首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   228篇
  免费   15篇
各国政治   4篇
工人农民   11篇
世界政治   21篇
外交国际关系   16篇
法律   140篇
中国政治   2篇
政治理论   49篇
  2022年   1篇
  2021年   2篇
  2020年   3篇
  2019年   9篇
  2018年   14篇
  2017年   8篇
  2016年   13篇
  2015年   8篇
  2014年   7篇
  2013年   33篇
  2012年   5篇
  2011年   10篇
  2010年   7篇
  2009年   3篇
  2008年   10篇
  2007年   9篇
  2006年   9篇
  2005年   9篇
  2004年   10篇
  2003年   10篇
  2002年   7篇
  2001年   7篇
  2000年   6篇
  1999年   2篇
  1998年   1篇
  1997年   6篇
  1996年   1篇
  1994年   3篇
  1993年   5篇
  1992年   3篇
  1990年   1篇
  1988年   2篇
  1987年   6篇
  1985年   1篇
  1984年   1篇
  1983年   3篇
  1980年   1篇
  1979年   2篇
  1976年   3篇
  1974年   1篇
  1969年   1篇
排序方式: 共有243条查询结果,搜索用时 15 毫秒
81.
Confidentiality is often tested in the health professional-patient relationship, particularly given that both the law and ethics permit disclosure of confidential information in the public interest. This column outlines the results of an Australian Research Council project indicating that mental health professionals may place more weight on their ethical responsibilities relating to confidentiality than what the law requires. The outcomes of the project, which used both questionnaires and focus group discussions, suggests that there is some confusion as to legal requirements in this area and that many mental health professionals rely on ethical frameworks to justify disclosure even where there is no legal requirement to do so. It is suggested that ethics training for health professionals should be of primary importance to ensure responsible decision-making in this area.  相似文献   
82.
83.
This study examines whether macro-level opportunity indicators affect cyber-theft victimization. Based on the arguments from criminal opportunity theory, exposure to risk is measured by state-level patterns of internet access (where users access the internet). Other structural characteristics of states were measured to determine if variation in social structure impacted cyber-victimization across states. The current study found that structural conditions such as unemployment and non-urban population are associated with where users access the internet. Also, this study found that the proportion of users who access the internet only at home was positively associated with state-level counts of cyber-theft victimization. The theoretical implications of these findings are discussed.  相似文献   
84.
85.
86.
This paper examines participatory processes in an Asian Development Bank (ADB) technical assistance package in Thailand's water resource sector. The authors analyse various levels of social interaction in the local community, in meso‐level stakeholder consultations, and in opposition to ADB's environment programmes expressed by civil society organisations. While participatory approaches are employed to promote more bottom‐up management regimes in water resources, the authors find that local power and gender differences have been overlooked. Evolving institutions of resource governance are constituted by gender, reproducing gender inequalities such as regarding water intended for agricultural use as a ‘male’ resource. Finally, it is argued that understandings and practices of participation legitimise particular agendas in a politically polarised arena.  相似文献   
87.
Child contact with non-resident parents has become a key issuein family law and policy. Within the substantial and growingbody of research into how legal systems deal with child contactdisputes, there is little empirical data on the use courts makeof orders for supervised, supported or indirect contact. Thisarticle presents empirical research findings focusing on theuse of these sorts of contact orders in England and Wales. Theresearch involved an examination of 343 court records, 60 follow-upinterviews with parents and ten interviews with judges responsiblefor making the orders. Use of orders for supervised or supportedcontact was relatively common as a short-term measure, whileorders for indirect contact were made only as a matter of lastresort. On the basis of the post-court developments in contactwithin the families in the sample and the parents' largely negativeexperiences of the court system, we conclude that future policydevelopments ought to focus on finding alternatives to court,which would aim to provide assistance rather than adjudicationto the families in dispute.  相似文献   
88.
We consider the hypothesis that abused women who kill their abusers are not socially different from other abused women. Comparing two groups of women from a Deep South state, one group incarcerated for killing their partners (n=21) and the other served by a shelter for battered women (n=273), we find mixed support for the conclusion that the two groups represent a homogeneous general population of abused women. The women incarcerated for killing their male partners appear to be more isolated from the social mainstream and in greater perceived danger than the women who used the shelter. An earlier version of this paper was presented at the 1990 Southern Sociological Society Annual Meetings. Invaluable comments on earlier versions of the paper were received from Judith Stitzel, Shirley Dowdy, Ann Paterson, Sally Maggard, Janet Curry, Jon Conte, Mary Jo Ullom, and Lorrie Hardy.  相似文献   
89.
Book reviews in this article:
Negotiation and the New World Disorder James G. Blight Andrew W. Lynch  相似文献   
90.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号