全文获取类型
收费全文 | 75篇 |
免费 | 3篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 1篇 |
世界政治 | 13篇 |
外交国际关系 | 1篇 |
法律 | 44篇 |
政治理论 | 10篇 |
出版年
2019年 | 1篇 |
2018年 | 1篇 |
2017年 | 1篇 |
2015年 | 1篇 |
2014年 | 3篇 |
2013年 | 7篇 |
2012年 | 4篇 |
2011年 | 3篇 |
2010年 | 2篇 |
2009年 | 1篇 |
2008年 | 4篇 |
2007年 | 2篇 |
2006年 | 4篇 |
2004年 | 5篇 |
2003年 | 2篇 |
2002年 | 1篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1997年 | 6篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1993年 | 2篇 |
1992年 | 4篇 |
1991年 | 4篇 |
1989年 | 1篇 |
1988年 | 3篇 |
1984年 | 1篇 |
1983年 | 1篇 |
1980年 | 1篇 |
1972年 | 1篇 |
1957年 | 1篇 |
1946年 | 1篇 |
排序方式: 共有78条查询结果,搜索用时 296 毫秒
11.
In order to assess the roles of weapons and offender intentions in the outcomes of potentially violent events, we analyze more than 2,000 incidents described by offenders. We advance the study of weapons effects through a within‐person analysis that lets us control for all time‐stable characteristics of the offenders. Thus, we address the concern that relationships between type of weapon and incident outcome may be spurious because individuals with a greater propensity to do harm are more likely to use guns. Findings indicate that weapons have independent effects that differ across the stages of an event. 相似文献
12.
13.
This paper investigates the effectiveness of police raids in reducing drug dealing in and around nuisance bars. We examine effects of both dosage (number of raids) and duration (months) of the intervention, as well as the conditioning effects of land use and population characteristics in shaping the underlying risk levels of drug dealing in the target and surrounding areas. Results indicate that the police intervention suppresses levels of drug dealing during periods of active enforcement, but the effects largely disappear when the intervention is withdrawn. Also, the effects of the intervention are mediated by risk characteristics in target and surrounding areas. Target areas characterized by higher levels of risk are more resistant to intervention effects than those with lower levels of risk. Risk factors in nearby areas are also significant. Bars with high levels of risk arising from land uses in surrounding areas are easier to treat, while bars with high levels of population‐based risk in surrounding areas are harder to treat. 相似文献
14.
This article addresses the numerous ways command or coercion is used by the state to enhance law enforcement, ways that involve creative interactions with both the targets of law enforcement and third parties. Coercive measures encompass both mandatory reporting and mandatory action. Examples are given and the benefits of using coercion in such circumstances discussed. However, coercion may also have unintended consequences and impose unreasonable costs. With these effects in mind, the authors suggest a set of guidelines for evaluating the appropriateness of coercive measures. 相似文献
15.
Employing the analytic technique of game theory, we attempt to answer questions about how individuals with different proclivities to use crime to accomplish ends, and different beliefs about society's fairness, are likely to respond to different incentives and disincentives that are derived from strain and neoclassical deterrence theories. Our analysis indicates that the crime control policies typically recommended by adherents of both theories are often logically invalid, given the premises upon which they are supposedly based. For example, our analysis suggests why punishment strategies like “three strikes and you're out” and “entitlement strategies” such as welfare and other short-term redistributive payment programs fail to deter crime. Finally, after including notions of equity with traditional rational choice assumptions, our analysis identifies a mix of theoretically derived strategies that may more effectively deter crime. 相似文献
16.
17.
Building sustainable professional capacity in African public sectors: retention constraints in Kenya
Significant investments are being made by aid agencies to increase Master's-level training of African professionals serving in the public sector. Yet no case studies present detailed data or analysis of past efforts to build sustainable human capacity in governmental institutions. The article reviews career and retention data on 169 economists, planners, and statisticians trained under funding provided by 6 long-term aid projects for targeted posts in Kenyan ministries. After reviewing retention constraints revealed by this data and other evidence, it offers recommendations that might assist governments and aid agencies to design and implement capacity building initiatives with a higher probability of ensuring that returned graduates serve for adequate periods of time in the positions for which they were trained. © 1997 by John Wiley & Sons, Ltd. Public Admin. Dev. Vol. 17 , 307–324 (1997). No. of Figures: 0. No. of Tables: 1. No. of Refs: 31. 相似文献
18.
Is Internet freedom an absolute, universal value like freedom of speech? If there are limits, how and by whom can they be established? Is crying fire or scaling firewalls anymore acceptable in cyberspace than in physical space? What is the impact on the discourse between nations, cultures and individuals? In this section, we gather a collage of comments from various key players from Google to Wikileaks to the US State Department along with comments by one of the most cogent analysts of the Net and the president of Turkey. 相似文献
19.
The recent scandal of the National Security Agency (NSA) “Hoovering” up the metadata on US and foreign citizens from Google, Facebook and Yahoo exposes in the full light of day the central paradox of the new digital age: The Internet enables us to know and learn more than ever before, but enables more to be known and learned about us by both snooping governments and monetizing information corporations alike. In this section, Google's Eric Schmidt and Jared Cohen discuss this paradox. We also reprint an interview from 2009 with Mike McConnell, a former chief of the National Security Agency and the driving force behind Booz, Allen, Hamilton's digital security operation. Edward Snowden, the systems administrator who blew the whistle, was employed by the NSA as a subcontractor from Booz, Allen, Hamilton. 相似文献
20.