首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   123篇
  免费   6篇
各国政治   9篇
工人农民   7篇
世界政治   5篇
外交国际关系   11篇
法律   57篇
政治理论   37篇
综合类   3篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   2篇
  2018年   4篇
  2017年   3篇
  2016年   6篇
  2015年   5篇
  2014年   7篇
  2013年   17篇
  2012年   1篇
  2011年   4篇
  2010年   3篇
  2007年   6篇
  2006年   7篇
  2005年   4篇
  2004年   2篇
  2003年   5篇
  2002年   8篇
  2001年   5篇
  2000年   6篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   1篇
  1992年   2篇
  1991年   2篇
  1988年   1篇
  1987年   2篇
  1985年   3篇
  1984年   2篇
  1983年   2篇
  1982年   1篇
  1981年   2篇
  1976年   2篇
  1975年   1篇
  1973年   1篇
  1968年   1篇
排序方式: 共有129条查询结果,搜索用时 15 毫秒
51.
Risa Brooks 《安全研究》2013,22(4):756-788
Strikingly, little systematic study of the relationship between democracy and terrorism has been undertaken. This article addresses this lacuna by laying some groundwork for further analytical study of the issues. It does so, first, by suggesting a family of independent variables related to the concept of political access that might be employed in this research; and second, by introducing a more expansive set of dependent variables, which will help capture the diverse effects of political access on militant group activity. The bulk of the paper examines the variety of causal logics that could potentially connect democracy and terrorist group activity, drawing from five analytical approaches to understanding terrorist motivation evident in the literature. Two major conclusions follow from the analysis. First, the democracy and terrorism debate constitutes not one research question, but many. Second, the prediction that follows from many approaches to terrorist motivation is not that democracy should promote an easy, inevitable lessening of terrorism. Rather, a more refined understanding of when democracy, or other forms of political access, may reduce violence or yield other desirable (and undesirable) outcomes is essential.  相似文献   
52.
Security is a multidimensional concept, with many meanings, practising domains, and heterogeneous occupations. Therefore, it is difficult to define security as a singular concept, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies, and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, business continuity, personnel and physical security, and security technology. Nevertheless, corporate security also has interrelationships with criminology, facility management, safety, and law. Such a framework provides clear boundaries for the practising domain of corporate security, better reflects the security experts’ view of their practising domain, allows directed tertiary pedagogy, and presents what could be considered the scholarly area of Security Science.  相似文献   
53.
The study undertook an examination of corporate security through the lens of the broader socio-organisational literature to understand its organisational stratum, seating, and function. The methodology applied a survey questionnaire to security practitioners, incorporating two measurement tools to assess work level and time-span of discretion. Findings identified work levels across the corporate security function. These work levels indicate that the corporate security function operates at the operational and tactical strata, with limited strategic executive impact. Furthermore, the corporate security function is positioned within the technostructure, providing analytical support to business operations. The study identified a significant disconnect between the corporate security literature—as written by security practitioners and academia—and the socio-organisational literature, with many points of divergence. These findings suggest the need for study replication and a review of the security literature in regards to executive influence.  相似文献   
54.
55.
Six erythrocyte antigen systems and the HLA system were evaluated to establish their practical value in 500 cases of disputed paternity. The actual results were very close to predicted values. HLA testing is expected to detect 92% and red cell testing is expected to detect 67% of men falsely accused in paternity suits. The findings of this study show that HLA detected 94% and red cell testing detected 69% of 107 men falsely accused in 500 paternity cases. In order of sensitivity, Rh, MNSs, and ABO were the most useful erythrocyte marker systems. There were six out of 107 cases in which exclusions would have been undetected if red cell typing had not been performed. Five of the six cases involved "common" HLA haplotypes.  相似文献   
56.
There is a great range of variability in human breast size and resiliancy that may have an effect upon the interpretation of bite marks. A proper understanding of the normal range of breast morphology and a system of classification is necessary for an understanding of distortion effects, as well as the precise communication of those effects to others. A classification is given for the morphology of the female human breast following a review of the literature.  相似文献   
57.
58.
59.
The objectives of nonprofit managers are not immediately apparent. Indeed, nonprofits may seek to maximize their level of service or their budgets, or they may have undefined or unstable objectives. This paper presents a theoretical model of managerial objectives that yields testable hypotheses, which I test using 2001 data on 190,000 American nonprofits. While there is substantial variation between different types of nonprofits, they generally approach a service maximization objective, but maintain fundraising budgets that are insufficient to meet this objective. These findings have significant implications for policy and nonprofit management. © 2005 by the Association for Public Policy Analysis and Management  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号