全文获取类型
收费全文 | 337篇 |
免费 | 9篇 |
专业分类
各国政治 | 5篇 |
工人农民 | 57篇 |
世界政治 | 22篇 |
外交国际关系 | 14篇 |
法律 | 189篇 |
中国政治 | 5篇 |
政治理论 | 50篇 |
综合类 | 4篇 |
出版年
2023年 | 2篇 |
2022年 | 6篇 |
2021年 | 6篇 |
2020年 | 13篇 |
2019年 | 16篇 |
2018年 | 18篇 |
2017年 | 14篇 |
2016年 | 18篇 |
2015年 | 12篇 |
2014年 | 13篇 |
2013年 | 41篇 |
2012年 | 16篇 |
2011年 | 13篇 |
2010年 | 13篇 |
2009年 | 13篇 |
2008年 | 14篇 |
2007年 | 15篇 |
2006年 | 11篇 |
2005年 | 11篇 |
2004年 | 10篇 |
2003年 | 12篇 |
2002年 | 6篇 |
2001年 | 2篇 |
2000年 | 6篇 |
1999年 | 4篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1986年 | 4篇 |
1985年 | 3篇 |
1984年 | 3篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
排序方式: 共有346条查询结果,搜索用时 9 毫秒
251.
Abstract: This article details and analyses the development of European Court of Justice guidelines regarding sanctions provided by Member States to correct infractions of EC law. It will be shown that the contemporary policy of the Court significantly retreats from an early practice of non-interference with the discretion of national judges to attach domestic remedies for breach of substantive Community measures. Preliminary comments will be made on the possible impact of these developments on the constitutional structure of the Community, and in particular their potential effect on the continuing debate concerning the legitimacy of EC rules. 相似文献
252.
253.
Angela Hale 《Development in Practice》2002,12(1):33-44
World trade is increasingly conditioned by the rules of the World Trade Organisation. In the case of the garment industry this means the phasing out of the Multifibre Arrangement, which has dominated trade in textiles and garments since 1974. This phase-out is seen as benefiting developing countries and criticism focuses on the manner in which the USA and Europe are holding up the process. However, it is important to look at who exactly will gain or lose. Not all poor countries will benefit. Furthermore, the main profits from garment production go to the Northern companies who control the industry. These companies will benefit from more open markets and associated competition between global suppliers. Meanwhile, for workers North and South, this increased competition brings insecurity and the threat of deteriorating conditions of work. 相似文献
254.
Surrogate Motherhood and the Best Interests of Children 总被引:1,自引:0,他引:1
Angela R. Holder 《The Journal of law, medicine & ethics》1988,16(1-2):51-56
255.
Angela W. Eke N. Zoe Hilton Grant T. Harris Marnie E. Rice Ruth E. Houghton 《Journal of family violence》2011,26(3):211-216
Little is known about assessing the risk of intimate partner homicide (IPH). Research has shown that women killed by an intimate
partner scored higher than abuse survivors in retrospectively measured risk for IPH. In this study, we examined the characteristics
of 146 men who committed an actual or attempted act of IPH. Of these, 42% had prior criminal charges, 15% had a psychiatric
history, and 18% had both; events which could feasibly have permitted a prior formal assessment of risk. We also identified
a subsample of 30 who could be scored on the Ontario Domestic Assault Risk Assessment (ODARA; Hilton et al., Psychological Assessment, 16, 267–275, 2004). The mean ODARA score was at the 80th percentile of risk for domestic violence, although only 13 had a previously documented
partner assault. We conclude that co-operation among sectors responding to domestic violence and the shared use of validated
risk assessment will increase the prediction and potential prevention of IPH. 相似文献
256.
Christopher Krebs Matthew J. Breiding Angela Browne Tara Warner 《Journal of family violence》2011,26(6):487-500
Those who experience intimate partner violence (IPV) are often subjected to multiple types of victimization such as physical
violence, sexual violence, psychological aggression, and stalking. However, relatively few studies have used a national population-based
sample and multivariate methods to analyze the associations between these different types of violence. This study uses multivariate
methods to analyze a national population-based sample of women in order to document empirically the extent to which different
types of IPV overlap, while controlling for personal and behavioral characteristics. Results indicated significant levels
of overlap, with victims often experiencing more than one type of victimization by an intimate partner. Findings also indicated
that women who had experienced violence by non-intimate partners were often more likely to experience violence by intimates.
