首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   66篇
  免费   1篇
各国政治   8篇
工人农民   6篇
世界政治   5篇
外交国际关系   3篇
法律   40篇
政治理论   5篇
  2022年   1篇
  2018年   3篇
  2017年   1篇
  2016年   5篇
  2015年   3篇
  2014年   3篇
  2013年   12篇
  2009年   3篇
  2008年   5篇
  2007年   2篇
  2006年   2篇
  2003年   1篇
  2002年   1篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1993年   1篇
  1991年   1篇
  1983年   2篇
  1979年   7篇
  1978年   1篇
  1976年   1篇
  1975年   2篇
  1974年   2篇
  1973年   1篇
  1970年   1篇
  1969年   1篇
  1967年   1篇
排序方式: 共有67条查询结果,搜索用时 15 毫秒
41.
Cuba, this iconic revolutionary island which has brought so much hope to the Third World and, at one point, worry for a nuclear World War III, is going through a process of change never seen since Fidel Castro led his revolutionary forces to triumph around New Year’s of 1959. Yet, 10 years into the change process, led by the younger Castro Raúl (now 85), nobody can really forecast where the country will end up in socio-economic and political terms. In this TWQ subsection, two economists and three political scientists – two Cubans and three European Cuba watchers – analyse the reforms and their possible outcome.  相似文献   
42.

Like most criminological research, much of the research on hacking has predominantly focused upon the Northern Metropolis. As a result, there is a lack of focus on cybercrime within the Global South, particularly on illegal intrusions into computer systems, more colloquially known as hacking. This article provides a critical overview of hacking in the Global South, highlighting the role of strain in this offending behaviour. In particular, the authors note the role of Australian, American, and Taiwanese immigration policies that act to block offenders’ transitions from illicit hacking to legitimate employment in technological hubs outside of the Global South. To address these blocked opportunities, this article suggests the use of innovative justice paradigms, particularly restorative justice and regulatory self-enforcement, that respond to innovation-based cybercrime while also facilitating offender movement into “white hat” employment, even in cases of technology-facilitated sexual violence.

  相似文献   
43.
Abstract

When probation emerged a century ago it was grafted onto a criminal justice system with well-established prisons. Nevertheless for the first time in British penal history it was possible to impose a Probation Order as an alternative to Victorian punishments. By the 1960s, a time of change for probation (Whitehead and Statham, 2006), the Advisory Council on the Treatment of Offenders published its report on after-care that had a significant impact on the relationship between probation and prisons (Home Office, 1963). By 1967 an expanding probation organisation became the Probation and After-Care Service which began to fill social work posts in remand, detention, and borstal allocation centres, thus drawing probation closer into the custodial orbit.  相似文献   
44.
45.
Legal context: This article examines a decision of the English Patents Courtin relation to the validity of a patent claiming a single enantiomer(a particular molecular form) of a known pharmaceutical compound. Key points: The court held that while it would have been obvious to theskilled person at the priority date to prepare the single enantiomerof the drug claimed in the patent, the actual method of preparationtaught by the patent was not obvious. The attack on groundsof lack of inventive step therefore failed. However, the factthat the patent taught only one method of preparation, but soughtto claim the single enantiomer however prepared meant that theclaims (other than the method claim) were invalid on the groundsof insufficiency. Practical significance: This case demonstrates the formidable difficulties in obtaininga valid patent for a single enantiomer of a known pharmaceutical.While claims to a method of preparation can be valid, providedthe usual requirements of novelty, inventive step, etc. aremet, a patent claiming a single enantiomer of a known compoundper se will be likely to be invalid on the grounds of obviousnessor insufficiency.  相似文献   
46.
47.
In this article I argue that women educators' personal and professional networks underpinned the growth of nursery school education into a transnational movement in the interwar years. Edna Noble White, Lillian de Lissa, Mary Gutteridge and Gwendolyn Watkins' interlocking networks facilitated and connected the nursery school movements in the United Kingdom, United States, Canada and Australia. Although these women educators were at the centre of a feminised domain, I also show that their work and the movement were impacted by gender relations in the broader fields of education and child development research. Just as nursery school education transcended national boundaries and was reconfigured in each national context, so too the priorities and tensions in education and developmental psychology.  相似文献   
48.
A simple method for the extraction of testosterone from bloodstains followed by its measurement by radioimmunoassay is described. Complete discrimination of males and females was achieved with measured bloodstains as small as 40 microliters. With stains of unknown volume the total protein content of the stain was determined as an internal reference level. Using the testosterone/protein ratio unequivocal identification was possible for 75% of the stains from males and 50% from females.  相似文献   
49.
50.
The present study explores the theory and, to the greatest degree possible given the limitations of the data, the reality of aboriginal participation in what may be defined as ‘organized crime’ in Canada, engaging the possibility of a definition of ‘aboriginal organized crime’ and the proposal of a ‘typology’ of participants. In the development of both the definition and typology, the researchers build upon Beare's definition of organized crime to include the dimension of motivations—whether social, political or economic—which theorists agree are crucial in understanding organized crime activities, but which do not appear in current definitions of the term, as well as important contextual factors informing participation in aboriginal organized crime networks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号