全文获取类型
收费全文 | 971篇 |
免费 | 15篇 |
专业分类
各国政治 | 30篇 |
工人农民 | 29篇 |
世界政治 | 46篇 |
外交国际关系 | 468篇 |
法律 | 313篇 |
中国共产党 | 1篇 |
中国政治 | 2篇 |
政治理论 | 94篇 |
综合类 | 3篇 |
出版年
2023年 | 1篇 |
2022年 | 2篇 |
2020年 | 2篇 |
2019年 | 5篇 |
2018年 | 15篇 |
2017年 | 11篇 |
2016年 | 11篇 |
2015年 | 9篇 |
2014年 | 49篇 |
2013年 | 142篇 |
2012年 | 67篇 |
2011年 | 88篇 |
2010年 | 69篇 |
2009年 | 76篇 |
2008年 | 46篇 |
2007年 | 50篇 |
2006年 | 45篇 |
2005年 | 54篇 |
2004年 | 59篇 |
2003年 | 50篇 |
2002年 | 45篇 |
2001年 | 5篇 |
2000年 | 12篇 |
1999年 | 2篇 |
1998年 | 9篇 |
1997年 | 7篇 |
1996年 | 4篇 |
1995年 | 5篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1980年 | 3篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有986条查询结果,搜索用时 15 毫秒
21.
Christina ManciniAuthor Vitae Amy ReckdenwaldAuthor VitaeEric BeauregardAuthor Vitae 《Journal of criminal justice》2012,40(1):21
Purpose
Extant scholarship has examined pornography's putative link to the commission of sex crime. Yet, virtually no research speaks to whether an offender's exposure to pornography during many different stages of life elevates the violence of a sex offense. The current study addresses this gap.Methods
Using retrospective longitudinal data, we systematically investigate the effect of offender pornography exposure during adolescence, adulthood, and immediately prior to the offense on the level of physical injury as well as the extent of humiliation experienced by sex crime victims.Results
Findings indicate that adolescent exposure was a significant predictor of the elevation of violence—it increased the extent of victim humiliation. Results also suggest a tempering, or cathartic effect of pornography—using pornography just prior to the offense was correlated with reduced victim physical injury. No effects, however, were observed for adult pornography exposure.Conclusion
Pornography use may differentially influence offenders’ propensity to harm or degrade victims over the life course. 相似文献22.
Purpose
Disproportionate minority contact during traffic stops has been a consistent source of commentary and study in recent years. While various theoretical perspectives have been employed to explain these empirical findings, the differential offending hypotheses has been largely ignored as a viable alternative explanation. Building on existing empirical evidence regarding criminal offending patterns and driving patterns, we examined the veracity of this explanation using data from an observational study of urban driving behavior.Methods
Data were collected using an observational methodology in an urban environment. These data were then used to estimate various regression models and test the differential offending hypothesis.Results
Analytic models indicated that Black drivers speed more frequently and engage in more severe speeding compared to White drivers, net of controls.Conclusions
The findings suggest that citizen risk for specific police behavior is partially attributable to differential behavior prior to the encounter. These results mirror the findings of previous research in other geographic locations using different methodologies; thus, contributing to the conclusion that understanding officer decision-making and behavior requires consideration of other factors beyond a citizen's race. 相似文献23.
Purpose
This study examined the process of leaving the gang. Gang membership was conceptualized in a life course framework and the motives for why and methods for how one leaves the gang were analyzed.Methods
Data were gathered from a sample of 84 juvenile arrestees in Arizona, all of whom left their gang. Motives for leaving the gang were organized into factors internal (push) and external (pull) to the gang, while methods for leaving the gang were organized into hostile and non-hostile modes of departure. Motives and methods were cross-classified and their correlates were examined, notably in relation to gang ties—persisting social and emotional attachments to the gang.Results
Push motives and non-hostile methods were the modal responses for leaving the gang. While it was not uncommon to experience a hostile departure from the gang, most former gang members reported walking away without ritual violence or ceremony. This method was conditional on the motive for departure, however. None of the individuals leaving the gang for pull or external reasons experienced a hostile departure. While gang ties persisted regardless of motive or method, retaining such ties corresponded with serious consequences.Conclusions
A life course framework is capable of organizing similarities between leaving the gang and desistance from other forms of crime and deviant groups. The process of gang desistance is consistent with asymmetrical causation. Due to limited attention to this process, a typology is introduced as a basis for understanding leaving the gang in relation to desisting from crime. 相似文献24.
