全文获取类型
收费全文 | 123篇 |
免费 | 6篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 7篇 |
世界政治 | 5篇 |
外交国际关系 | 11篇 |
法律 | 57篇 |
政治理论 | 37篇 |
综合类 | 3篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 1篇 |
2019年 | 2篇 |
2018年 | 4篇 |
2017年 | 3篇 |
2016年 | 6篇 |
2015年 | 5篇 |
2014年 | 7篇 |
2013年 | 17篇 |
2012年 | 1篇 |
2011年 | 4篇 |
2010年 | 3篇 |
2007年 | 6篇 |
2006年 | 7篇 |
2005年 | 4篇 |
2004年 | 2篇 |
2003年 | 5篇 |
2002年 | 8篇 |
2001年 | 5篇 |
2000年 | 6篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1985年 | 3篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1982年 | 1篇 |
1981年 | 2篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1973年 | 1篇 |
1968年 | 1篇 |
排序方式: 共有129条查询结果,搜索用时 15 毫秒
51.
Risa Brooks 《安全研究》2013,22(4):756-788
Strikingly, little systematic study of the relationship between democracy and terrorism has been undertaken. This article addresses this lacuna by laying some groundwork for further analytical study of the issues. It does so, first, by suggesting a family of independent variables related to the concept of political access that might be employed in this research; and second, by introducing a more expansive set of dependent variables, which will help capture the diverse effects of political access on militant group activity. The bulk of the paper examines the variety of causal logics that could potentially connect democracy and terrorist group activity, drawing from five analytical approaches to understanding terrorist motivation evident in the literature. Two major conclusions follow from the analysis. First, the democracy and terrorism debate constitutes not one research question, but many. Second, the prediction that follows from many approaches to terrorist motivation is not that democracy should promote an easy, inevitable lessening of terrorism. Rather, a more refined understanding of when democracy, or other forms of political access, may reduce violence or yield other desirable (and undesirable) outcomes is essential. 相似文献
52.
David J. Brooks 《Asian Journal of Criminology》2013,8(2):89-101
Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, business continuity, personnel and physical security, and security technology. Nevertheless, corporate security also has interrelationships with criminology, facility management, safety, and law. Such a framework provides clear boundaries for the practising domain of corporate security, better reflects the security experts’ view of their practising domain, allows directed tertiary pedagogy, and presents what could be considered the scholarly area of Security Science. 相似文献
53.
Codee Roy Ludbey David Jonathan Brooks Michael Patrick Coole 《Asian Journal of Criminology》2018,13(2):109-128
The study undertook an examination of corporate security through the lens of the broader socio-organisational literature to understand its organisational stratum, seating, and function. The methodology applied a survey questionnaire to security practitioners, incorporating two measurement tools to assess work level and time-span of discretion. Findings identified work levels across the corporate security function. These work levels indicate that the corporate security function operates at the operational and tactical strata, with limited strategic executive impact. Furthermore, the corporate security function is positioned within the technostructure, providing analytical support to business operations. The study identified a significant disconnect between the corporate security literature—as written by security practitioners and academia—and the socio-organisational literature, with many points of divergence. These findings suggest the need for study replication and a review of the security literature in regards to executive influence. 相似文献
54.
55.
Six erythrocyte antigen systems and the HLA system were evaluated to establish their practical value in 500 cases of disputed paternity. The actual results were very close to predicted values. HLA testing is expected to detect 92% and red cell testing is expected to detect 67% of men falsely accused in paternity suits. The findings of this study show that HLA detected 94% and red cell testing detected 69% of 107 men falsely accused in 500 paternity cases. In order of sensitivity, Rh, MNSs, and ABO were the most useful erythrocyte marker systems. There were six out of 107 cases in which exclusions would have been undetected if red cell typing had not been performed. Five of the six cases involved "common" HLA haplotypes. 相似文献
56.
There is a great range of variability in human breast size and resiliancy that may have an effect upon the interpretation of bite marks. A proper understanding of the normal range of breast morphology and a system of classification is necessary for an understanding of distortion effects, as well as the precise communication of those effects to others. A classification is given for the morphology of the female human breast following a review of the literature. 相似文献
57.
58.
59.
Arthur C. Brooks 《Journal of policy analysis and management》2005,24(3):543-558
The objectives of nonprofit managers are not immediately apparent. Indeed, nonprofits may seek to maximize their level of service or their budgets, or they may have undefined or unstable objectives. This paper presents a theoretical model of managerial objectives that yields testable hypotheses, which I test using 2001 data on 190,000 American nonprofits. While there is substantial variation between different types of nonprofits, they generally approach a service maximization objective, but maintain fundraising budgets that are insufficient to meet this objective. These findings have significant implications for policy and nonprofit management. © 2005 by the Association for Public Policy Analysis and Management 相似文献
60.