首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   354篇
  免费   16篇
各国政治   22篇
工人农民   39篇
世界政治   28篇
外交国际关系   10篇
法律   200篇
中国政治   2篇
政治理论   62篇
综合类   7篇
  2022年   2篇
  2021年   1篇
  2020年   9篇
  2019年   15篇
  2018年   17篇
  2017年   18篇
  2016年   16篇
  2015年   13篇
  2014年   16篇
  2013年   55篇
  2012年   13篇
  2011年   8篇
  2010年   10篇
  2009年   13篇
  2008年   15篇
  2007年   16篇
  2006年   5篇
  2005年   16篇
  2004年   12篇
  2003年   6篇
  2002年   9篇
  2001年   4篇
  2000年   3篇
  1999年   5篇
  1998年   5篇
  1997年   6篇
  1996年   5篇
  1995年   1篇
  1994年   1篇
  1993年   4篇
  1992年   2篇
  1991年   6篇
  1990年   1篇
  1989年   2篇
  1988年   4篇
  1987年   3篇
  1986年   1篇
  1985年   2篇
  1984年   10篇
  1983年   3篇
  1982年   1篇
  1981年   3篇
  1979年   2篇
  1978年   2篇
  1977年   3篇
  1976年   1篇
  1974年   2篇
  1973年   1篇
  1970年   1篇
  1968年   1篇
排序方式: 共有370条查询结果,搜索用时 31 毫秒
131.
Historically, in crimes involving heavy caliber rifles, only conventional factory‐made versions have been used. However, in recent years the number of homemade long‐barreled rifles is increasing. The characteristics of two such firearms that have been submitted to the Turkish Criminal Laboratory are discussed here. When the main parts of the guns were examined in detail, it was noted that nearly all of the parts had been made carelessly, with several structural defects visible. It was determined that the homemade heavy caliber rifles were unfit for efficient use and it was possible that they could have seriously harmed the shooter had they been fired. The development of these kinds of gun and the possibility of their use spreading throughout the country in terrorist attacks could cause a serious threat to national security.  相似文献   
132.
Just world research has shown that observers derogate victims more for their misfortunes if the perpetrator is not harshly punished (Lerner in J Personal Soc Psychol 1(4):355–360, 1980). However, few studies have investigated minority group derogation as a just world preservation strategy after instances of intergroup harm-doing. This study is among the first to demonstrate the derogation of both individual victims and of the victim’s minority group experimentally, using the context of a racist hate crime in Australia. In the present experiment, participants (N = 110) read a news article describing a hate crime against an Aboriginal Australian teenager and were informed that the perpetrator was harshly or leniently punished (secure vs. justice threat condition). Our results show that in the justice threat condition, participants not only derogated the individual Aboriginal Australian victim more after his death, they also expressed greater racism toward the victim’s group. An indirect effect of the justice threat condition on modern racism via individual victim derogation was observed, along with moderating effects of individual differences in belief in a just world. These findings provide support for the alarming hypothesis that racist hate crimes are not only the manifestation of a racist society, but may also bolster racial prejudices if leniently treated. The results highlight the important role of political and judicial authorities, whose response or non-response to a hate crime can exacerbate or ameliorate existing prejudices.  相似文献   
133.
Widespread use of cloud computing and other off-shore hosting and processing arrangements make regulation of cross border data one of the most significant issues for regulators around the world. Cloud computing has made data storage and access cost effective but it has changed the nature of cross border data. Now data does not have to be stored or processed in another country or transferred across a national border in the traditional sense, to be what we consider to be cross border data. Nevertheless, the notion of physical borders and transfers still pervades thinking on this subject. The European Commission (“EC”) is proposing a new global standard for data transfer to ensure a level of protection for data transferred out of the EU similar to that within the EU. This paper examines the two major international schemes regulating cross-border data, the EU approach and the US approach, and the new EC and US proposals for a global standard. These approaches which are all based on data transfer are contrasted with the new Australian approach which regulates disclosure. The relative merits of the EU, US and Australian approaches are examined in the context of digital identity, rather than just data privacy which is the usual focus, because of the growing significance of digital identity, especially to an individual's ability to be recognized and to transact. The set of information required for transactions which invariably consists of full name, date of birth, gender and a piece of what is referred to as identifying information, has specific functions which transform it from mere information. As is explained in this article, as a set, it literally enables the system to transact. For this reason, it is the most important, and most vulnerable, part of digital identity. Yet while it is deserving of most protection, its significance has been largely under-appreciated. This article considers the issues posed by cross border data regulation in the context of cloud computing, with a focus on transaction identity and the other personal information which make up an individual's digital identity. The author argues that the growing commercial and legal importance of digital identity and its inherent vulnerabilities mandate the need for its more effective protection which is provided by regulation of disclosure, not just transfer.  相似文献   
134.
