全文获取类型
收费全文 | 823篇 |
免费 | 27篇 |
专业分类
各国政治 | 57篇 |
工人农民 | 18篇 |
世界政治 | 65篇 |
外交国际关系 | 83篇 |
法律 | 367篇 |
中国政治 | 8篇 |
政治理论 | 231篇 |
综合类 | 21篇 |
出版年
2023年 | 4篇 |
2021年 | 4篇 |
2020年 | 5篇 |
2019年 | 4篇 |
2018年 | 10篇 |
2017年 | 22篇 |
2016年 | 26篇 |
2015年 | 16篇 |
2014年 | 12篇 |
2013年 | 136篇 |
2012年 | 17篇 |
2011年 | 29篇 |
2010年 | 19篇 |
2009年 | 22篇 |
2008年 | 26篇 |
2007年 | 26篇 |
2006年 | 36篇 |
2005年 | 39篇 |
2004年 | 37篇 |
2003年 | 41篇 |
2002年 | 31篇 |
2001年 | 14篇 |
2000年 | 16篇 |
1999年 | 21篇 |
1998年 | 12篇 |
1997年 | 16篇 |
1996年 | 14篇 |
1995年 | 12篇 |
1994年 | 11篇 |
1993年 | 13篇 |
1992年 | 11篇 |
1991年 | 10篇 |
1990年 | 6篇 |
1989年 | 9篇 |
1988年 | 10篇 |
1987年 | 10篇 |
1986年 | 17篇 |
1985年 | 6篇 |
1984年 | 6篇 |
1983年 | 10篇 |
1982年 | 7篇 |
1981年 | 7篇 |
1980年 | 4篇 |
1979年 | 6篇 |
1978年 | 5篇 |
1977年 | 5篇 |
1975年 | 6篇 |
1974年 | 5篇 |
1971年 | 3篇 |
1969年 | 3篇 |
排序方式: 共有850条查询结果,搜索用时 0 毫秒
191.
192.
Juveniles' competency to participate in delinquency proceedings has received increased attention in recent years. Developmental incompetence, whereby juveniles' incompetency is based upon their immaturity, as opposed to a mental disorder or developmental disability, is an evolving and important aspect of this area of law. The following paper reviews theories used to support the notion of developmental incompetence, as well as the extant empirical research on juveniles' competency-related abilities. Using a LexisNexis search, statutory and case laws pertaining to juvenile competency were identified across the 50 states and the District of Columbia. Only six states clearly allow developmental incompetence, whereas 17 have laws that do not include developmental immaturity as an acceptable basis of incompetence in juvenile courts. Developmental incompetence is likely to affect a relatively small proportion of juvenile cases, but has important implications for juvenile forensic practice. Recommendations are offered for forensic practitioners conducting this type of evaluation. 相似文献
193.
Bruce D. Fitzgerald 《冲突和恐怖主义研究》2013,36(3-4):347-362
Extortionate terrorism is the threatened use of terrorist acts to gain concessions from the victim. In this article, game theory is used to seek answers to the following questions: (a) When will people resort to extortionate terrorism? (b) When will extortionate terrorism succeed and when will it fail? (c) What constitutes an “optimal” threat, i.e., what bribes, extortion, ransom, or payoff should be asked in exchange for which hostages or property? (d) When should unsuccessful threats be carried out and when should they be abandoned? (e) How should a victim choose among potential responses to specific terrorist threats and to the general problem of terrorism? Two different game theoretic models of terrorism are examined— one using ordinal preferences, the other von Neumann‐Mor‐genstern utilities. Terrorism is considered not simply as isolated incidents; institutions are potential victims of repeated terrorism. The terrorist and the victim, in formulating a response to each incident, are guided not only by present gains and losses, but by the effect their response has on others’ perception of their credibility and resolve—two long‐run variables. 相似文献
194.
195.
196.
197.
198.
Kurt M. Saunders Bruce Zucker 《International Review of Law, Computers & Technology》1999,13(2):183-192
The advent of the information age has created new challenges to the ability of individuals to protect the privacy and security of their personal information. One such challenge is that of identity theft, which has imposed countless hardships upon its victims. Perpetrators of this fraud use the identities of others to steal money, obtain loans, and generally violate the law. The Identity Theft and Assumption Deterrence Act of 1998 makes the theft of personal information with the intent to commit an unlawful act a federal crime in the United States with penalties of up to 15 years imprisonment and a maximum fine of $250,000. The Act designates the Federal Trade Commission to serve as an advocate for victims of identity fraud. This article first examines the problem of identity fraud and the inadequacy of existing remedies, and then assesses the need for and likely impact of the Act, as well as issues relating to the effectiveness of its future enforcement. 相似文献
199.
200.
A handful of researchers examined the activities of law enforcement in rural areas. Much of the research on rural policing activities involved well-constructed ethnographic methodologies including observational studies, case studies, and in-depth interviews. These studies demonstrated that rural police officers faced a number of problems that their urban counterparts did not. Building on this past research, this article reports the results of a content analysis of law enforcement activity in one rural community over a two-year timeframe. In all, 948 police calls as described in one community's published media crime reports were analyzed. Results of the analysis suggested that rural policing requires officers who are trained as generalists and able to respond to an assortment of departmental and social/community needs. Implications are provided. 相似文献