全文获取类型
收费全文 | 93篇 |
免费 | 5篇 |
专业分类
各国政治 | 3篇 |
工人农民 | 17篇 |
世界政治 | 3篇 |
外交国际关系 | 6篇 |
法律 | 37篇 |
中国政治 | 1篇 |
政治理论 | 31篇 |
出版年
2022年 | 1篇 |
2021年 | 2篇 |
2019年 | 2篇 |
2018年 | 1篇 |
2017年 | 3篇 |
2016年 | 3篇 |
2015年 | 5篇 |
2014年 | 4篇 |
2013年 | 15篇 |
2012年 | 7篇 |
2011年 | 5篇 |
2010年 | 5篇 |
2009年 | 1篇 |
2008年 | 4篇 |
2007年 | 2篇 |
2006年 | 1篇 |
2003年 | 2篇 |
2002年 | 3篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1998年 | 4篇 |
1997年 | 5篇 |
1996年 | 1篇 |
1995年 | 3篇 |
1994年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1987年 | 3篇 |
1984年 | 1篇 |
1981年 | 1篇 |
1976年 | 1篇 |
1975年 | 1篇 |
1972年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有98条查询结果,搜索用时 15 毫秒
11.
12.
Joshua A. Tucker 《后苏联事务》2013,29(4):309-331
An American political scientist employs regional electoral, economic, and demographic data across several transition countries—Hungary, Slovakia, Poland, Czech Republic, and Russia—to examine the effects of economic conditions on the electoral fortunes of thirty-two incumbent political parties in ten parliamentary elections. “Primary Incumbents” and “Other Incumbents” are distinguished in order to analyze how the “Degree of Incumbency” affects the relationship between economic conditions and election results for these two different types of incumbents in post-communist countries. The article points to new questions and methods for examining multiparty elections as well as for the relationship between economic conditions and voting outcomes. 相似文献
13.
Jonathan B. Tucker 《Terrorism and Political Violence》2013,25(1):105-119
A series of incidents over the past two decades has indicated that some terrorist groups are interested in acquiring and using improvised chemical devices (ICDs). Although the 1993 Chemical Weapons Convention (CWC) is a disarmament treaty that is legally binding only on sovereign states that join it voluntarily, the Convention fortuitously includes several provisions that can help its members to prevent chemical terrorism or to manage the consequences of an attack. This article examines the articles of the CWC that are relevant to counterterrorism and discusses how their implementation could be improved at the national and international levels. The article also addresses the role that the CWC secretariat, the Organization for the Prohibition of Chemical Weapons (OPCW) in The Hague, currently plays in preventing and responding to incidents of chemical terrorism, and the political factors that constrain its activities in the counterterrorism field. 相似文献
14.
Bonita J. Iritani Martha W. Waller Carolyn Tucker Halpern Kathryn E. Moracco Sharon L. Christ Robert L. Flewelling 《Journal of family violence》2013,28(5):459-470
This paper examines the relationships between alcohol outlet density, alcohol use, and perpetration of intimate partner violence (IPV) among young adult women in the US. Data were from Wave III of the National Longitudinal Study of Adolescent Health (Add Health; N?=?4,430 in present analyses). Multinomial logistic regression was used to examine occurrence of past year IPV perpetration toward a male partner based on tract-level on-premise and off-premise alcohol outlet density, controlling for individuals’ demographic, alcohol use, and childhood abuse characteristics and neighborhood socio-demographic factors. Higher off-premise alcohol outlet density was found to be associated with young women’s perpetration of physical only IPV, controlling for individual-level and ecological factors. Alcohol use had an independent association with IPV perpetration but was not a mediator of the outlet density-IPV relationship. Findings suggest that considering alcohol-related environmental factors may help efforts aimed at preventing young women’s use of physical violence toward partners. 相似文献
15.
Corinna Jenkins Tucker Genevieve Cox Erin Hiley Sharp Karen T. Van Gundy Cesar Rebellon Nena F. Stracuzzi 《Journal of family violence》2013,28(3):299-310
We describe sibling proactive and reactive aggression in middle and late adolescence. Participants were 8th (n?=?303, M age?=?13.74 years, SD?=?.59) and 12th (n?=?300, M age?=?17.73 years, SD?=?.56) grade adolescents who completed an in-school survey. Findings revealed that these adolescents were significantly more likely to engage in reactive than proactive aggression with their closest-aged sibling. However, 8th grade adolescents reported greater aggression toward their closest-aged sibling than did 12th grade adolescents. In addition, sex composition of the sibling dyad moderated the association between sibling relationship quality (i.e., warmth and rivalry) and both proactive and reactive aggression indicating unique links for brother-brother and older sister-younger brother pairs. 相似文献
16.
Eric G. Lambert Nancy L. Hogan Bradene Moore Kasey Tucker Morris Jenkins Michael Stevenson Shanhe Jiang 《American Journal of Criminal Justice》2009,34(3-4):166-180
Correctional staff are instrumental in ensuring the success of any correctional institution; therefore, investigating how the work environment impacts correctional workers is essential. To determine the effects of supervisory consideration, supervisory structure, job variety, and perceptions of training on correctional staff job stress, job satisfaction, and organizational commitment, data from a survey of staff at a Midwestern private correctional facility were examined. The Ordinary Least Squares regression results indicate that each of the work environment factors had a significant impact on one or more of the three outcomes. Specifically, supervisory consideration and perceptions of training decreased job stress. Supervisory consideration, job variety, and perceptions of training had positive effects on job satisfaction. Finally, supervisory consideration, supervisory structure, job variety, and perceptions of training had positive relationships with organizational commitment. 相似文献
17.
The CASE (Computer-Assisted Sentencing) system has been developed to help sentencers to choose an appropriate sentence to impose on a convicted offender. Primarily, the system is aimed at Magistrates’ Courts. In England and Wales, by far the largest majority of sentencing is carried out by Magistrates, accounting for about 95 per cent of all sentences and over 80 per cent of sentences for more serious offences. 相似文献
18.
Jennifer M. Larson Jonathan Nagler Jonathan Ronen Joshua A. Tucker 《American journal of political science》2019,63(3):690-705
Pinning down the role of social ties in the decision to protest has been notoriously elusive, largely due to data limitations. Social media and their global use by protesters offer an unprecedented opportunity to observe real‐time social ties and online behavior, though often without an attendant measure of real‐world behavior. We collect data on Twitter activity during the 2015 Charlie Hebdo protest in Paris, which, unusually, record real‐world protest attendance and network structure measured beyond egocentric networks. We devise a test of social theories of protest that hold that participation depends on exposure to others' intentions and network position determines exposure. Our findings are strongly consistent with these theories, showing that protesters are significantly more connected to one another via direct, indirect, triadic, and reciprocated ties than comparable nonprotesters. These results offer the first large‐scale empirical support for the claim that social network structure has consequences for protest participation. 相似文献
19.
Fast‐paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. However, encryption both requires careful data management policies to be successful and does not ward off the insider threat. Indeed, we find no empirical evidence of a decrease in publicized instances of data loss associated with the use of encryption. Instead, there are actually increases in the cases of publicized data loss due to internal fraud or loss of computer equipment. © 2011 by the Association for Public Policy Analysis and Management. 相似文献
20.