全文获取类型
收费全文 | 93篇 |
免费 | 2篇 |
专业分类
各国政治 | 3篇 |
工人农民 | 6篇 |
世界政治 | 16篇 |
外交国际关系 | 7篇 |
法律 | 39篇 |
中国政治 | 1篇 |
政治理论 | 23篇 |
出版年
2020年 | 4篇 |
2019年 | 4篇 |
2018年 | 3篇 |
2017年 | 3篇 |
2016年 | 4篇 |
2015年 | 2篇 |
2013年 | 21篇 |
2011年 | 2篇 |
2010年 | 1篇 |
2009年 | 1篇 |
2007年 | 2篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2003年 | 1篇 |
2002年 | 1篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1993年 | 1篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 6篇 |
1985年 | 1篇 |
1984年 | 3篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 2篇 |
1978年 | 2篇 |
1976年 | 1篇 |
1973年 | 1篇 |
1972年 | 1篇 |
1971年 | 2篇 |
1969年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有95条查询结果,搜索用时 24 毫秒
31.
32.
Ronald Fletcher Michael S. Kimmel Joseph R. Gusfield Mark S. Kaplan Marion S. Goldman 《Society》1990,27(6):85-96
has taught at the universities of London and York. He is author of The Making of Sociology, The Shaking of the Foundations: Family and Society,and The Abolitionists—The Family and Marriage under Attack.Fletcher’s own book on Burt, Science, Ideology, and the Media,will be issued by Transaction in 1991. 相似文献
33.
The new technologies of bio-informatic border security and remote surveillance that have emerged as key infrastructures of reconfigured mobility regimes depend on various kinds of labor to produce the effect of bordering. The current retrofitting and technological remediation of borders suggests their transformation away from static demarcators of hard territorial boundaries toward much more sophisticated, flexible, and mobile devices of tracking, filtration, and exclusion. Borders require the labor of software developers, designers, engineers, infrastructure builders, border guards, systems experts, and many others who produce the “smart border”; but they also depend on the labor of “data-ready” travelers who produce themselves at the border, as well as the underground labor of those who traffic in informal and illegalized economies across such borders. Bordering increasingly relies on technological forms of mediation that are embedded within hi-tech, military and private corporate logics, but are also resisted by electronic and physical “hacks” or bypassing of informational and infrastructural architectures. In this paper we consider three socio-technological assemblages of the border, and the labor which makes and unmakes them: (1) the interlocking “cyber-mobilities” of contemporary airports including visual technologies for baggage, cargo, and passenger inspection, as well as information technologies for passenger dataveillance, air traffic control, and human resource systems; (2) the development of the Schengen Information System database of the EU, and its implications for wider migrant rights and internal mobility within the EU, as well as radical border media that have attempted to intervene in that border space; and (3) elements of the US–Mexico “smart border” regime known as the Secure Border Initiative Network (2006–2011), and those who have tried to tactically evade, disrupt, or undermine the working of this border. 相似文献
34.
We hypothesize that in the real world, as opposed to the lab, the norm is for people to experience friendly media that favor their political predispositions when political favoritism is perceived at all. For this reason, media are generally limited in their ability to create cross-cutting exposure. We test this hypothesis using representative survey data drawn from 11 different countries with varying media systems. We further hypothesize that television will contribute more to cross-cutting exposure than newspapers. Finally, and most importantly, we test the hypothesis that the more the structure of a country's media system parallels that of its political parties, the more that country's population will be dominated by exposure to like-minded views via mass media. We find confirmation for all 3 of these hypotheses and discuss their implications for the role of mass media in providing exposure to cross-cutting political perspectives. 相似文献
35.
David Weisburd David P. Farrington Charlotte Gill With Mimi Ajzenstadt Trevor Bennett Kate Bowers Michael S. Caudy Katy Holloway Shane Johnson Friedrich Lösel Jacqueline Mallender Amanda Perry Liansheng Larry Tang Faye Taxman Cody Telep Rory Tierney Maria M. Ttofi Carolyn Watson David B. Wilson and Alese Wooditch 《犯罪学与公共政策》2017,16(2):415-449
36.
Susan Ghanbarpour Ada Palotai Mimi E. Kim Aracelia Aguilar Juana Flores Amber Hodson Tara Holcomb Maria Jimenez Mallika Kaur Orchid Pusey Alvina Rosales Wendy Schlater Hyejin Shim 《Journal of family violence》2018,33(8):521-535
This case study discusses the Survivor-Centered Advocacy (SCA) Project, a community-based participatory research (CBPR) project that convened anti-violence advocates from culturally specific communities to design and implement research. The project used a unique approach to build grassroots research capacity and center survivors of intimate partner violence from historically marginalized communities. This approach coalesced into the creation of an exploratory Community-Led Research (CLR) framework that incorporated trauma-informed, research justice and language justice principles. The CLR framework responded to community members’ desire to lead, rather than simply participate in, the research process. As a result, five studies were designed and executed by practitioners turned community-based researchers, most of whom had never before engaged in research, except as subjects. The CLR framework integrated the skills and experiences of community-based and external researchers, and led to high levels of engagement, rich data, more equitable research processes and innovative research projects. 相似文献
37.
38.
39.
40.
Goldman J 《Journal of health law》2005,38(3):481-527
Post-September 11, the government has been rapidly funding public health initiatives to bolster the Nation's ability to respond to bioterrorist attacks. While the infusion of money into the public health system is laudable, the pressure to enact legislation quickly has resulted in laws and policies that ignore privacy and civil liberties and that favor anti-bioterror initiatives over more common public health concerns. A public health agenda that ignores privacy and civil liberties will undermine public trust, leading people to not fully participate in critical public health activities. Our Nation is far more likely to succeed in preventing and responding to a potential act of bioterrorism if we embrace the principle that advancing public health and preserving individual liberties are symbiotic and inextricable. 相似文献