首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2289篇
  免费   111篇
各国政治   147篇
工人农民   119篇
世界政治   230篇
外交国际关系   121篇
法律   1101篇
中国政治   14篇
政治理论   649篇
综合类   19篇
  2023年   13篇
  2022年   5篇
  2021年   21篇
  2020年   48篇
  2019年   59篇
  2018年   79篇
  2017年   96篇
  2016年   77篇
  2015年   67篇
  2014年   89篇
  2013年   346篇
  2012年   77篇
  2011年   104篇
  2010年   68篇
  2009年   82篇
  2008年   66篇
  2007年   91篇
  2006年   90篇
  2005年   90篇
  2004年   79篇
  2003年   89篇
  2002年   84篇
  2001年   43篇
  2000年   44篇
  1999年   40篇
  1998年   42篇
  1997年   39篇
  1996年   30篇
  1995年   36篇
  1994年   32篇
  1993年   21篇
  1992年   23篇
  1991年   16篇
  1990年   24篇
  1989年   14篇
  1988年   26篇
  1987年   16篇
  1986年   9篇
  1985年   21篇
  1984年   17篇
  1983年   13篇
  1982年   8篇
  1981年   13篇
  1980年   10篇
  1979年   5篇
  1978年   5篇
  1976年   7篇
  1973年   4篇
  1970年   3篇
  1967年   3篇
排序方式: 共有2400条查询结果,搜索用时 15 毫秒
891.
Since the abolition of the death penalty, life imprisonment in England and Wales has had a literal meaning with exceptional rarity. Now though, in the rejection of perceived interference by the European Court of Human Rights in domestic sentencing, the politics of whole of life imprisonment have become exposed, specifically, in the widening applicability of the tariff to those who kill police officers or prison guards. Borrowing from the politics of capital punishment in the United States, in both “acting out” after a particular crime, and the prioritising of victim groups, the most severe penalty in England and Wales is increasingly beginning to mirror how the most severe punishment across the Atlantic is used, represented, and politicised.  相似文献   
892.
Most criminogenic risk assessments are developed and empirically validated on samples of boys or samples comprised of mostly boys, and subsequently applied to girls. Using a sample of male (n = 1,267) and female (n = 453) probationers, the purpose of the current study was to examine the potentially differential performance of the Youth Level of Service/Case Management Inventory (YLS/CMI) and the instrument’s eight domains for female juvenile offenders. Findings revealed gender differences in the predictive validity of the YLS/CMI in which girls scored significantly higher on the risk assessment, but recidivated at significantly lower rates than boys two years following the administration of the assessment. The predictive validity of the instrument was impacted by these gender differences in which the YLS/CMI total score was a better predictor of recidivism for boys (area under the curve (AUC) = .623) than girls (AUC = .565). The only subscales that significantly predicted recidivism for girls were the family (AUC = .607) and personality (AUC = .572) domains, whereas all of the subscales significantly predicted recidivism for boys. Directions for future research as well as gender-responsive assessment, programming, and policy implications are discussed.  相似文献   
893.
Abstract

Cyber technology, both explicitly and implicitly, impacts every facet of local, state, national and international criminal justice operations. Unfortunately, technological changes, including cyber technologies, are rarely well thought out and may have unintended negative consequences. Additionally technology, and particularly cyber technology, evolves at a much faster pace than our understanding of the ethics, laws and policies involved. Consequently, citizens, criminals and justice professionals often rely on technology without the benefit of legal protections or explicit agency policy. This paper will examine how technology, both historically (non cyber) and contemporarily (cyber), has positively and negatively affected one aspect of the Criminal Justice enterprise – law enforcement.  相似文献   
894.
895.

Objectives

This study conducted a randomized controlled trial with 600 recently released homeless men exiting California jails and prisons.

Methods

The purpose of this study was to primarily ascertain how different levels of intensity in peer coaching and nurse-partnered intervention programs may impact reentry outcomes; specifically: (a) an intensive peer coach and nurse case managed (PC-NCM) program; (b) an intermediate peer coaching (PC) program with brief nurse counseling; and (c) the usual care (UC) program involving limited peer coaching and brief nurse counseling. Secondary outcomes evaluated the operational cost of each program.

Results

When compared to baseline, all three groups made progress on key health-related outcomes during the 12-month intervention period; further, 84.5 % of all participants eligible for hepatitis A/B vaccination completed their vaccine series. The results of the detailed operational cost analysis suggest the least costly approach (i.e., UC), which accounted for only 2.11 % of the total project expenditure, was as effective in achieving comparable outcomes for this parolee population as the PC-NCM and PC approaches, which accounted for 53.98 % and 43.91 %, respectively, of the project budget.

Conclusions

In this study, all three intervention strategies were found to be comparable in achieving a high rate of vaccine completion, which over time will likely produce tremendous savings to the public health system.
  相似文献   
896.
897.
898.
Mark Langan 《圆桌》2016,105(5):477-487
Abstract

Brexit will of course have major implications for trade between Commonwealth African nations and the European continent. In the short term, the European Commission’s Economic Partnership Agreements with regional groups such as the East African Community will be complicated by the UK’s decision to leave the European project. Moreover, there are longer-term consequences to be considered, not least the role which the UK—as an independent trade actor—will adopt in its trade relations with Commonwealth African countries. This article examines the impact of Brexit for Commonwealth African nations’ trade with Europe (including the UK). It particularly points to several potential pitfalls arising from the Brexit referendum vis-à-vis African development.  相似文献   
899.
The post-attendee Uniform Resource Locator (URL) feature within the video conferencing application known as Zoom is often overlooked by digital forensic experts as a potential risk for malware transmission. However, with the ability to redirect webinar participants to any URL set by the host for the webinar, the post-attendee URL can be abused by bad actors to expose webinar participants to malicious websites or, in the worst-case scenario, force participants to download a file through the use of a direct download link URL. This study aims to showcase how this exploit can be replicated by creating an experimental environment involving four Windows 10 desktops running Zoom version 5.7.5 and creating a webinar with four user accounts acting as webinar participants and setting the post-attendee URL value to the URL of a website that contained a keylogger. In another trial, the same experimental environment was utilized, with the only difference being the post-attendee URL that was set to redirect webinar participants to a download link for a .jpg file. In both instances, every user account that joined the webinar via clicking on the invitation link that was emailed to each user account after registering for the webinar was redirected to the post-attendee URL regardless of their user account role. These results not only prove that the post-attendee URL can be exploited, but also provide insight as to how this type of attack can be prevented.  相似文献   
900.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号