首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   114篇
  免费   4篇
各国政治   23篇
工人农民   5篇
世界政治   6篇
外交国际关系   7篇
法律   53篇
中国政治   2篇
政治理论   20篇
综合类   2篇
  2023年   1篇
  2021年   3篇
  2020年   3篇
  2019年   2篇
  2018年   3篇
  2017年   3篇
  2016年   4篇
  2015年   1篇
  2014年   5篇
  2013年   10篇
  2012年   5篇
  2011年   6篇
  2010年   3篇
  2009年   5篇
  2008年   3篇
  2007年   2篇
  2006年   2篇
  2004年   7篇
  2003年   2篇
  2002年   3篇
  2001年   1篇
  2000年   1篇
  1999年   3篇
  1998年   4篇
  1997年   3篇
  1996年   2篇
  1995年   1篇
  1994年   4篇
  1993年   3篇
  1992年   2篇
  1991年   2篇
  1990年   2篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1982年   2篇
  1980年   1篇
  1978年   1篇
  1975年   3篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
排序方式: 共有118条查询结果,搜索用时 31 毫秒
21.
The detrimental effect of parental conflict in protracted child custody and visitation disputes is well established in the literature. However, little is known about the impact of parental conflict on children when visitation takes place in a protected setting. Part of a larger study that examined the broader issues related to parental and child involvement in a supervised access and custody exchange service, this article specifically explores the influence of parental participation on child well-being. This exploratory effort reveals that children's level of adjustment remained stable over 6 months of participation while visitation returned to court-ordered levels and interparental contact was precluded by staff intervention.  相似文献   
22.
In the aftermath of the 9/11 attacks, the foreign policy of the Bush administration was shifted radically in its pursuit of the war on terror. As part of this change, the administration announced a new strategic doctrine in 2002 in the form of the National Security Strategy of the United States which was to become known as the Bush doctrine. At its heart this document advocated the use of pre-emption and unilateralism in its pursuit of pre-eminence. This article traces the development of this thinking and subsequent application of this doctrine, and argues that policy failures in Iraq have nothing to contribute to American foreign policy in the second term. His argued that because of this failure, it is not a doctrine worthy of the name.  相似文献   
23.
24.
ABSTRACT

This article sheds light on the complexity and sensitivity of crowd-based intelligence in security governance. The 'crowd’ as special manifestation of ‘the public’ is both challenging and enabling new forms of intelligence practices. As a spontaneous eruption of collective activity, the crowd is a notion of great versatility. Sometimes considered mad/dangerous, sometimes wise/useful, the crowd’s drivers are a context-dependent collage of (affective) group engagement, projection from the outside and the workings of digital technologies. The article traces how the existence of crowds in its variations is connected to how they are approached by security agents and their intelligence practices.  相似文献   
25.
In both social and political matters, individuals trust those they believe will treat them fairly. Individuals in democracies have little objection to abiding by policies instituted by parties they did not vote for because the system by which the parliament is formed is considered fair. However, even among democracies, some electoral systems are fairer than others. It stands to reason that trust in parliament is affected by the perceived fairness of the electoral system. This research demonstrates that actual or perceived provision of voice in parliamentary representation does increase individual trust in parliament. Systems designed with the intent to provide fair representation and those that provide the illusion of fair representation produce higher levels of trust in parliament.  相似文献   
26.
This article explores the meanings of ownership and shareholding in the context of the 2007 run on Northern Rock, its subsequent nationalization in 2008, and the resulting legal challenge brought by former shareholders. Drawing on evidence from a range of sources outside traditional legal and official doctrine, and from original empirical research, it focuses on the perspective and voices of local small individual shareholders in relation to shareholding, bank failure, and government responses to financial crisis. It tells the story of these individual shareholders against differing conceptions of share ownership rights and responsibilities, and from various angles, to show the many different subjectivities of corporate shareholding and ownership of enterprise of which orthodox legal and economic models take scant account. It concludes on a note of historic persistence in demand for proprietary shares in banking institutions, despite the differing levels of understanding and tolerance of equity risk among shareholders that our research reveals.  相似文献   
27.
28.
29.
Litigation is being transformed by new visual communication technologies, including videoconferencing, PowerPoint, and computer animations. Yet the effects of these visual technologies on legal decision making are largely unknown. In order to understand better the most pressing issues surrounding technology in the courtroom, psychologists, lawyers, and representatives from technology companies and funding agencies attended a Research Conference on Courtroom Technology organized by the Federal Judicial Center. The goals of the conference were to identify issues raised by courtroom uses of new technologies that could be illuminated by empirical research and to suggest designs and methods for conducting that research. This paper emerged from that conference. The authors provide an overview of considerations that should guide research in this area, including a framework that takes into account features of the technology, the audience, and the legal strategy of the user of the technology. They outline a paradigm for conducting such research, illustrate it with several possible empirical studies of varying levels of experimental and conceptual complexity, and identify directions for subsequent research.  相似文献   
30.
The NIBRS data program currently being implemented by the FBI and local lawenforcement agencies has by now produced sufficient data for archiving anddistribution. Although not representative of crime in the United States, existing NIBRS data can be used to investigate the nature of crimesknown to the police compared to the traditional UCR data. The Bureau ofJustice Statistics has requested the National Archive of Criminal JusticeData to store and make NIBRS data available to interested users. The datafrom 1996 will shortly be available from the NACJD web site. The 1996 datacontain almost 6.5 million records and the FBI's full file includes about 361 Mbytes of data. The data have been disaggregated from the FBI's complex single file into 11 segment levels or record types. This makes theindividual record types easier and faster to analyze than using the fullfile, which more closely resembles a relational database than a hierarchicalfile. However, splitting apart the record types requires that specialprocedures be used to merge files of different record types, which would benecessary if a user were interested in analyzing variables appearing in morethan one record type (e.g., comparing offender and victim ages). These procedures are described, and a test comparing the time to run a simple frequencycount using the full file against the merged files shows that using themerged files is considerably more efficient. Also discussed are some futuredevelopments to facilitate the analysis of NIBRS data.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号