capital outflows generated by defaults on loans made by banks largely for real estate projects, and in some cases resulting bank failures. The capital outflow and the sharp depreciation of the currencies, coupled with macroeconomic restrictions, led to recession and unemployment in these countries. The article goes on to discuss the policies the IMF should have promoted. Its credits should have been used to sustain imports rather than to support currencies and maintain debt service repayments. 相似文献
437.
What explains why some authoritarian governments fail to take all the steps they can to preserve their positions of power during democratic transitions? This article examines this question using the example of the leading pro-military party in Myanmar, which lost badly to the National League for Democracy (NLD) in the transitioning elections of 2015. This article argues that a key to understanding how the military failed to perpetuate its power in the electoral sphere resides in its choice of electoral system. In 2010, the military junta chose an electoral system, first-past-the-post, that was distinctly ill-suited to preserve its power. We explore several hypotheses for why this occurred and ultimately conclude that the military and its allies did not understand electoral systems well enough to act strategically and that they overestimated their support relative to the NLD. This failure of authoritarian learning has important implications for understanding authoritarian politics, democratic transitions, and the challenges faced by authoritarian governments seeking to make such transitions. 相似文献
438.
English is increasingly used as an indispensable interlanguage, the commonthird language of non-native speakers, in international negotiations.In technical or commercial talks, where interlocutors share a stock ofexpert knowledge, semantic problems are relatively easily overcome. Inemotive and complex negotiations to resolve protracted international conflict,however, intriguing problems of interpretation arise. Though interlocutorsspeak in English, they are unlikely to think or work in English.Back home the political debate is conducted in the mother tongue. Thus thesemantic fields, the full range of meanings and connotations, of keyabstract concepts at the heart of the negotiation may not be conveyed intranslation. The ill-fated Syrian-Israeli peace talks are drawn upon to exemplifythe argument. 相似文献
439.