首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   45篇
  免费   0篇
各国政治   6篇
工人农民   8篇
世界政治   3篇
外交国际关系   8篇
法律   12篇
中国共产党   1篇
中国政治   1篇
政治理论   5篇
综合类   1篇
  2020年   2篇
  2019年   1篇
  2018年   2篇
  2017年   3篇
  2016年   1篇
  2015年   3篇
  2014年   4篇
  2013年   11篇
  2010年   2篇
  2009年   1篇
  2007年   1篇
  2006年   1篇
  2005年   2篇
  2004年   2篇
  2002年   2篇
  2000年   1篇
  1999年   3篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
排序方式: 共有45条查询结果,搜索用时 0 毫秒
31.
The National Incident-Based Reporting System (NIBRS) overcomes a basiclimitation of the traditional summary Uniform Crime Reporting program (UCR)by collecting victim information. Using this new victim information tocompare National Crime Victimization Survey (NCVS) and NIBRS results, wefind some similarities as well as some differences in the characteristics ofvictims and offenders suggested by the two programs. Similarities appear inthe proportions of men and women involved as victims and offenders forrobbery and assault. Comparisons are more difficult and the proportions lesssimilar for property offenses. Nevertheless, the results suggest that whenthe NIBRS is fully developed, it will be an important source of informationon the characteristics of both victims and offenders. Even before theredesigned program is fully implemented, one of the most important featuresof NIBRS reports will be their ability to provide local area victimizationinformation. In addition, the NIBRS will provide much more information onarrests and the characteristic of offenders than any existing program.  相似文献   
32.
National-Incident Based Reporting System (NIBRS) information for 1993 iscompared with two other sets of homicide data to assess the acuracy ofprocedures for estimating age-, sex-, and race-specific arrest counts fromtraditional Uniform Crime Report (UCR) data. The simultaneous age, race, andsex characteristics of offenders provided in the NIBRS arrest and offender segmentsare compared with estimates of the same characteristics derived from summaryUCR arrest data. The results suggest that using UCR marginal totals toestimate arrest counts by race and sex produces reasonably accurateestimates of the number of black and nonblack male arrests for murder andother offenses. Estimates of arrests of females by race and sex are lessaccurate, probably because of the relatively small number of arrests ofwomen and girls. Estimating male arrest counts for specific age groups alsoproduces reasonably accurate estimates. The results suggest that previousresearch employing such estimates may have been misleading in the estimatesof female arrests by race but accurate in the estimates of male arrests byrace. Although the use of summary UCR-based estimates in futurecross-sectional research will become increasingly unnecessary as the NIBRSreplaces the current UCR program, time series research designs on arrest andcrime trends will continue to require estimates.  相似文献   
33.
This article explores constructions of cyberterrorism within the global news media between 2008 and 2013. It begins by arguing that the preoccupation with questions of definition, threat and response in academic literature on cyberterrorism is problematic, for two reasons. First, because it neglects the constitutivity of representations of cyberterrorism in the news media and beyond; second, because it prioritises policy-relevant research. To address this, the article provides a discursive analysis drawing on original empirical research into 31 news media outlets across the world. Although there is genuine heterogeneity in representations of cyberterrorism therein, we argue that constructions of this threat rely heavily on two strategies. First, appeals to authoritative or expert “witnesses” and their institutional or epistemic credibility; second, generic or historical analogies, which help shape understanding of the likelihood and consequences of cyberterrorist attack. These strategies have particular discursive importance, we argue, given the lack of readily available empirical examples of the “reality” of cyberterrorism.  相似文献   
34.
This article explores the parameters, value and limitations of different critical strategies for those dissatisfied with the contemporary politics of terror. It argues, first, that the prominent (counter-)terrorism paradigm – in which terrorism is approached as a ubiquitous and very specific security challenge meriting appropriately exceptional responses – is far more critiqued than we might anticipate. And, second, that such critiques – which can be found across political language, popular culture, everyday life, and beyond – employ distinct critical resources to serve varying ends. Reflecting on these, the article offers a new heuristic distinguishing five critical strategies which seek to: (i) repudiate; (ii) question; (iii) subvert; (iv) replace, or (v) deconstruct the prominent counter-terrorism paradigm. This typology, it argues, offers scope for optimism and strategic resources for those attracted to a critical terrorism studies project going forward.  相似文献   
35.
This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those concerned by an imminent threat of cyberterrorism, and other, more skeptical, views. Following a discussion on method, the article's analysis section then details findings from three research questions: (1) Does cyberterrorism constitute a significant threat? If so, against whom or what?; (2) Has a cyberterrorism attack ever taken place?; and (3) What are the most effective countermeasures against cyberterrorism? Are there significant differences to more traditional forms of anti- or counterterrorism? The article concludes by reflecting on areas of continuity and discontinuity between academic debate on cyberterrorism and on terrorism more broadly.  相似文献   
36.
慈健 《河北法学》2007,25(9):120-122
"挪而未用"案件如何处理的问题,在刑法理论界、实务部门都存在一些分歧.对此进行剖析认为,产生分歧的主要原因一部分是由于对挪用公款罪构成要件要素的属性的认识不同造成的,一部分是由于立法的原因造成的.在此基础上,提出了一些立法完善的建议,以期为本罪的立法修订提供切实可行的参考思路.  相似文献   
37.
38.
In the past three decades, “policy entrepreneurship” has emerged as a key analytical concept helping to explain institutional and policy change. Despite this, however, the literature on policy entrepreneurship remains theoretically vexed, producing limited theoretical knowledge or explanatory models able to draw firm conclusions. Theory building on policy and institutional change, for example, how policy entrepreneurs institute and navigate change agendas, using what tools, strategies, resources, and capacities remains opaque. This is especially the case in developing country contexts, where most analytical investigation of policy entrepreneurship has addressed “first world” case examples. This special issue seeks to address this analytical gap in the literature, focusing on cases specific to developing country contexts, deepening our empirical knowledge of policy entrepreneurship in developing countries, but also exploring theoretical and conceptual debates as they relate to developing countries.  相似文献   
39.
This article reports on a recent survey designed to capture understandings of cyberterrorism across the global research community. Specifically, it explores competing views, and the importance thereof, amongst 118 respondents on three definitional issues: (a) the need for a specific definition of cyberterrorism for either policymakers or researchers; (b) the core characteristics or constituent parts of this concept; and (c) the value of applying the term “cyberterrorism” to a range of actual or potential scenarios. The article concludes by arguing that while a majority of researchers believe a specific definition of cyberterrorism is necessary for academics and policymakers, disagreement around what this might look like has additional potential to stimulate a rethinking of terrorism more widely.  相似文献   
40.
The creation of a UN human rights mechanism was meant to address systematically the international protection and promotion of human rights within the context of international relations. Over the years, the Human Rights Commission has dealt with human rights issues in ways which some commentators have labelled unsatisfactory. The United Nations High Level Panel on Threats, Challenges and Change, set up by Kofi Anna to conduct an in‐depth study on global threats, and provide an analysis of future challenges to peace and security, recommended a review of HR mechanisms. This led to the establishment of the Human Rights Council, replacing the Human Rights Commission. One of the mechanisms introduced was the Universal Periodic Review of Human Rights. This article looks at how the UPR process has progressed so far and makes some assessment as to where it is heading.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号