首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   971篇
  免费   15篇
各国政治   30篇
工人农民   29篇
世界政治   46篇
外交国际关系   468篇
法律   313篇
中国共产党   1篇
中国政治   2篇
政治理论   94篇
综合类   3篇
  2023年   1篇
  2022年   2篇
  2020年   2篇
  2019年   5篇
  2018年   15篇
  2017年   11篇
  2016年   11篇
  2015年   9篇
  2014年   49篇
  2013年   142篇
  2012年   67篇
  2011年   88篇
  2010年   69篇
  2009年   76篇
  2008年   46篇
  2007年   50篇
  2006年   45篇
  2005年   54篇
  2004年   59篇
  2003年   50篇
  2002年   45篇
  2001年   5篇
  2000年   12篇
  1999年   2篇
  1998年   9篇
  1997年   7篇
  1996年   4篇
  1995年   5篇
  1994年   6篇
  1993年   3篇
  1992年   4篇
  1991年   2篇
  1990年   3篇
  1989年   4篇
  1988年   3篇
  1987年   2篇
  1985年   5篇
  1984年   3篇
  1983年   3篇
  1982年   2篇
  1980年   3篇
  1979年   1篇
  1978年   1篇
  1975年   1篇
排序方式: 共有986条查询结果,搜索用时 15 毫秒
21.

Purpose

Extant scholarship has examined pornography's putative link to the commission of sex crime. Yet, virtually no research speaks to whether an offender's exposure to pornography during many different stages of life elevates the violence of a sex offense. The current study addresses this gap.

Methods

Using retrospective longitudinal data, we systematically investigate the effect of offender pornography exposure during adolescence, adulthood, and immediately prior to the offense on the level of physical injury as well as the extent of humiliation experienced by sex crime victims.

Results

Findings indicate that adolescent exposure was a significant predictor of the elevation of violence—it increased the extent of victim humiliation. Results also suggest a tempering, or cathartic effect of pornography—using pornography just prior to the offense was correlated with reduced victim physical injury. No effects, however, were observed for adult pornography exposure.

Conclusion

Pornography use may differentially influence offenders’ propensity to harm or degrade victims over the life course.  相似文献   
22.

Purpose

Disproportionate minority contact during traffic stops has been a consistent source of commentary and study in recent years. While various theoretical perspectives have been employed to explain these empirical findings, the differential offending hypotheses has been largely ignored as a viable alternative explanation. Building on existing empirical evidence regarding criminal offending patterns and driving patterns, we examined the veracity of this explanation using data from an observational study of urban driving behavior.

Methods

Data were collected using an observational methodology in an urban environment. These data were then used to estimate various regression models and test the differential offending hypothesis.

Results

Analytic models indicated that Black drivers speed more frequently and engage in more severe speeding compared to White drivers, net of controls.

Conclusions

The findings suggest that citizen risk for specific police behavior is partially attributable to differential behavior prior to the encounter. These results mirror the findings of previous research in other geographic locations using different methodologies; thus, contributing to the conclusion that understanding officer decision-making and behavior requires consideration of other factors beyond a citizen's race.  相似文献   
23.

Purpose

This study examined the process of leaving the gang. Gang membership was conceptualized in a life course framework and the motives for why and methods for how one leaves the gang were analyzed.

Methods

Data were gathered from a sample of 84 juvenile arrestees in Arizona, all of whom left their gang. Motives for leaving the gang were organized into factors internal (push) and external (pull) to the gang, while methods for leaving the gang were organized into hostile and non-hostile modes of departure. Motives and methods were cross-classified and their correlates were examined, notably in relation to gang ties—persisting social and emotional attachments to the gang.

Results

Push motives and non-hostile methods were the modal responses for leaving the gang. While it was not uncommon to experience a hostile departure from the gang, most former gang members reported walking away without ritual violence or ceremony. This method was conditional on the motive for departure, however. None of the individuals leaving the gang for pull or external reasons experienced a hostile departure. While gang ties persisted regardless of motive or method, retaining such ties corresponded with serious consequences.

Conclusions

A life course framework is capable of organizing similarities between leaving the gang and desistance from other forms of crime and deviant groups. The process of gang desistance is consistent with asymmetrical causation. Due to limited attention to this process, a typology is introduced as a basis for understanding leaving the gang in relation to desisting from crime.  相似文献   
24.
Estate planners’ current strategies for the disposition of digital assets are quickly becoming out-dated. This is largely the result of ambiguities concerning proprietary rights of digital assets after death. When advising clients on how to plan for the succession of digital assets, it is important for estate planners to understand the nature of digital assets today and to recognize how these assets may evolve. In failing to take into account the evolving nature of digital assets, estate planners are liable to craft short-sighted and thus ineffective succession plans. As the popularity of digital executor businesses increases, estate planners ought to caution clients on their shortcomings. Additionally, legislatures must create statutes which outline the rights of individuals vis-à-vis online service providers.  相似文献   
25.
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements.  相似文献   
26.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
27.
28.
Tests have determined that boots or shoes of individuals at a fire scene do not transport sufficient contaminants ("tracking") through the fire scene to produce a positive laboratory result for the presence of gasoline in a fire scene that was not present at the time of the fire. Questions about the validity of forensic laboratory results have been raised on the basis that low-level gasoline residues detected in the laboratory samples could have been the result of transporting the residue by footwear contaminated from the fire scene ("tracking"). The data collected in this study establish that "tracking" does not lead to false-positive laboratory results. Canines trained and experienced in the detection of trace ignitable liquid residues were also utilized in this study. The canine results confirmed that properly trained canines show a higher sensitivity than do standard ASTM laboratory techniques for fire debris analysis. In a few cases, canines responded to contamination, but laboratory testing (which is the definitive indicator) did not produce positive results.  相似文献   
29.
The Bermudian Supreme Court (at first instance) recently ruled in Bermuda Restaurants Limited (t/a “Chopsticks”) v. Jonathan Daspin and ConvergEx Global Markets Ltd. (Civil Jurisdiction 2008: No. 134 (to be reported)) on the issue of whether an employer (here, a company) should be held liable for an allegedly libellous email publication by its employee, the managing director. The Judge was asked by the employer company to determine two issues of law which exposed the company and which centred on its vicarious liability for its employee's actions, including whether the use of the company's email system, during working hours, made it complicit in the publication. The Court held, applying principles of English and Canadian law, that the company was not vicariously liable and by extension that it was not the email's publisher.  相似文献   
30.
This article argues that U.S. leaders navigated their way through World War II challenges in several important ways. These included: sustaining a functional civil-military relationship; mobilizing inside a democratic, capitalist paradigm; leveraging the moral high ground ceded to them by their enemies; cultivating their ongoing relationship with the British, and embracing a kind of adaptability and resiliency that facilitated their ability to learn from mistakes and take advantage of their enemies’ mistakes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号