全文获取类型
收费全文 | 771篇 |
免费 | 11篇 |
专业分类
各国政治 | 15篇 |
工人农民 | 27篇 |
世界政治 | 20篇 |
外交国际关系 | 451篇 |
法律 | 221篇 |
中国政治 | 1篇 |
政治理论 | 47篇 |
出版年
2023年 | 2篇 |
2021年 | 1篇 |
2020年 | 4篇 |
2019年 | 5篇 |
2018年 | 11篇 |
2017年 | 13篇 |
2016年 | 8篇 |
2015年 | 3篇 |
2014年 | 44篇 |
2013年 | 76篇 |
2012年 | 63篇 |
2011年 | 83篇 |
2010年 | 61篇 |
2009年 | 74篇 |
2008年 | 44篇 |
2007年 | 42篇 |
2006年 | 42篇 |
2005年 | 45篇 |
2004年 | 46篇 |
2003年 | 45篇 |
2002年 | 37篇 |
2001年 | 3篇 |
2000年 | 1篇 |
1998年 | 4篇 |
1997年 | 4篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1984年 | 1篇 |
1980年 | 2篇 |
1977年 | 1篇 |
1972年 | 1篇 |
排序方式: 共有782条查询结果,搜索用时 31 毫秒
121.
Shashank Joshi Author Vitae 《Orbis》2011,55(4):558-576
This article surveys the key loci of Sino-Indian tension, situating them within the context of a classical if uneven security dilemma. It then examines the sources of stability within the relationship, arguing that the scope and intensity of conflict is attenuated by a series of military, political, economic and other factors. Lastly, the essay discusses the implications of the analysis for external powers, and the possible trajectories of the relationship. 相似文献
122.
Purpose
This study examined the process of leaving the gang. Gang membership was conceptualized in a life course framework and the motives for why and methods for how one leaves the gang were analyzed.Methods
Data were gathered from a sample of 84 juvenile arrestees in Arizona, all of whom left their gang. Motives for leaving the gang were organized into factors internal (push) and external (pull) to the gang, while methods for leaving the gang were organized into hostile and non-hostile modes of departure. Motives and methods were cross-classified and their correlates were examined, notably in relation to gang ties—persisting social and emotional attachments to the gang.Results
Push motives and non-hostile methods were the modal responses for leaving the gang. While it was not uncommon to experience a hostile departure from the gang, most former gang members reported walking away without ritual violence or ceremony. This method was conditional on the motive for departure, however. None of the individuals leaving the gang for pull or external reasons experienced a hostile departure. While gang ties persisted regardless of motive or method, retaining such ties corresponded with serious consequences.Conclusions
A life course framework is capable of organizing similarities between leaving the gang and desistance from other forms of crime and deviant groups. The process of gang desistance is consistent with asymmetrical causation. Due to limited attention to this process, a typology is introduced as a basis for understanding leaving the gang in relation to desisting from crime. 相似文献123.
Daniel P. MearsAuthor Vitae Joshua C. CochranAuthor VitaeSarah J. GreenmanAuthor Vitae Avinash S. BhatiAuthor VitaeMark A. GreenwaldAuthor Vitae 《Journal of criminal justice》2011,39(6):509
Purpose
The past decade has been witness to a proliferation of calls for evidence-based juvenile court sanctions—including various programs, interventions, services, and strategies or approaches—that reduce recidivism and improve mental health, drug dependency, and education outcomes. At the same time, an emerging body of work has identified “proven,” “evidence-based,” “best practice,” or, more generally, “effective” efforts to achieve these outcomes. Even so, grounds for concern exist regarding the evidence-base for these and other sanctions.Methods
This paper describes the heterogeneity of sanctioning within juvenile justice and argues that, despite substantial advances in research, the heterogeneity severely delimits the generalizability of evaluations to date. It also raises questions about how much is in fact known about the effectiveness of many juvenile justice sanctions.Conclusion
Extant research offers grounds for optimism. Even so, explicit articulation of the limitations of this research and the need for studies that examine external validity is important for developing evidence about “what works” in juvenile justice. Implications for research and policy are discussed. 相似文献124.
Ida Madieha AzmiAuthor Vitae 《Computer Law & Security Report》2011,27(4):394-401
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics. 相似文献
125.
Joel SmithAuthor VitaeVictoria HorseyAuthor Vitae 《Computer Law & Security Report》2011,27(3):305-307
On 1st March 2011, the scope of the CAP Code was extended, giving the Advertising Standards Authority significantly expanded powers to regulate marketing claims made by advertisers on their own websites and in other non-paid-for space under their control, such as social networking sites and company blogs. The ASA’s extended remit will apply to all sectors and all businesses and organisations which are operating from the UK, regardless of size, in a move to ensure the same standards of consumer and business protection in the digital space as in other media. The extension aims to plug a regulatory gap following a formal recommendation from a wide cross-section of UK industry. 相似文献
126.