Nearly one-third (28.4 %) of adolescents experience some form of physical assault in the home. A survey of 176 adolescents documents optimistic bias; adolescents believe they are less likely than others to become victims of family violence. Elements of the Health Belief Model, perceived susceptibility and perceived severity, predicted optimistic bias. The study also considers the impact vicarious experience through the media on adolescent risk perception.  相似文献   
135.
It was not so long ago that scholarly writings pointed to the vast chasm that existed between criminal justice and public health approaches to understanding and controlling interpersonal violence. Other scholarship of the day examined how criminal justice and criminology could benefit from adopting elements of the public health approach. For sure, there still exist many differences in how the two disciplines approach the violence problem, but over the years there have been some promising developments at the intersection of public health and criminology. This paper surveys the evolving link between public health and criminology, with a special focus on serious youth violence. It is concerned with both research and practice and how these efforts—across primary, secondary, and tertiary prevention strategies—are contributing to improved public health-criminology collaborations or public health-influenced programs that have a discernable impact on youth violence.  相似文献   
136.
As a result of current economic changes (with the consequent premium placed on citizens’ and countries’ competitiveness in the global economy), democratic countries face a fundamental challenge: How can efforts to enhance economic competitiveness be reconciled with citizenship obligations? This article suggests parameters for debate on how to meet this challenge. It first explores the nature of citizenship obligations in modern democracies. Next, it offers a conceptualization of competitiveness (and the general characteristics of policy choices which may facilitate a reconciliation. It then surveys competitiveness policies in one region of Sweden which were founded on the premise that it is appropriate to pursue simultaneously economic competitiveness and enhancement of human welfare. These policies may provide insights on what citizenship-based policies can look like.  相似文献   
137.
138.
In April 2009 the American Law Institute (ALI) made the decision to withdraw its support for the a section of the Model Penal Code that had been instrumental in shaping contemporary death penalty legislation. The Institute had created the modern legal and criminal justice administration framework for capital punishment as part of its Model Penal Code in 1962. Professor James Acker, one of the leading scholars on the death penalty in the United States, speaks to the import of this decision while providing some historical context for ALI’s involvement in the matter initially.  相似文献   
139.
Criminality information practices involve public authorities in the UK (and elsewhere) gathering, retaining and sharing information that connects with an identifiable individual; all with the ostensible aim of upholding and improving standards of public protection. This piece first charts the landscape of contemporary criminality information practices in the UK today. The article then examines recent legal emphases and policy directions for public protection networks. Consideration is then given in the piece to privacy rights and values and the difficulties in providing an exact typology and grounding for these. The piece then outlines a suggested framework for correct legal regulation, as well as a through commentary on the work done by Catherine Bellamy et al. to empirically determine the extent to which public protection information sharing can in fact occur in correct adherence to legal regulation. A socio-legal analysis is undertaken of the nature of public protection networks as variants on Goffman's performance teams within a dramaturgical routine that foregrounds stigmatisation of perceived ‘risky’ individuals as an aspect of that routine. This piece also explores the processes of institutional isomorphism as a reaction to shifting policy directions and legal doctrines, acting as a driving force towards a hierarchical performance of criminality information practices by public protection networks. Three conclusions are offered up for consideration: firstly, that the growing complexity of the law and regulation relating to criminality information practices might improve privacy values in the criminal justice system and help to add precision to necessary processes of stigmatisation in relation to the aim of public protection. Secondly, that these shifts in the law still need ongoing revisions, in order that a hierarchical approach to criminality information practices can be arrived at over time. Thirdly, that if the permanency of potential stigmatisation through the indefinite retention of criminality information cannot change, due to the competing pressure on the criminal justice system from public protection duties, then consultation with ‘risky’ individuals where practicable, before criminality information connected to them is shared across public protection networks becomes essential as a privacy-enhancing value and practice.  相似文献   
140.
While the literature on ‘global care chains’ has focused on the international transfer of paid reproductive labour in the form of domestic service and care work, a parallel trend takes the form of women marriage migrants, who perform unpaid labour to maintain households and reproduce the next generation. Drawing on our work with commercially matched Vietnamese marriage migrants in Singapore, we analyse the existing immigration–citizenship regime to examine how these marriage migrants are positioned within the family and nation-state as dependants of Singaporean men with no rights to work, residency or citizenship of their own. Incipient discussions on marriage migrants in civil society discourse have tended to follow a ‘social problems’ template, requiring legislative support and service provisioning to assist vulnerable women. We argue for the need to adopt an expansive approach to social protection issues, depending not on any one single source—the state, civil society and the family—but on government action to ensure that these complement one another and strengthen safety nets for the marriage migrant.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号