首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   652篇
  免费   24篇
各国政治   39篇
工人农民   98篇
世界政治   40篇
外交国际关系   34篇
法律   308篇
中国政治   7篇
政治理论   146篇
综合类   4篇
  2024年   2篇
  2023年   5篇
  2022年   8篇
  2021年   2篇
  2020年   10篇
  2019年   9篇
  2018年   15篇
  2017年   21篇
  2016年   28篇
  2015年   17篇
  2014年   15篇
  2013年   96篇
  2012年   24篇
  2011年   23篇
  2010年   21篇
  2009年   16篇
  2008年   21篇
  2007年   25篇
  2006年   20篇
  2005年   15篇
  2004年   23篇
  2003年   19篇
  2002年   13篇
  2001年   13篇
  2000年   12篇
  1999年   12篇
  1998年   15篇
  1997年   15篇
  1996年   10篇
  1995年   10篇
  1994年   14篇
  1993年   12篇
  1992年   11篇
  1991年   13篇
  1990年   15篇
  1989年   5篇
  1988年   11篇
  1987年   4篇
  1986年   2篇
  1985年   8篇
  1984年   7篇
  1983年   6篇
  1982年   5篇
  1981年   2篇
  1980年   4篇
  1979年   5篇
  1977年   2篇
  1976年   2篇
  1975年   6篇
  1972年   3篇
排序方式: 共有676条查询结果,搜索用时 15 毫秒
151.
Pinning down the role of social ties in the decision to protest has been notoriously elusive, largely due to data limitations. Social media and their global use by protesters offer an unprecedented opportunity to observe real‐time social ties and online behavior, though often without an attendant measure of real‐world behavior. We collect data on Twitter activity during the 2015 Charlie Hebdo protest in Paris, which, unusually, record real‐world protest attendance and network structure measured beyond egocentric networks. We devise a test of social theories of protest that hold that participation depends on exposure to others' intentions and network position determines exposure. Our findings are strongly consistent with these theories, showing that protesters are significantly more connected to one another via direct, indirect, triadic, and reciprocated ties than comparable nonprotesters. These results offer the first large‐scale empirical support for the claim that social network structure has consequences for protest participation.  相似文献   
152.
Tharp AT  DeGue S  Lang K  Valle LA  Massetti G  Holt M  Matjasko J 《Journal of interpersonal violence》2011,26(16):3383-92; author reply 3393-402
Foubert, Godin, and Tatum describe qualitative effects among college men of The Men's Program, a one-session sexual violence prevention program. This article and the program it describes are representative of many sexual violence prevention programs that are in practice and provide an opportunity for a brief discussion of the development and evaluation of sexual violence prevention approaches. In this commentary, we will focus on two considerations for an evolving field: the adherence to the principles of prevention and the use of rigorous evaluation methods to demonstrate effectiveness. We argue that the problem of sexual violence has created urgency for effective prevention programs and that scientific and prevention standards provide the best foundation to meet this need.  相似文献   
153.
Numerous authors have presented evidence of increased dispersion in the distribution of annual earnings in the United States from the late 1970s through 2004 or later. However, the dispersion of long-run earnings measured over many years has received relatively little attention because of the limited availability of appropriate data. This article uses the Social Security Administration's Continuous Work History Sample, which documents the earnings histories of 3.3 million workers, to examine changes in both the annual and the long-run distributions of earnings during 1981-2004 for men and women. For men, the results indicate an increase in long-run earnings inequality of roughly the same magnitude as the trend seen in annual earnings dispersion, but there has been very little increase in the dispersion of long-run earnings among women. If calculations are restricted to a sample of women who work every year of the observation period, a trend of increased earnings dispersion emerges, but much less so than that observed for men.  相似文献   
154.
Fast‐paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. However, encryption both requires careful data management policies to be successful and does not ward off the insider threat. Indeed, we find no empirical evidence of a decrease in publicized instances of data loss associated with the use of encryption. Instead, there are actually increases in the cases of publicized data loss due to internal fraud or loss of computer equipment. © 2011 by the Association for Public Policy Analysis and Management.  相似文献   
155.
In this paper we focus on the ways ‘victims’ and ‘perpetrators’ are imagined in the narratives on women who have been trafficked to West Europe for sexual exploitation. Three specific domains: international/national law, local law enforcement and ethnographic academic perspective are particularly important as they strongly influence political reaction to trafficking and describe the phenomenon from the perspective of the individuals concerned. In our analysis, an explanation of the diversity of the perceptions in these three domains is provided.  相似文献   
156.

Objectives  

This randomized controlled experiment tests whether license plate readers (LPR) deter crime generally, and automobile crime more specifically in crime hot spots. The limited intervention tested here reflects one current likely use of LPR at the time of this publication.  相似文献   
157.
This report details findings from the nation's first statewide study on parenting coordination. A survey was presented to all known practicing parenting coordinators (PCs) in Florida (N = 207), with 67 (32%) responding. Data concerning PC demographics, how PCs do their work, and how they perceive their clients at different stages of the parenting coordination process suggest substantial similarity between mental health and family law professionals in almost every realm of questioning. Study limitations, implications for further research, and practice considerations are discussed.  相似文献   
158.
Score-based approaches for computing forensic likelihood ratios are becoming more prevalent in the forensic literature. When two items of evidential value are entangled via a scorefunction, several nuances arise when attempting to model the score behavior under the competing source-level propositions. Specific assumptions must be made in order to appropriately model the numerator and denominator probability distributions. This process is fairly straightforward for the numerator of the score-based likelihood ratio, entailing the generation of a database of scores obtained by pairing items of evidence from the same source. However, this process presents ambiguities for the denominator database generation - in particular, how best to generate a database of scores between two items of different sources. Many alternatives have appeared in the literature, three of which we will consider in detail. They differ in their approach to generating denominator databases, by pairing (1) the item of known source with randomly selected items from a relevant database; (2) the item of unknown source with randomly generated items from a relevant database; or (3) two randomly generated items. When the two items differ in type, perhaps one having higher information content, these three alternatives can produce very different denominator databases. While each of these alternatives has appeared in the literature, the decision of how to generate the denominator database is often made without calling attention to the subjective nature of this process. In this paper, we compare each of the three methods (and the resulting score-based likelihood ratios), which can be thought of as three distinct interpretations of the denominator proposition. Our goal in performing these comparisons is to illustrate the effect that subtle modifications of these propositions can have on inferences drawn from the evidence evaluation procedure. The study was performed using a data set composed of cursive writing samples from over 400 writers. We found that, when provided with the same two items of evidence, the three methods often would lead to differing conclusions (with rates of disagreement ranging from 0.005 to 0.48). Rates of misleading evidence and Tippet plots are both used to characterize the range of behavior for the methods over varying sized questioned documents. The appendix shows that the three score-based likelihood ratios are theoretically very different not only from each other, but also from the likelihood ratio, and as a consequence each display drastically different behavior.  相似文献   
159.
160.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号