Warren B. ChikAuthor Vitae 《Computer Law & Security Report》2011,27(4):331-347
Is Google in its quest for search engine optimization through the creation of new technologies, which not only improves its search algorithms but also refines its search functions for users, doing it in a manner that makes it a perpetrator of primary copyright infringement or an invaluable facilitator for Internet functionality? How should the balance of interests in the treatment of creative works be recalibrated in the face of changes in search engine technology and operations, and the disputes that have arisen within the last decade in the context of the digital age and its needs? Using Google as a case study, this paper will look at the two main areas of dispute over the operations of information locator tools and services that either threatens search engine functionality and efficiency or weakens copyright holders’ exclusive rights. It proposes a concerted set of solutions through a reassessment and amendment of copyright law to optimize the social benefits and objectives of both the copyright regime and technological innovations in the electronic model of information archiving, indexing and delivery. A fair distribution of responsibilities and allocation of rights and liabilities will be suggested. In the process, due consideration will be given to both public and private interests, with the former taking precedence; while the recommended solutions will be made within the currently outdated framework for Internet intermediary protection (i.e. safe harbor laws) and exceptions (i.e. specific statutory exemptions and the general fair use defense) under the existing copyright regime. Thus, the proposed changes will be far reaching without being too radical a departure from current law, an evolution that will likely be more acceptable and realistic a solution to the problem.This paper is published in two parts. Part One of this paper published in the previous edition of the CLSR at [2011] 27 CLSR 110-131 dealt with the challenges to the copyright regime posed by the operations and technology behind the Google Images Search Engine, while Part Two will assess the benefits of the Google Books Search Project vis-à-vis the effects it will have on the scope of copyright protection. Recommendations are made to copyright law to accommodate both functions while generally preserving the main objectives of copyright protection. 相似文献
127.
Ian EdwardsAuthor Vitae 《Computer Law & Security Report》2011,27(2):189-190
The English High Court has considered the meaning of “making available to the public” by online transmission in the context of database rights and has determined that the act of making available is only committed in the country where the host server is located, and not the country where the material is accessed by the public. 相似文献
128.
Laura McKinnonAuthor Vitae 《Computer Law & Security Report》2011,27(4):362-367
Estate planners’ current strategies for the disposition of digital assets are quickly becoming out-dated. This is largely the result of ambiguities concerning proprietary rights of digital assets after death. When advising clients on how to plan for the succession of digital assets, it is important for estate planners to understand the nature of digital assets today and to recognize how these assets may evolve. In failing to take into account the evolving nature of digital assets, estate planners are liable to craft short-sighted and thus ineffective succession plans. As the popularity of digital executor businesses increases, estate planners ought to caution clients on their shortcomings. Additionally, legislatures must create statutes which outline the rights of individuals vis-à-vis online service providers. 相似文献
129.
Judith C. Bessant Michael Emslie Rob Watts 《Australian Journal of Public Administration》2011,70(2):143-155
Australian governments have published three intergenerational reports since 2002. In line with a general international trend these reports pointed to a problem said to arise from an ageing population which exposes Australia to the risk of a future major fiscal crisis. In this article we argue that by failing to use a generational accounting framework, the reports privilege the elderly at the expense of young people. Added to this, they fail to engage any discussion of intergenerational equity defined as distributive fairness and justice. In this article we explore the value of various approaches to intergenerational justice, focusing on the Principle of Intergenerational Neutrality derived from Rawls' theory of justice. We argue that this does not work as well from a policy point of view as Sen's freedom‐as‐capabilities approach. We conclude that linking Sen's approach to justice to a generational accounting will enable governments to address future issues of equity. 相似文献
130.
This study examined Taiwanese female and male police officers’ perceptions of handling domestic violence. Specifically, it assessed officers’ attitudes toward whether female officers, male officers, or a combination of female and male officers are more suited for handling cases of battered women, offenders, and domestic violence overall. Survey data were collected from 96 female and 156 male officers from two police departments in Taiwan. Frequency distributions showed that a combination of male and female officers were most preferred by officers for handling abused women, offenders, and domestic violence overall. Regression analysis found that female officers were significantly more likely than male officers to favor a combination of male and female officers over female officers alone for handling battered women. Female officers were found to be more likely than male officers to favor male over female officers and a combination of male and female officers for handling offenders. Police supervisors’ attitudes toward domestic violence also influenced officers’ attitudes toward who is more suited for handling offenders. Implications for future research and policy are discussed. 相似文献