首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   290篇
  免费   10篇
各国政治   11篇
工人农民   21篇
世界政治   25篇
外交国际关系   14篇
法律   191篇
政治理论   37篇
综合类   1篇
  2023年   3篇
  2021年   3篇
  2020年   6篇
  2019年   8篇
  2018年   11篇
  2017年   14篇
  2016年   15篇
  2015年   7篇
  2014年   4篇
  2013年   51篇
  2012年   6篇
  2011年   10篇
  2010年   3篇
  2009年   11篇
  2008年   8篇
  2007年   12篇
  2006年   10篇
  2005年   6篇
  2004年   8篇
  2003年   4篇
  2002年   7篇
  2001年   6篇
  2000年   10篇
  1999年   5篇
  1998年   2篇
  1997年   6篇
  1996年   3篇
  1994年   5篇
  1993年   1篇
  1992年   5篇
  1991年   6篇
  1990年   3篇
  1989年   3篇
  1988年   1篇
  1987年   3篇
  1986年   4篇
  1985年   5篇
  1984年   4篇
  1983年   4篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   3篇
  1978年   1篇
  1976年   1篇
  1973年   1篇
  1972年   1篇
  1971年   1篇
  1968年   1篇
  1967年   1篇
排序方式: 共有300条查询结果,搜索用时 31 毫秒
111.
Advances in forensic techniques have expanded the temporal horizon of criminal investigations, facilitating investigation of historic crimes that would previously have been considered unsolvable. Public enthusiasm for pursuing historic crimes is exemplified by recent high-profile trials of celebrities accused of historic sexual offences. These circumstances give new urgency to the question of how we should decide which historic offences to investigate. A satisfactory answer must take into account the ways in which the passage of time can erode the benefits of criminal investigation, the costs associated with investigating old crimes, and the need to prioritize investigations in the face of limited police resources. This article emphasizes the first of these factors. It begins by considering the moral goals of a criminal justice system and the contribution of criminal investigations to the achievement of these goals, distinguishing between contributions that depend on further steps in the criminal justice process, such as prosecution and punishment, and contributions that can have value independently of these further steps. Using this important distinction, the article then examines a range of factors that relate the passage of time to criminal justice goals, including the seriousness of the crime; deterioration of evidence; death of the offender, victim and others affected by the crime; and diminished psychological connectedness between those affected by the crime and their current selves. While the range and non-uniformity of relevant factors preclude a simple answer to the question of when historic crimes should be investigated and call instead for case-by-case assessment, we find that the analysis does support some general conclusions that can guide such an assessment.  相似文献   
112.
Victimization is a serious problem facing youth in American public schools. Prior research demonstrates that victimization is stratified by sex/gender; however, few studies consider factors that may moderate this relationship. This research investigates if victimization occurs when students break sex/gender stereotypes at school among female and male youth. The broad research question for this study is – are breaking sex/gender stereotypes regarding academic activities, math, and sports associated with victimization for female and male students at school? To address this research question, this study employs nationally representative data from the Education Longitudinal Study (ELS) of 2002 to investigate if breaking sex/gender stereotypes contributes to the likelihood of victimization for female and male students at school. The study finds that females who have favorable attitudes toward math and participate in math-related activities are less likely to be victimized, while students of both sexes who participate in female dominated sports (i.e. cheerleading and softball) have a higher risk of victimization, as do females who participate in male dominated sports (i.e. football and baseball). The implications for future research and policy implementation are discussed.  相似文献   
113.
114.
Veterans with mental health problems are a high-risk group for substance misuse difficulties and are over-represented in forensic settings. Yet, there are few substance misuse services available for this population. Evidence suggests that case management can provide effective interventions for veterans with substance misuse problems. However, there is little research to show its effectiveness in the UK. The present study reported on the implementation and preliminary outcomes of the Veterans Forensic Substance Misuses Service (VFSMS), piloted within a prison setting, to demonstrate the feasibility of the service. The VFSMS operated in four stages: Assessing needs, developing case management plans, providing bespoke support and developing discharge plans. Case studies were used to demonstrate this process, with measures of alcohol use and recovery showing outcomes for each case. Findings from three case studies suggested that case management was a feasible approach, with a range of interventions being used, including substance misuse and mental health services, plus housing and employment services. Outcome measures suggested that alcohol and substance misuse recovery improved following the VFSMS intervention. While the scope of the findings is limited, they suggested that case management is a feasible substance misuse intervention, with preliminary findings showing improvements in substance misuse outcomes.  相似文献   
115.
