全文获取类型
收费全文 | 116篇 |
免费 | 5篇 |
专业分类
各国政治 | 12篇 |
工人农民 | 8篇 |
世界政治 | 6篇 |
外交国际关系 | 11篇 |
法律 | 66篇 |
政治理论 | 17篇 |
综合类 | 1篇 |
出版年
2023年 | 2篇 |
2022年 | 1篇 |
2021年 | 3篇 |
2020年 | 1篇 |
2019年 | 2篇 |
2017年 | 5篇 |
2016年 | 8篇 |
2015年 | 3篇 |
2014年 | 2篇 |
2013年 | 11篇 |
2012年 | 5篇 |
2011年 | 5篇 |
2010年 | 5篇 |
2009年 | 2篇 |
2008年 | 5篇 |
2007年 | 6篇 |
2006年 | 4篇 |
2005年 | 2篇 |
2004年 | 6篇 |
2003年 | 2篇 |
2002年 | 4篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1996年 | 1篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 4篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1975年 | 1篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有121条查询结果,搜索用时 15 毫秒
21.
22.
23.
Kimberley Thachuk Karen Saunders 《European Journal on Criminal Policy and Research》2014,20(3):361-378
Airborne illicit arms traffickers from the former Soviet space are resourceful and adaptable international criminals who have built complex air trafficking networks by successfully cultivating strategic connections in a number of geographically distant states. This paper examines the airborne arms trafficking operations of networks from former Soviet states which transfer weapons and ammunition to areas of conflict in Africa, embargoed African states, or those descending into conflict. As such, these arms traffickers brazenly circumvent international regulations by obscuring their air cargo operations and securing impunity through subornation, fraud, and exploitation of lax regulations. Importantly, they rely on strategic connections in former Soviet states for a steady supply of arms, on states such as UAE for relaxed oversight and free trade zones for transit, product warehousing, and laundering of proceeds, and on carefully-cultivated connections with “big men” and/or local fixers in African states for speedy delivery and payment. 相似文献
24.
对于秩序的追求一直是对外交家与政治家的挑战。经历了一个世纪的冲突、革命与战争向世界大国之问基于共同利益的合作模式的演化,才有了今天自由主义的国际经济与政治秩序。但是,国际体系并不是一个自我约束的机制,秩序一旦建立,它的维系需要富有重大责任的主要大国积极而充分地参与到这一体系的有效合作中来。 相似文献
25.
Men who batter, because of particular personality traits and sense of entitlement, may select partners whom they perceive will be dependent on them, meet their emotional needs, or be "objects" of physical attractiveness. During treatment intake, 181 offenders responded to the question, "What attracted you to her (your partner)?" We explored whether men who mentioned their own needs or her physical traits would engage in more frequent and severe violence and would have specific forms of personality disorder dimensions or personality traits. Six categories of attraction, including "her physical traits" and "his needs," were derived from the men's responses. The results showed that men who focused on their partners' physical attractiveness were more likely to be violent after treatment. Men who cited their own needs for their attraction had higher scores on borderline personality, alcohol abuse, and psychotic thinking and lower scores on compulsive-conforming. 相似文献
26.
Enduring and workable legislative schemes typically include (a) a balanced approach to the rights and duties of all parties under their purview; and (b) consideration of all major consequences that may flow from the codification of underpinning doctrines. This column examines the 1999 amendments to the Guardianship and Administration Act 1986 (Vic) regulating patients' consent to medical treatment focusing on their application in modern emergency departments. The legislation needs to reconcile the human rights principle that humane and appropriate treatment is a fundamental right of all those who suffer from ill health and disease, with the principle that all patients (including those with impaired, but not totally absent, decisional capacity) have an absolute right to refuse life-saving treatment. Consent and refusal of treatment provisions should be based on the notion of reasonableness, including recognition that the mental and emotional states experienced by physically ill people may, in the short-term, adversely affect their decision-making capacity. Unless the consent legislation factors in the realities of modern emergency practice and resources, statutory thresholds for decisional competence, instead of affording protection, may result in much worse outcomes for vulnerable patients. 相似文献
27.
