首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3606篇
  免费   151篇
各国政治   248篇
工人农民   267篇
世界政治   293篇
外交国际关系   187篇
法律   2220篇
中国政治   71篇
政治理论   463篇
综合类   8篇
  2023年   33篇
  2022年   19篇
  2021年   55篇
  2020年   78篇
  2019年   94篇
  2018年   211篇
  2017年   165篇
  2016年   204篇
  2015年   108篇
  2014年   121篇
  2013年   329篇
  2012年   243篇
  2011年   208篇
  2010年   62篇
  2009年   64篇
  2008年   99篇
  2007年   80篇
  2006年   82篇
  2005年   447篇
  2004年   179篇
  2003年   82篇
  2002年   65篇
  2001年   57篇
  2000年   46篇
  1999年   31篇
  1998年   12篇
  1997年   16篇
  1994年   13篇
  1993年   11篇
  1992年   29篇
  1991年   31篇
  1990年   35篇
  1989年   43篇
  1988年   37篇
  1987年   34篇
  1986年   33篇
  1985年   22篇
  1984年   16篇
  1983年   18篇
  1979年   16篇
  1978年   16篇
  1975年   15篇
  1974年   24篇
  1973年   22篇
  1972年   20篇
  1971年   26篇
  1970年   14篇
  1968年   12篇
  1967年   12篇
  1965年   9篇
排序方式: 共有3757条查询结果,搜索用时 31 毫秒
211.
The present study investigated the possibility of statistically linking arson cases based on consistency of behaviors from one crime scente to another. Serial and spree arson cases were studied to differentiate underlying themes and to link cases committed by the same offender. The material consisted of 248 arson cases which formed 42 series of arsons. A content analysis using 45 dichotomous variables was carried out and principal compnents (PCA) analysis was performed to identify underlying themes. Summary scores reflecting the themes were calculated. Linking effectiveness was tested with a discriminant analysis using the summary scores. The PCA analysis was successful and underlying themes which were in accordance with previous studies could be identified. Six factors were retained, in the PCA. The linking of the arson cases was possible to a satisfactory level: 33% of the cases could be correctly linked and for over 50% of the cases, the series they actually belonged to was among the ten series identified as most probable on the basis of the linking analysis. From a practical point of view, the results could be used as a basis for developing support systems for police investigations of arson. This research was financially supported by the Finnish Ministry of Interior and by Grant 54456 from the Academy of Finland.  相似文献   
212.
This study reports an analysis of Bartol's (1991) Immaturity Index and Hargrave and associates' (1988) Aggressiveness Index as a measure of police conduct. The correlations between the supervisory ratings and the Immaturity and Aggressiveness indices were examined for 1020 law enforcement officers. The results showed that Immaturity Index was related to termination for failure to complete training and insubordination. The Aggressiveness Index was related to a termination for failure to complete training and several other problematic police behaviors, but was not found to be specifically linked with acts of aggression. Implications for using these two indices in law enforcement selection are discussed. Authors' Note: Cary Rostow, Ph.D. is president of Matrix, Inc., Baton Rouge, Louisiana, and is in private practice in Baton Rouge. Robert Davis, Ph.D., is executive vice-president and director of science, research, and development for Matrix, Inc., and has a private practice in Baton Rouge. James B. Pinston, Ph.D., is a clinical neuropsychologist within the department of neurology at the Louisiana State University Health Sciences Center and School of Medicine in Shreveport, Louisiana. Dennis R. Combs, Ph.D., is an assistant professor of psychology at the University of Tulsa. Dennis R. Dixon, M.A., is currently a doctoral student at Louisiana State University.  相似文献   
213.
Degradation of human DNA extracted from forensic stains is, in most cases, the result of a natural process due to the exposure of the stain samples to the environment. Experiences with degraded DNA from casework samples show that every sample may exhibit different properties in this respect, and that it is difficult to systematically assess the performance of routinely used typing systems for the analysis of degraded DNA samples. Using a batch of artificially degraded DNA with an average fragment size of approx. 200 bp a collaborative exercise was carried out among 38 forensic laboratories from 17 European countries. The results were assessed according to correct allele detection, peak height and balance as well as the occurrence of artefacts. A number of common problems were identified based on these results such as strong peak imbalance in heterozygous genotypes for the larger short tandem repeat (STR) fragments after increased PCR cycle numbers, artefact signals and allelic drop-out. Based on the observations, strategies are discussed to overcome these problems. The strategies include careful balancing of the amount of template DNA and the PCR cycle numbers, the reaction volume and the amount of Taq polymerase. Furthermore, a careful evaluation of the results of the fragment analysis and of automated allele calling is necessary to identify the correct alleles and avoid artefacts.  相似文献   
214.