Abstract:  We consider a hypothetical series of cases in which the DNA profile of a crime-scene sample is found to match a known profile in a DNA database (i.e., a "cold hit"), resulting in the identification of a suspect based only on genetic evidence. We show that the average probability that there is another person in the population whose profile matches the crime-scene sample but who is not in the database is approximately 2( N  −  d ) p A , where N is the number of individuals in the population, d is the number of profiles in the database, and p A is the average match probability (AMP) for the population. The AMP is estimated by computing the average of the probabilities that two individuals in the population have the same profile. We show further that if a priori each individual in the population is equally likely to have left the crime-scene sample, then the average probability that the database search attributes the crime-scene sample to a wrong person is ( N  −  d ) p A .  相似文献   
116.
Politics and history are closely intertwined and historians play a vital role in British public life. Yet, British political history, which has a critical contribution to make for understanding British politics today, faces two urgent challenges. First, academic history has retreated from subjects that remain hugely popular in media and trade publishing and of interest to social scientists, such as the histories of political institutions and formal power structures. Second, political history is disconnected from innovative trends in the wider historiography of modern Britain. Combined, these issues leave political historians in an ambiguous position in relation to the wider field, to other academic disciplines and to contemporary political debates. After discussing these challenges, this introduction surveys this special issue, which reflects on what (if anything) is distinctive about political history as practised today, and what its contribution to historiography, social science and public life should be. It ends by posing key questions for historians of all methodological stripes who investigate Britain's political past.  相似文献   
117.
Feminism and Political History   总被引:1,自引:0,他引:1  
Political historians traditionally privileged the political activities of men and masculine political institutions. This vision of political history was revised from the early 1970s, first by "women's history" and later due to the influence of the "gender turn". The latter encompassed a recognition that conceptions of masculinity and femininity contribute to the shaping of political power. Both developments challenged but ultimately reinvigorated political history. However, as this article will argue, political history and feminist history remain to an extent quarantined from one another, despite the radical potential for feminist scholarship to change the way politics is conceived.  相似文献   
118.
This article contributes to the debate around early modern women’s work. It concerns not waged labour but rather the unpaid contributions made by women to both home and the business undertaken by their husband. It focuses on Elizabeth Jeake, the wife of Samuel Jeake, a merchant from the Sussex port of Rye. Through the letters exchanged between the family, it explores Elizabeth’s skilled work in support of her husband. This included giving instructions to contractors, gathering and disseminating business and investment information, negotiations with Samuel’s business partners and acquaintances, managing property and tenants, negotiating credit relationships and purchasing and selling commodities.  相似文献   
119.
Anticipating whether an adversary group will continue to use their usual (“conventional”), expected attack methods is important for military and counterterrorism practitioners tasked with protecting the security of others. Conventional attack methods are by their nature easier to plan and prepare for whilst “innovative” methods may take those responsible for security and counterterrorism by surprise and, as such, may have more impact and more serious consequences. The present study aimed to develop understanding of how, when, and why adversary groups might decide to use conventional attack methods or opt to do something innovative instead. A literature review was conducted and findings were applied to develop a thorough understanding of the decision-making process that underlies an adversary group's choice of attack method. Identified are three stages preceding the execution of an attack: a) “strategic direction”; b) “incubation”; and c) “planning and preparation,” plus “overarching” and “contextual” factors that can influence the process at each stage. It is suggested that it is these factors and how they influence decision-making that result in innovative methods being used to execute an attack, or convention prevailing. Findings can aid practitioners and policy-makers in counterterrorism, security, and law enforcement, to support their understanding, evaluation, and countering of current and future threats.  相似文献   
120.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号