首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   512篇
  免费   20篇
各国政治   34篇
工人农民   21篇
世界政治   72篇
外交国际关系   33篇
法律   216篇
中国政治   4篇
政治理论   146篇
综合类   6篇
  2023年   3篇
  2022年   3篇
  2021年   9篇
  2020年   12篇
  2019年   21篇
  2018年   21篇
  2017年   18篇
  2016年   19篇
  2015年   13篇
  2014年   14篇
  2013年   92篇
  2012年   20篇
  2011年   21篇
  2010年   19篇
  2009年   21篇
  2008年   15篇
  2007年   18篇
  2006年   19篇
  2005年   17篇
  2004年   15篇
  2003年   15篇
  2002年   20篇
  2001年   9篇
  2000年   8篇
  1999年   9篇
  1998年   6篇
  1997年   5篇
  1996年   8篇
  1995年   8篇
  1994年   2篇
  1993年   3篇
  1992年   5篇
  1991年   5篇
  1989年   2篇
  1988年   2篇
  1987年   4篇
  1986年   3篇
  1985年   2篇
  1984年   2篇
  1983年   5篇
  1982年   4篇
  1980年   4篇
  1979年   1篇
  1977年   1篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
排序方式: 共有532条查询结果,搜索用时 0 毫秒
201.
202.
203.
The social constructs and methodological principles embodied in the Maryland Scientific Methods Scale (SMS), comprising part of the Campbell Collaboration in Crime and Justice assessment protocol, induce a series of biases in the evaluation of evidence of crime prevention policy interventions that focus on collective social phenomena, such as communities. Applying these principles leads to negative conclusions about effectiveness; yet their inherent ‘anti-social’ bias may induce Type II error with regard to the desirability of ‘social’ interventions to reduce crime. Policy-making is poorly served as a result. This point is illustrated, first, through a scrutiny of the social constructs used, including those that typify treatments, institutional settings and units of analysis. These are seen as being constructed in a way that is congenial to the underlying methodological issue of ‘control’ but that constitute nevertheless a distorted definition of the governance issues involved in crime reduction in community settings. A model more appropriate for evaluating voluntaristic action in civil society is needed. Second, it is suggested that this methodological bias arises particularly in policy interventions and change programmes that address issues concerning the ‘collective efficacy’ of local communities in reducing crime. An empirical exemplification of these arguments is presented with reference to a completed evaluation research study (Foster and Hope, 1993).  相似文献   
204.
This article examines the current state of the law on child relocation across the major common law‐based jurisdictions, with particular emphasis on the contrasting approaches to the problem in Australia and the United Kingdom. It then goes on to suggest changes aimed at achieving more principled and predictable outcomes.  相似文献   
205.
In the corporate world, design has received increasing attention over the last 50 years and is now firmly embedded within almost all aspects of corporate activity. This article explores the role of design in development. Design is widely used and understood within capitalist economies to denote a diverse set of tools, used to maximise market share, sales, and profits, and support market differentiation and brand identity of products. The progress of two convergent design-related threads is charted briefly: the growth, since 1950, of a view that design has a real contribution to make to social responsibility and sustainability; and the increasing evidence of design-like skills being used in development contexts. The article reviews several alternative models that are being developed and concludes with a number of short case studies, which illustrate these models and highlight the potential of their largely process-based methodologies for private-sector activity in a development context.  相似文献   
206.
The interpretation of complex DNA profiles is facilitated by a Bayesian approach. This approach requires the development of a pair of propositions: one aligned to the prosecution case and one to the defense case. This note explores the issue of proposition setting in an adversarial environment by a series of examples. A set of guidelines generalize how to formulate propositions when there is a single person of interest and when there are multiple individuals of interest. Additional explanations cover how to handle multiple defense propositions, relatives, and the transition from subsource level to activity level propositions. The propositions depend on case information and the allegations of each of the parties. The prosecution proposition is usually known. The authors suggest that a sensible proposition is selected for the defense that is consistent with their stance, if available, and consistent with a realistic defense if their position is not known.  相似文献   
207.
This study investigated the effect of soft tissue and different exposure times on the prediction of burning temperatures of bone when using Fourier transform infrared spectroscopy (FTIR). Ovis aries rib bones were burnt at different temperatures and for varying time intervals. Results of a linear regression analysis indicated that burn temperatures can be predicted with a standard error of ±70°C from defleshed bone spectra. Exposure time does not have a significant impact on prediction accuracy. The presence of soft tissue has a significant impact on heat‐induced changes of the bone matrix in low (<300°C) as well as high temperatures (>800°C), slowing down combustion in the former and accelerating it in the latter (p < 0.05). At medium temperatures, no significant difference was noted. These results provide forensic investigators a new perspective with which to interpret the results of crystallinity measures derived from burnt bone.  相似文献   
208.
The Court of Justice of the European Union (CJEU) has ruled on questions referred by a Spanish court relating to interpretation of the Data Protection Directive and its application to search engine activities. In a controversial judgment, the CJEU found that search engines are data controllers in respect of their search results; that European data protection law applies to their processing of the data of EU citizens, even where they process the relevant data outside the EU; and that a ‘right to be forgotten’ online applies to outdated and irrelevant data in search results unless there is a public interest in the data remaining available and even where the search results link to lawfully published content.  相似文献   
209.
Recent coverage in the press regarding large-scale passive pervasive network monitoring by various state and government agencies has increased interest in both the legal and technical issues surrounding such operations. The monitoring may take the form of which systems (and thus potentially which people) are communicating with which other systems, commonly referred to as the metadata for a communication, or it may go further and look into the content of the traffic being exchanged over the network. In particular the monitoring may rely upon the implementation of Deep Packet Inspection (DPI) technologies. These technologies are able to make anything that happens on a network visible and recordable. While in practice the sheer volume of traffic passing through a DPI system may make it impractical to record all network data, if the system systematically records certain types of traffic, or looks for specific patterns in all traffic, the privacy concerns are highly significant. The aim of this paper is twofold: first, to show that despite the increasing public awareness in relation to the capabilities of Internet service providers (ISPs), a cross-field and comparative examination shows that DPI technologies are in fact progressively gaining legal legitimacy; second to stress the need to rethink the relationship between data protection law and the right to private life, as enshrined in Article 8 of the European Convention on human rights and Article 7 of the European Charter of fundamental rights, in order to adequately confine DPI practices. As a result, it will also appear that the principle of technical neutrality underlying ISP's liability exemptions is misleading.  相似文献   
210.
Abstract

Reacting to the last of four distinct terrorist cam‐paigns in Northern Ireland, the British Parliament in 1973 passed the Northern Ireland (Emergency Provisions) Act, which was amended in 1974. The act marks the first time in United Kingdom statute law that terrorism is defined as the use of violence for political ends. British efforts are aimed at the development of the police to the point where the military is no longer required. Terroristic acts in Great Britain, usually connected with Northern Irish affairs, have led to the introduction of the Prevention of Terrorism (Temporary Provisions) Act, the powers of which are also described in this paper. The author also discusses the problem of the safeguarding of civil liberties as well as the European Convention on the Suppression of Terrorism, drawn up by the Council of Europe.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号