首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   93篇
  免费   2篇
各国政治   3篇
工人农民   6篇
世界政治   16篇
外交国际关系   7篇
法律   39篇
中国政治   1篇
政治理论   23篇
  2020年   4篇
  2019年   4篇
  2018年   3篇
  2017年   3篇
  2016年   4篇
  2015年   2篇
  2013年   21篇
  2011年   2篇
  2010年   1篇
  2009年   1篇
  2007年   2篇
  2006年   2篇
  2005年   2篇
  2003年   1篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1993年   1篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   6篇
  1985年   1篇
  1984年   3篇
  1983年   2篇
  1982年   2篇
  1981年   2篇
  1980年   2篇
  1978年   2篇
  1976年   1篇
  1973年   1篇
  1972年   1篇
  1971年   2篇
  1969年   1篇
  1967年   1篇
排序方式: 共有95条查询结果,搜索用时 24 毫秒
31.
32.
Books in review     
has taught at the universities of London and York. He is author of The Making of Sociology, The Shaking of the Foundations: Family and Society,and The Abolitionists—The Family and Marriage under Attack.Fletcher’s own book on Burt, Science, Ideology, and the Media,will be issued by Transaction in 1991.  相似文献   
33.
The new technologies of bio-informatic border security and remote surveillance that have emerged as key infrastructures of reconfigured mobility regimes depend on various kinds of labor to produce the effect of bordering. The current retrofitting and technological remediation of borders suggests their transformation away from static demarcators of hard territorial boundaries toward much more sophisticated, flexible, and mobile devices of tracking, filtration, and exclusion. Borders require the labor of software developers, designers, engineers, infrastructure builders, border guards, systems experts, and many others who produce the “smart border”; but they also depend on the labor of “data-ready” travelers who produce themselves at the border, as well as the underground labor of those who traffic in informal and illegalized economies across such borders. Bordering increasingly relies on technological forms of mediation that are embedded within hi-tech, military and private corporate logics, but are also resisted by electronic and physical “hacks” or bypassing of informational and infrastructural architectures. In this paper we consider three socio-technological assemblages of the border, and the labor which makes and unmakes them: (1) the interlocking “cyber-mobilities” of contemporary airports including visual technologies for baggage, cargo, and passenger inspection, as well as information technologies for passenger dataveillance, air traffic control, and human resource systems; (2) the development of the Schengen Information System database of the EU, and its implications for wider migrant rights and internal mobility within the EU, as well as radical border media that have attempted to intervene in that border space; and (3) elements of the US–Mexico “smart border” regime known as the Secure Border Initiative Network (2006–2011), and those who have tried to tactically evade, disrupt, or undermine the working of this border.  相似文献   
34.
We hypothesize that in the real world, as opposed to the lab, the norm is for people to experience friendly media that favor their political predispositions when political favoritism is perceived at all. For this reason, media are generally limited in their ability to create cross-cutting exposure. We test this hypothesis using representative survey data drawn from 11 different countries with varying media systems. We further hypothesize that television will contribute more to cross-cutting exposure than newspapers. Finally, and most importantly, we test the hypothesis that the more the structure of a country's media system parallels that of its political parties, the more that country's population will be dominated by exposure to like-minded views via mass media. We find confirmation for all 3 of these hypotheses and discuss their implications for the role of mass media in providing exposure to cross-cutting political perspectives.  相似文献   
35.
36.
This case study discusses the Survivor-Centered Advocacy (SCA) Project, a community-based participatory research (CBPR) project that convened anti-violence advocates from culturally specific communities to design and implement research. The project used a unique approach to build grassroots research capacity and center survivors of intimate partner violence from historically marginalized communities. This approach coalesced into the creation of an exploratory Community-Led Research (CLR) framework that incorporated trauma-informed, research justice and language justice principles. The CLR framework responded to community members’ desire to lead, rather than simply participate in, the research process. As a result, five studies were designed and executed by practitioners turned community-based researchers, most of whom had never before engaged in research, except as subjects. The CLR framework integrated the skills and experiences of community-based and external researchers, and led to high levels of engagement, rich data, more equitable research processes and innovative research projects.  相似文献   
37.
38.
39.
40.
Post-September 11, the government has been rapidly funding public health initiatives to bolster the Nation's ability to respond to bioterrorist attacks. While the infusion of money into the public health system is laudable, the pressure to enact legislation quickly has resulted in laws and policies that ignore privacy and civil liberties and that favor anti-bioterror initiatives over more common public health concerns. A public health agenda that ignores privacy and civil liberties will undermine public trust, leading people to not fully participate in critical public health activities. Our Nation is far more likely to succeed in preventing and responding to a potential act of bioterrorism if we embrace the principle that advancing public health and preserving individual liberties are symbiotic and inextricable.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号