Laura McKinnonAuthor Vitae 《Computer Law & Security Report》2011,27(4):362-367
Estate planners’ current strategies for the disposition of digital assets are quickly becoming out-dated. This is largely the result of ambiguities concerning proprietary rights of digital assets after death. When advising clients on how to plan for the succession of digital assets, it is important for estate planners to understand the nature of digital assets today and to recognize how these assets may evolve. In failing to take into account the evolving nature of digital assets, estate planners are liable to craft short-sighted and thus ineffective succession plans. As the popularity of digital executor businesses increases, estate planners ought to caution clients on their shortcomings. Additionally, legislatures must create statutes which outline the rights of individuals vis-à-vis online service providers. 相似文献
25.
Andrew JointAuthor Vitae Edwin Baker Author Vitae 《Computer Law & Security Report》2011,27(4):407-415
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements. 相似文献
26.
Ida Madieha AzmiAuthor Vitae 《Computer Law & Security Report》2011,27(4):394-401
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics. 相似文献
27.
28.
Armstrong A Babrauskas V Holmes DL Martin C Powell R Riggs S Young LD 《Journal of forensic sciences》2004,49(4):741-748
Tests have determined that boots or shoes of individuals at a fire scene do not transport sufficient contaminants ("tracking") through the fire scene to produce a positive laboratory result for the presence of gasoline in a fire scene that was not present at the time of the fire. Questions about the validity of forensic laboratory results have been raised on the basis that low-level gasoline residues detected in the laboratory samples could have been the result of transporting the residue by footwear contaminated from the fire scene ("tracking"). The data collected in this study establish that "tracking" does not lead to false-positive laboratory results. Canines trained and experienced in the detection of trace ignitable liquid residues were also utilized in this study. The canine results confirmed that properly trained canines show a higher sensitivity than do standard ASTM laboratory techniques for fire debris analysis. In a few cases, canines responded to contamination, but laboratory testing (which is the definitive indicator) did not produce positive results. 相似文献
29.
Alex JenkinsAuthor Vitae 《Computer Law & Security Report》2009,25(3):280-284
The Bermudian Supreme Court (at first instance) recently ruled in Bermuda Restaurants Limited (t/a “Chopsticks”) v. Jonathan Daspin and ConvergEx Global Markets Ltd. (Civil Jurisdiction 2008: No. 134 (to be reported)) on the issue of whether an employer (here, a company) should be held liable for an allegedly libellous email publication by its employee, the managing director. The Judge was asked by the employer company to determine two issues of law which exposed the company and which centred on its vicarious liability for its employee's actions, including whether the use of the company's email system, during working hours, made it complicit in the publication. The Court held, applying principles of English and Canadian law, that the company was not vicariously liable and by extension that it was not the email's publisher. 相似文献
30.
Tami Davis Biddle Author Vitae 《Orbis》2011,55(1):4-29
This article argues that U.S. leaders navigated their way through World War II challenges in several important ways. These included: sustaining a functional civil-military relationship; mobilizing inside a democratic, capitalist paradigm; leveraging the moral high ground ceded to them by their enemies; cultivating their ongoing relationship with the British, and embracing a kind of adaptability and resiliency that facilitated their ability to learn from mistakes and take advantage of their enemies’ mistakes. 相似文献