首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   144篇
  免费   3篇
各国政治   6篇
工人农民   8篇
世界政治   7篇
外交国际关系   9篇
法律   78篇
政治理论   35篇
综合类   4篇
  2023年   1篇
  2022年   1篇
  2020年   2篇
  2019年   2篇
  2018年   3篇
  2017年   3篇
  2016年   7篇
  2015年   4篇
  2013年   27篇
  2012年   2篇
  2011年   7篇
  2010年   2篇
  2009年   4篇
  2008年   3篇
  2007年   3篇
  2006年   2篇
  2005年   3篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2001年   2篇
  2000年   3篇
  1999年   3篇
  1998年   5篇
  1997年   2篇
  1996年   4篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1991年   3篇
  1990年   1篇
  1989年   2篇
  1987年   1篇
  1986年   5篇
  1985年   6篇
  1984年   5篇
  1980年   1篇
  1979年   3篇
  1978年   4篇
  1977年   2篇
  1976年   1篇
  1974年   1篇
  1972年   1篇
  1968年   2篇
  1967年   1篇
  1965年   1篇
排序方式: 共有147条查询结果,搜索用时 0 毫秒
131.
This study examined gender differences in levels of violence exposure, and in levels of posttraumatic stress (PTS) and related symptomatology in a sample of inner-city predominantly African American youth. Because such youth are at risk for exposure to chronic community violence, they are likely to experience considerable distress and clinical or subclinical levels of posttraumatic stress and related symptoms. Previous research has found that although boys are exposed to violence more frequently than are girls, girls are more likely to express posttraumatic stress and related symptoms as a result of violence exposure. Thus, we examined gender as a moderator of the relation between violence exposure and symptoms. A stronger positive association of anxiety and depression symptoms with extent of community violence exposure for girls than boys was found. It was also found that while girls do not appear to differ in their responses to witnessing violence versus being a victim of violence, boys appear to be more distressed by being a victim of violence than by witnessing violence.  相似文献   
132.
133.
134.
135.
136.
As the move toward the wider regulation of cryptography, both within the United Kingdom and elsewhere, becomes increasingly irresistible, the degree of understanding afforded to cryptography at the level of policy formation remains underdeveloped, ambiguous and, at times, misleading. One corollary of such solicitude is that a number of the most important and pervasive legal issues that flow naturally from the widespread availability of cryptography remain largely unexplored. This article attempts to remedy these deficiencies. It begins by offering a brief historical perspective before progressing to consider more substantive issues such as cryptography's aims, power, limitations, effectiveness and future. Ignoring, to a large extent, issues of law enforcement, and focusing, in particular, upon both the law of data protection, and, to a lesser extent, the general law of obligations in the United Kingdom, this article argues that the decision to utilise cryptography will not simply prove a matter of choice, preference or expediency, but of legal and commercial necessity in order to avoid the potential imposition of widespread indeterminate liability.  相似文献   
137.
Perceptions of children's credibility were studied in two experiments wherein participants watched a videotape of a 4- to 5- or a 6- to 7-year old child report details of a play session that had been experienced once (single-event) or was the last in a series of four similar play sessions (repeat-event). The child's report was classified as high or low accurate. In Experiments 1 and 2, reports of repeat-event children were judged to be less believable on several measures. In Experiment 1, younger children were viewed as less credible than older children. In both experiments, neither undergraduates nor community members correctly discriminated between high- and low-accurate reports. Content analysis in Study 3 revealed the relationship between age and event frequency and children's credibility ratings was mediated by the internal consistency of children's reports. Recent research on children's reports of instances of repeated events has identified several challenges facing children who report repeated abuse. These data bring to light another potential difficulty for these children.  相似文献   
138.
This study tests the cross-cultural applicability of Gottfredson and Hirschi’s general theory of crime and self-control theory by examining self-reported status offenses among a sample of Puerto Rican adolescents. Data come from a 2005 sample of 298 youth ages 14–19, representing both the public and private school systems in Puerto Rico. Using a series of multivariate regressions, three hypotheses were tested. First, low attachment to parents, schools, peers, and church will positively and significantly predict status offenses among both public and private students. Second, low self-control will positively and significantly increase status offenses among each group. Finally, the effects of attachment on offending will be mediated by self-control. Results show support for both social control theory (via institutional attachment) and general theory of crime (via self-control). Both the measures of attachment and self-control contribute to explaining status offenses. Self-control partially mediates the effects of attachment on status offenses.  相似文献   
139.
There are several paths of terror at seaports, terminals, inland waterways, and pipelines for entry of persons, materials, and weapons and for access to destroy seaport infrastructure, ships, equipment, and people so as to disrupt economic activity. This research seeks to:
  • 1 Examine the probability of terror events via these paths and to determine a strategy to create barriers to entry and access, and to ensure the likelihood of these events is near zero.
  • 2 Identify specific actions taken, and by whom, to accomplish the above objective, considering interacting government levels and public–private partnerships.
  • 3 Suggest apparent inaction where a probability of terror remains, albeit judged more qualitatively than quantitatively.
The need for secrecy and the reality of erroneous public information complicates the task of researcher and terrorist alike.  相似文献   
140.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号