首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   227篇
  免费   13篇
各国政治   18篇
工人农民   3篇
世界政治   23篇
外交国际关系   6篇
法律   129篇
中国共产党   1篇
中国政治   1篇
政治理论   52篇
综合类   7篇
  2024年   2篇
  2022年   2篇
  2021年   2篇
  2020年   3篇
  2019年   4篇
  2018年   7篇
  2017年   11篇
  2016年   7篇
  2015年   3篇
  2014年   8篇
  2013年   31篇
  2012年   8篇
  2011年   12篇
  2010年   6篇
  2009年   8篇
  2008年   13篇
  2007年   7篇
  2006年   7篇
  2005年   7篇
  2004年   13篇
  2003年   7篇
  2002年   7篇
  2001年   6篇
  2000年   1篇
  1999年   9篇
  1998年   4篇
  1997年   2篇
  1996年   1篇
  1995年   4篇
  1994年   2篇
  1993年   4篇
  1992年   4篇
  1991年   3篇
  1990年   2篇
  1989年   1篇
  1987年   3篇
  1986年   2篇
  1985年   1篇
  1984年   2篇
  1983年   1篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1975年   1篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
排序方式: 共有240条查询结果,搜索用时 8 毫秒
221.
The nature of the risk or threat posed by ‘cyberfraud’ - fraud with a cyber dimension – is examined empirically based on data reported by the public and business to Action Fraud. These are used to examine the implications for a more effective risk-based response, both by category of fraud and also responding to cyberfraud generally, not just in the UK. A key characteristics of cyberfraud is that it can be globalised, unless there are major national differences in attractiveness of targets or in the organisation of control. This does not mean that all cyberfraud is international, however: not only do some involve face to face interactions at some stage of the crime cycle, but in online auction selling frauds, it appears to be common for the perpetrators and victims to reside in the same country. After reviewing patterns and costs of victimisation and their implications for control, the paper concludes that any law enforcement response must begin by being strategic: which other public and private sector bodies should be involved to do what; what should be the specific roles and responsibilities of the police and where ‘problem ownership’ should lie; what are we willing to pay for (in money and effort) for greater cybersecurity and how to reduce ‘market failure’ in its supply; and, how that security is going to be organised for and/or by the huge numbers of businesses and people that are (potentially) affected.  相似文献   
222.
Obscene or nuisance phone calls are particularly targeted towards women. Employing data from two sweeps of the British Crime Survey a decade apart (BCS 1982 and BCS 1992), this work attempts to measure the effects of individual socio-economic characteristics and victimization history of women in England and Wales on their likelihood of receiving at least one nuisance call. To make the logit modelling analysis more tangible, risks of nuisance calls are calculated from our models of five hypothetical women, single mother, professional, student, housewife and pensioner, with specific attributes taken from the set of explanatory variables.  相似文献   
223.
224.
225.
This article explores the status of crime among the American Indian population. Quantitative information regarding Indian offenses and arrest is presented and placed into the large spectrum of social problems afflicting Indian society. Some quantitative comparisons are made with a similar study conducted in 1964.Trend analyses were performed, and projections are provided relevant to total, adult, and juvenile Indian arrest; rates of arrest for Total, UCR Part I, and alcohol-related offenses are also given. Indian crime data are compared with those of other ethnic groups. The Indian propensity for arrests involving alcohol-related offenses is discussed in detail.The frequency of crimes on- and off-reservation is analyzed, particularly with respect to violent crimes; data are examined to determine the most frequent types of police contacts that Indian offenders experience.  相似文献   
226.
227.
228.
229.
Much has been written since the early 1980s about the costs of regulation and the various ways to curb them, but thus far no one has examined empirically the rise or decline of other forms of legislation, mainly primary legislation, in the context of the “war on regulation.” This article examines the extent to which the decline in the rate of production of secondary legislation in Israel since 1985 has been driven by changes in the rate of production of primary legislation. Using an original longitudinal data set, we count, codify various dimensions, and compare the type and length of primary and secondary legislations and the number of delegated provisions that primary legislations contain. We find that the relationship between primary and secondary legislation is not hierarchic, as one might have expected, but has become partially substitutive. The decline in the rate of production of secondary legislation in Israel is, perhaps paradoxically, associated with the rise of primary legislation. This opens a new research agenda on the relationships between primary and secondary legislation that goes well beyond the Israeli case.  相似文献   
230.
2‐(4‐Bromo‐2,5‐dimethoxyphenyl)‐N‐(2‐methoxybenzyl)ethanamine (25B‐NBOMe) is a substituted phenethylamine, which has become highly prevalent worldwide since 2014. Recently, in an autopsy case involving fatal 25B‐NBOMe intoxication, we found the postmortem increase of 25B‐NBOMe concentration in the cardiac blood approximately 2 days after death. The aim of this study was to investigate the distribution of 25B‐NBOMe and reproduce the postmortem redistribution using a rat model. Sprague‐Dawley rats were killed 30 min after intraperitoneal injection of 25B‐NBOMe (0.5 mg/kg) and left for 0, 3, 6, 9, 15, or 24 h (six rats at each time point). Postmortem 25B‐NBOMe concentrations in the cardiac blood increased by more than 10‐fold at 6‐h postmortem. 25B‐NBOMe accumulated primarily in the lung. Moreover, this postmortem redistribution occurred even in rats that had died 1 week following the 25B‐NBOMe administration. These findings indicate that attention should be paid to sample collection and data interpretation in the toxicological analysis of 25B‐NBOMe.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号