首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   405篇
  免费   20篇
各国政治   30篇
工人农民   18篇
世界政治   49篇
外交国际关系   24篇
法律   194篇
中国共产党   1篇
中国政治   3篇
政治理论   103篇
综合类   3篇
  2023年   1篇
  2022年   2篇
  2020年   2篇
  2019年   8篇
  2018年   16篇
  2017年   14篇
  2016年   15篇
  2015年   11篇
  2014年   13篇
  2013年   98篇
  2012年   14篇
  2011年   13篇
  2010年   11篇
  2009年   11篇
  2008年   14篇
  2007年   16篇
  2006年   8篇
  2005年   17篇
  2004年   17篇
  2003年   8篇
  2002年   12篇
  2001年   5篇
  2000年   14篇
  1999年   4篇
  1998年   9篇
  1997年   8篇
  1996年   4篇
  1995年   5篇
  1994年   7篇
  1993年   3篇
  1992年   5篇
  1991年   3篇
  1990年   3篇
  1989年   4篇
  1988年   4篇
  1987年   3篇
  1985年   5篇
  1984年   3篇
  1983年   3篇
  1982年   2篇
  1980年   3篇
  1979年   1篇
  1978年   2篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
排序方式: 共有425条查询结果,搜索用时 15 毫秒
61.
We are the middle of a global identity crisis. New notions of identity are made possible in the online world where people eagerly share their personal data and leave ‘digital footprints’. Multiple, partial identities emerge distributed across cyberspace divorced from the physical person. The representation of personal characteristics in data sets, together with developing technologies and systems for identity management, in turn change how we are identified. Trustworthy means of electronic identification is now a key issue for business, governments and individuals in the fight against online identity crime. Yet, along with the increasing economic value of digital identity, there are also risks of identity misuse by organisations that mine large data sets for commercial purposes and in some cases by governments. Data proliferation and the non-transparency of processing practices make it impossible for the individual to track and police their use. Potential risks encompass not only threats to our privacy, but also knowledge-engineering that can falsify digital profiles attributed to us with harmful consequences. This panel session will address some of the big challenges around identity in the digital age and what they mean for policy and law (its regulation and protection). Questions for discussion include: What does identity mean today? What types of legal solutions are fit for purpose to protect modern identity interests? What rights, obligations and responsibilities should be associated with our digital identities? Should identity management be regulated and who should be held liable and for what? What should be the role of private and public sectors in identity assurance schemes? What are the global drivers of identity policies? How can due process be ensured where automated technologies affect the rights and concerns of citizens? How can individuals be more empowered to control their identity data and give informed consent to its use? How are biometrics and location-tracking devices used in body surveillance changing the identity landscape?  相似文献   
62.
63.
Research shows that group conflict sets ethnocentric thinking into motion. However, when group threat is not salient, can ethnocentrism still influence people’s political decision-making? In this paper, I argue that anger, unrelated to racial and ethnic groups, can activate the attitudes of ethnocentric whites and those that score low in ethnocentrism thereby causing these attitudes to be a stronger predictor of racial and immigration policy opinions. Using an adult national experiment over two waves, I induced several emotions to elicit anger, fear, or relaxation (unrelated to racial or ethnic groups). The experimental findings show that anger increases opposition to racial and immigration policies among whites that score high in ethnocentrism and enhances support for these policies among those that score low in ethnocentrism. Using data from the American National Election Study cumulative file, I find a similar non-racial/ethnic anger effect. The survey findings also demonstrate that non-racial/ethnic fear increases opposition to immigration among whites that don’t have strong out-group attitudes.  相似文献   
64.
This study examines outcomes related to a parent representation pilot program in Travis County, Texas. Participation in the pilot program was related to earlier attorney appointment, a higher percentage of attorney presence across the life of the case, and a higher percentage of permanent outcomes for children. Parents’ percentage of presence at hearings across the life of the case was related to the child being returned home, dismissal of the juvenile dependency petition, and permanent management conservatorship. Early attorney appointment (i.e., less than 10 days from the initial hearing to full appointment) was related to permanent case outcomes.  相似文献   
65.
66.
The linkage between trade and the environment stands out asan important challenge in global economic governance. Over thepast decade, the WTO devoted considerable attention to thisissue and included it on the agenda of the Doha Round. In parallel,the jurisprudence on trade and the environment has experiencedsignificant advances. This study provides an overview of themain institutional changes at the WTO and of the developmentsin the jurisprudence most relevant to the interaction betweenthe environment and trade. Specifically, this study focuseson General Agreement on Tariffs and Trade (GATT) Article XXand takes note of many positive (and a few negative) featuresof the key Appellate Body decisions.  相似文献   
67.
Some contemporary Just War theorists, like Jeff McMahan, have recently built upon an individual right of self-defense to articulate moral rules of war that are at odds with commonly accepted views. For instance, they argue that in principle combatants who fight on the unjust side ought to be liable to punishment on that basis alone. Also, they reject the conclusion that combatants fighting on both sides are morally equal. In this paper, I argue that these theorists overextend their self-defense analysis when it comes to the punishment of unjust combatants, and I show how in an important sense just and unjust combatants are morally equal. I contend that the individualistic and quid pro quo perspective of the self-defense analysis fails to consider properly how the international community, morally speaking, ought to treat combatants, and I set forth four elements of justice applicable to war, which, together, support the conclusion that in principle the international community should not take on the activity of punishing combatants solely for fighting on the unjust side.  相似文献   
68.
Abstract

We examined sex offender treatment dropout predictors, in particular, the relationship of psychopathy and sex offender risk to treatment dropout in a sample of 154 federally incarcerated sex offenders treated in a high intensity sex offender treatment program. Demographic, criminal history, mental health and treatment-related data as well as data on risk assessment measures including the Static 99, Violence Risk Scale – Sexual Offender version (VRS-SO), and Psychopathy Checklist – Revised (PCL-R) were collected. Logistic regression and discriminant function analyses were used to identify predictors that made significant and unique contributions to dropout among all the variables under study. The Emotional facet of Factor 1 of the PCL-R and never being married were found to be the most salient predictors of treatment dropout and correctly identified about 70% of the cases. The implications of the findings for managing treatment dropout and for the treatment of psychopathic offenders are discussed.  相似文献   
69.
This article describes a new method for calculating judicial workload in dependency or child abuse and neglect cases. In contrast to traditional judicial workload methods, the method described herein produces estimates of judicial workload that take into account the complex role of the juvenile dependency court judge—a role that includes both on‐ and off‐the‐bench activities. The method provides workload estimates that give guidance to courts not only about the minimally sufficient judicial resources needed to accommodate current caseload needs, but also what level of judicial resources would be required to hold substantive dependency court hearings that comport with nationally recognized practice recommendations. The article reviews commonly used judicial workload methods, outlines the new method, and uses a pilot of the method as an example of how the method works in practice. Broader implications of this workload method are also discussed.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号