Finally, women who had experienced stalking by an intimate were more likely to experience more forms of IPV on average than
those who had experienced physical violence, sexual violence, or emotional aggression. 相似文献
257.
Past theory and empirical research have consistently associated a number of risk factors with sexual assault perpetration. This study extends past research by considering if the tactics which perpetrators use to obtain sex are associated with these risk factors or with characteristics of the sexual assault. Audio computer-assisted self-interviews were completed with a community sample of young, single men. Few participants reported using physical force as a tactic to obtain sex, thus this article focuses on 457 participants who used verbal coercion ( n = 152) or the victim's impairment (n = 39) to obtain sex or who were nonperpetrators (n = 266). Discriminant function analysis correctly classified 70% of participants. As hypothesized, analysis of covariance indicated that both groups of perpetrators scored higher than nonperpetrators on measures of negative attitudes toward women, positive attitudes about casual sex, personality traits associated with nonclinical levels of psychopathy, antisocial behavior, and alcohol problems. As compared to nonperpetrators describing their worst date, perpetrators knew the woman longer, used more isolating and controlling behaviors, misperceived her sexual intentions for a longer period of time, and engaged in more consensual sexual activities with the woman. Perpetrators who used impairment tactics did not usually consume more alcohol than other participants; however, they consumed much more alcohol during the incident. Although verbal coercion and taking advantage of an impaired victim are sometimes viewed as less serious tactics than the use of force, these findings demonstrate that perpetrators who use these strategies have personality, attitude, and experience profiles that distinguish them from nonperpetrators. 相似文献
258.
Maryann Stone Angela Overton Cassandra McDade Kyshawn Smith 《Criminal Justice Studies》2014,27(4):439-456
Much work examines self-presentation styles; however, little work explores how people present themselves in traffic court. Utilizing observatory research, we aim to better understand differences in physical presentation and demeanor in traffic court. Further, judges that work in traffic court were interviewed to see how they understood the importance of presentation of self. Data indicate that most of those who appear in traffic court aim to present themselves professionally and behave with respect while in court. This appears to be a wise decision because judges tended to think that presentation of self was an important variable in their courtroom and how they evaluated cases. Still, differences in presentation of self appeared in the courtroom especially with regard to dress – extremely casual to orange jumpsuits. Finally, we argue that while modern defendants aim to present professionally the overall ‘professional’ presentation of self, even in the courtroom, is casual dress. 相似文献
259.
Angela Adrian 《Computer Law & Security Report》2013,29(1):48-57
Cloud computing is becoming the standard operating process, communications system and underlying infrastructure of the Internet. This is of paradigm-shifting significance to the law. Multinationals, such as Google, Amazon, Apple, Facebook, and Microsoft, own and operate the cloud computing infrastructure of the Internet as well as influencing its culture. They have been called the Four Horsemen of Technology and consider Microsoft their inspiration.1 Business can now be transacted at the speed of thought. The digital nervous system that Bill Gates envisioned is blossoming as cloud computing. However, sovereign nations can no longer effectively regulate the telecommunications systems within their borders without the tacit compliance of these cloud operating multinationals. The aim of this paper is to determine whether or not cloud computing infrastructure can support privacy regulation yet remain practical. 相似文献
260.
Gordon A. Crews Angela D. Crews Catherine E. Burton 《American Journal of Criminal Justice》2013,38(2):183-199
With the recent tragedy at Sandy Hook Elementary in Newtown, CT, the public and the government are looking for solutions to school violence. The National Rifle Association (NRA), a Second Amendment, pro-gun advocacy group, has proposed an “education and training emergency response program” called The National School Shield, which advocates the placement of armed security in schools. Although the program sounds provocative, serious questions complicate its plausibility, necessity, motive, and effectiveness. Furthermore, the potential policy and practical ramifications of encouraging armed security forces in U.S. schools are complex. The authors examined the proposal’s key elements from a public policy perspective and determined that the NRA program would be expensive in terms of both implementation and civil and/or criminal liability, would increase juvenile contact with the criminal justice system, would increase the potential for injuries and deaths from firearms, and would potentially only serve to increase profits for those invested in security industries. More potentially effective and safe policy alternatives are offered. 相似文献