The co-occurrence of domestic violence and child abuse is well documented (Appel, A. E., & Holden, G. W. (1998). J. Fam. Psychol. 12: 578–599; Edleson, J. L. (1999). Violence Against Women 5: 134–154). However, little is known about the correlates of co-occurring wife and child abuse. Analyzing data from the 1985 National Family Violence Survey (subsample N = 2733), this study identified risk factors associated with the co-occurrence of wife and child abuse. One-way ANOVA and chi-square analyses were conducted to compare characteristics of parents, children, and households among subgroups of families reporting some form of abuse. Key differences emerged between the three types of homes compared (i.e., those with child abuse alone, wife abuse alone, or wife and child abuse), indicating possibly distinct etiologies and processes. In particular, the co-occurrence of wife and child abuse was marked by less education, worse health, increased reports of depression, and increased husband drug use. Findings may be useful to practitioners and researchers interested in risk factors for different forms of family violence.The total does not equal 100% because certain states report more than one form of maltreatment per child.  相似文献   
215.
In keeping with many countries the UK has moved the problem of sexual offending up the political agenda. On the criminal justice side sentences have been increased and supervision periods extended. On the civil side a raft of new measures have been put in place to regulate the behaviour of sex offenders in the interest of community safety and child protection; this paper examines these measures and, in particular takes the sex offender ‘register’ as a case study to show how political imperatives have been brought to bear with little reference to the research or professional views of practitioners in this area. It is contended that under these political pressures, what starts life as a preventive, regulatory measure can easily become a more punitive measure in its own right; as such it may be liable to challenge by those subject to it for failing to fulfil its primary purpose and for straying across a line between the civil and criminal aspects of intervention.  相似文献   
216.
Spamming is a major threat to the formation of public trust in the Internet and discourages broader civil participation in the emerging information society. To the individual, spams are usually little more than a nuisance, but collectively they expose Internet users to a panoply of new risks while threatening the communications and commercial infrastructure. Spamming also raises important questions of criminological interest. On the one hand it is an example of a pure cybercrime – a harmful behaviour mediated by the Internet that is the subject of criminal law, while on the other hand, it is a behaviour that has in practice been most effectively contained technologically by the manipulation of ‘code’ – but at what cost? Because there is not an agreed meaning as to what constitutes ‘online order’ that renders it simply and uncritically reducible to a set of formulae and algorithms that can be subsequently imposed (surreptitiously) by technological processes. The imposition of order online, as it is offline, needs to be subject to critical discussion and also checks and balances that have their origins in the authority of law. This article deconstructs and analyses spamming behaviour, before exploring the boundaries between law and code (technology) as governance in order to inform and stimulate the debate over the embedding of cybercrime prevention policy within the code itself.  相似文献   
217.
This study assessed the role of rape myth acceptance (RMA) and situational factors in the perception of three different rape scenarios (date rape, marital rape, and stranger rape). One hundred and eighty-two psychology undergraduates were asked to emit four judgements about each rape situation: victim responsibility, perpetrator responsibility, intensity of trauma, and likelihood to report the crime to the police. It was hypothesized that neither RMA nor situational factors alone can explain how rape is perceived; it is the interaction between these two factors that best account for social reactions to sexual aggression. The results generally supported the authors' hypothesis: Victim blame, estimation of trauma, and the likelihood of reporting the crime to the police were best explained by the interaction between observer characteristics, such as RMA, and situational clues. That is, the less stereotypic the rape situation was, the greater was the influence of attitudes toward rape on attributions.  相似文献   
218.
219.
A curious ownership structure is found in Northern Europe—foundations that own and operate business companies. The foundations are non-profit entities, they have no members and no owners, and they cannot be dissolved. In many cases, these entities control more than 50% of the votes in successful international companies. Obviously, this structure completely blocks the market for corporate control, but it also violates other basic principles of agency theory and corporate finance. Nevertheless, we present evidence that a sample of foundation-owned companies listed on the Copenhagen Stock Exchange are at least as efficient as other listed companies in terms of risk adjusted stock returns, accounting returns and Tobins Q. Thus, they question whether profit-seeking ownership is a necessary condition for competitive enterprise.JEL Classification: D23, G34, L31  相似文献   
220.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号