Score-based approaches for computing forensic likelihood ratios are becoming more prevalent in the forensic literature. When two items of evidential value are entangled via a scorefunction, several nuances arise when attempting to model the score behavior under the competing source-level propositions. Specific assumptions must be made in order to appropriately model the numerator and denominator probability distributions. This process is fairly straightforward for the numerator of the score-based likelihood ratio, entailing the generation of a database of scores obtained by pairing items of evidence from the same source. However, this process presents ambiguities for the denominator database generation - in particular, how best to generate a database of scores between two items of different sources. Many alternatives have appeared in the literature, three of which we will consider in detail. They differ in their approach to generating denominator databases, by pairing (1) the item of known source with randomly selected items from a relevant database; (2) the item of unknown source with randomly generated items from a relevant database; or (3) two randomly generated items. When the two items differ in type, perhaps one having higher information content, these three alternatives can produce very different denominator databases. While each of these alternatives has appeared in the literature, the decision of how to generate the denominator database is often made without calling attention to the subjective nature of this process. In this paper, we compare each of the three methods (and the resulting score-based likelihood ratios), which can be thought of as three distinct interpretations of the denominator proposition. Our goal in performing these comparisons is to illustrate the effect that subtle modifications of these propositions can have on inferences drawn from the evidence evaluation procedure. The study was performed using a data set composed of cursive writing samples from over 400 writers. We found that, when provided with the same two items of evidence, the three methods often would lead to differing conclusions (with rates of disagreement ranging from 0.005 to 0.48). Rates of misleading evidence and Tippet plots are both used to characterize the range of behavior for the methods over varying sized questioned documents. The appendix shows that the three score-based likelihood ratios are theoretically very different not only from each other, but also from the likelihood ratio, and as a consequence each display drastically different behavior. 相似文献
28.
Hugo F.V. Cardoso Shelley R. Saunders 《Forensic Science International Supplement Series》2008,178(1):24-29
Although the assignment of sex to immature skeletal remains is considered problematic, some traits have been considered useful for both forensic and bioarchaeological applications. One such trait is the arch criterion found in subadult ilia, which is defined relative to the greater sciatic notch-auricular surface area. In adults, the composite arch has also been described in relation to this area and has proven relatively successful in sex determination. This study offers an examination of the accuracy of the arch criterion and the composite arch in determining the sex of subadult skeletal remains, and an assessment of intra- and inter-observer scoring error. A sample of 97 skeletons of known sex and age (<15 years) from the Lisbon collection (Portugal) were selected and the traits were scored by three observers on orthogonal photos of each ilium. In general the agreement within (67.7–88.5%) and between (50.5–76.3%) examiners was poor and overall accuracy (26.7–52.6%) did not meet the expectations of that reported in previous studies. The authors suggest that this derives from great variation in morphology, difficulties in interpreting criteria and possibly a lack of association between the expression of the traits and sex. Careful examination of sex-related morphology in the immature skeleton and additional blind tests of so-called useful traits should continue to be carried out. 相似文献
29.
Kurt M. Saunders Bruce Zucker 《International Review of Law, Computers & Technology》1999,13(2):183-192
The advent of the information age has created new challenges to the ability of individuals to protect the privacy and security of their personal information. One such challenge is that of identity theft, which has imposed countless hardships upon its victims. Perpetrators of this fraud use the identities of others to steal money, obtain loans, and generally violate the law. The Identity Theft and Assumption Deterrence Act of 1998 makes the theft of personal information with the intent to commit an unlawful act a federal crime in the United States with penalties of up to 15 years imprisonment and a maximum fine of $250,000. The Act designates the Federal Trade Commission to serve as an advocate for victims of identity fraud. This article first examines the problem of identity fraud and the inadequacy of existing remedies, and then assesses the need for and likely impact of the Act, as well as issues relating to the effectiveness of its future enforcement. 相似文献
30.
A pilot study was undertaken to evaluate DNA profiling of the bacterial community in soil as an alternative to geological methods for forensic soil comparisons. Soil samples from three different ecosystems were compared, and the variation within and between ecologically different sites was determined by using terminal restriction fragment (TRF) analysis of 16S ribosomal DNA. Comparison of TRF profiles revealed that samples from within a specific ecosystem (e.g., a field) showed a significantly higher similarity to each other than to those from another ecosystem (e.g., a forest). In addition, some profile features were unique to specific ecosystems. These features may allow the determination of characteristic profiles that will facilitate identification of ecologically different sites, so that a given sample collected from a suspect could be identified as originating from, for example, a field, rather than a forest. The implications of these preliminary findings for forensic investigations are discussed. 相似文献