首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2620篇
  免费   133篇
各国政治   158篇
工人农民   130篇
世界政治   238篇
外交国际关系   146篇
法律   1266篇
中国政治   16篇
政治理论   780篇
综合类   19篇
  2023年   12篇
  2022年   9篇
  2021年   23篇
  2020年   59篇
  2019年   71篇
  2018年   85篇
  2017年   109篇
  2016年   90篇
  2015年   64篇
  2014年   101篇
  2013年   396篇
  2012年   78篇
  2011年   114篇
  2010年   72篇
  2009年   90篇
  2008年   81篇
  2007年   105篇
  2006年   106篇
  2005年   101篇
  2004年   96篇
  2003年   97篇
  2002年   93篇
  2001年   57篇
  2000年   54篇
  1999年   49篇
  1998年   48篇
  1997年   48篇
  1996年   33篇
  1995年   40篇
  1994年   42篇
  1993年   25篇
  1992年   25篇
  1991年   19篇
  1990年   26篇
  1989年   16篇
  1988年   30篇
  1987年   20篇
  1986年   15篇
  1985年   22篇
  1984年   22篇
  1983年   15篇
  1982年   13篇
  1981年   12篇
  1980年   13篇
  1979年   10篇
  1978年   5篇
  1976年   7篇
  1975年   5篇
  1973年   8篇
  1967年   4篇
排序方式: 共有2753条查询结果,搜索用时 15 毫秒
991.
In R (Evans) v Attorney General, the Supreme Court quashed the Attorney General's statutory veto of the Upper Tribunal's original determination made under freedom of information legislation. The Upper Tribunal had held that so‐called ‘advocacy’ memos should be published after a full hearing on the merits. The Supreme Court split five to two, with the lead judgment of Lord Neuberger using constitutional rather than administrative language and focusing on the rule of law. This note raises four objections to the lead judgment. First, it argues that the Upper Tribunal was acting in an executive not judicial capacity and the veto was not therefore a breach of the rule of law. Secondly it suggests the veto clause is best understood as a variant Henry VIII clause. Thirdly, it suggests Lord Neuberger's judgment is founded on a paradox. Finally, it argues that the judgment undermines parliamentary sovereignty. Future implications are then considered.  相似文献   
992.
Juvenile waiver has received much attention from the public, practitioners, and scholars. Prior studies have documented the increased use and effects of waiver. In this study we examine the current state of the law regarding juvenile waiver. We replicate 1995 and 2003 studies that examined state waiver statutes and detail the changes in prosecutorial, judicial, and legislative waiver since 2003. While the juvenile crime rate has dropped dramatically, it is unclear why legislatures’ fascination with juvenile waiver has also decreased. In this study we determine that juvenile waiver remains popular with legislatures, although there are signs of change.  相似文献   
993.
The Periodic Mobile Forensics (PMF) system investigates user behavior on mobile devices. It applies forensic techniques to an enterprise mobile infrastructure, utilizing an on‐device agent named TractorBeam. The agent collects changed storage locations for later acquisition, reconstruction, and analysis. TractorBeam provides its data to an enterprise infrastructure that consists of a cloud‐based queuing service, relational database, and analytical framework for running forensic processes. During a 3‐month experiment with Purdue University, TractorBeam was utilized in a simulated operational setting across 34 users to evaluate techniques to identify masquerading users (i.e., users other than the intended device user). The research team surmises that all masqueraders are undesirable to an enterprise, even when a masquerader lacks malicious intent. The PMF system reconstructed 821 forensic images, extracted one million audit events, and accurately detected masqueraders. Evaluation revealed that developed methods reduced storage requirements 50‐fold. This paper describes the PMF architecture, performance of TractorBeam throughout the protocol, and results of the masquerading user analysis.  相似文献   
994.
Abstract

Cyber technology, both explicitly and implicitly, impacts every facet of local, state, national and international criminal justice operations. Unfortunately, technological changes, including cyber technologies, are rarely well thought out and may have unintended negative consequences. Additionally technology, and particularly cyber technology, evolves at a much faster pace than our understanding of the ethics, laws and policies involved. Consequently, citizens, criminals and justice professionals often rely on technology without the benefit of legal protections or explicit agency policy. This paper will examine how technology, both historically (non cyber) and contemporarily (cyber), has positively and negatively affected one aspect of the Criminal Justice enterprise – law enforcement.  相似文献   
995.
996.

Objectives

This study conducted a randomized controlled trial with 600 recently released homeless men exiting California jails and prisons.

Methods

The purpose of this study was to primarily ascertain how different levels of intensity in peer coaching and nurse-partnered intervention programs may impact reentry outcomes; specifically: (a) an intensive peer coach and nurse case managed (PC-NCM) program; (b) an intermediate peer coaching (PC) program with brief nurse counseling; and (c) the usual care (UC) program involving limited peer coaching and brief nurse counseling. Secondary outcomes evaluated the operational cost of each program.

Results

When compared to baseline, all three groups made progress on key health-related outcomes during the 12-month intervention period; further, 84.5 % of all participants eligible for hepatitis A/B vaccination completed their vaccine series. The results of the detailed operational cost analysis suggest the least costly approach (i.e., UC), which accounted for only 2.11 % of the total project expenditure, was as effective in achieving comparable outcomes for this parolee population as the PC-NCM and PC approaches, which accounted for 53.98 % and 43.91 %, respectively, of the project budget.

Conclusions

In this study, all three intervention strategies were found to be comparable in achieving a high rate of vaccine completion, which over time will likely produce tremendous savings to the public health system.
  相似文献   
997.
998.
999.
Mark Langan 《圆桌》2016,105(5):477-487
Abstract

Brexit will of course have major implications for trade between Commonwealth African nations and the European continent. In the short term, the European Commission’s Economic Partnership Agreements with regional groups such as the East African Community will be complicated by the UK’s decision to leave the European project. Moreover, there are longer-term consequences to be considered, not least the role which the UK—as an independent trade actor—will adopt in its trade relations with Commonwealth African countries. This article examines the impact of Brexit for Commonwealth African nations’ trade with Europe (including the UK). It particularly points to several potential pitfalls arising from the Brexit referendum vis-à-vis African development.  相似文献   
1000.
The post-attendee Uniform Resource Locator (URL) feature within the video conferencing application known as Zoom is often overlooked by digital forensic experts as a potential risk for malware transmission. However, with the ability to redirect webinar participants to any URL set by the host for the webinar, the post-attendee URL can be abused by bad actors to expose webinar participants to malicious websites or, in the worst-case scenario, force participants to download a file through the use of a direct download link URL. This study aims to showcase how this exploit can be replicated by creating an experimental environment involving four Windows 10 desktops running Zoom version 5.7.5 and creating a webinar with four user accounts acting as webinar participants and setting the post-attendee URL value to the URL of a website that contained a keylogger. In another trial, the same experimental environment was utilized, with the only difference being the post-attendee URL that was set to redirect webinar participants to a download link for a .jpg file. In both instances, every user account that joined the webinar via clicking on the invitation link that was emailed to each user account after registering for the webinar was redirected to the post-attendee URL regardless of their user account role. These results not only prove that the post-attendee URL can be exploited, but also provide insight as to how this type of attack can be prevented.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号