首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   828篇
  免费   42篇
各国政治   97篇
工人农民   26篇
世界政治   69篇
外交国际关系   49篇
法律   389篇
中国共产党   1篇
中国政治   6篇
政治理论   228篇
综合类   5篇
  2023年   4篇
  2022年   4篇
  2021年   5篇
  2020年   17篇
  2019年   20篇
  2018年   23篇
  2017年   31篇
  2016年   31篇
  2015年   27篇
  2014年   29篇
  2013年   141篇
  2012年   21篇
  2011年   21篇
  2010年   27篇
  2009年   14篇
  2008年   26篇
  2007年   21篇
  2006年   32篇
  2005年   31篇
  2004年   27篇
  2003年   32篇
  2002年   38篇
  2001年   10篇
  2000年   13篇
  1999年   14篇
  1998年   21篇
  1997年   19篇
  1996年   10篇
  1995年   6篇
  1994年   12篇
  1993年   16篇
  1992年   12篇
  1991年   9篇
  1990年   7篇
  1989年   10篇
  1988年   17篇
  1987年   5篇
  1986年   4篇
  1985年   5篇
  1984年   7篇
  1983年   3篇
  1982年   6篇
  1981年   6篇
  1979年   7篇
  1978年   6篇
  1975年   3篇
  1973年   3篇
  1972年   3篇
  1971年   2篇
  1968年   2篇
排序方式: 共有870条查询结果,搜索用时 31 毫秒
131.
Journalists’ right to protect the identities of their confidential sources relies on an inconsistent set of court decisions based on constitutional and common law interpretations and state statutes. Efforts to bring some consistency to federal law through the passage of a shield law have stalled while journalists face new threats because of the vulnerability of their communications to discovery and monitoring by third parties. Also, the entry of non-professional communicators into the news ecosystem is causing courts to reevaluate and redefine long-standing protections. This article proposes four ways that sources could be better protected from unmasking without the passage of a shield law: improving whistleblower laws to better protect people who report illegal or unethical actions to the media; vastly reducing the number of government secrets to make “leaking” less attractive or necessary; changing legal strategy to focus on protecting the anonymity of sources instead of the rights of journalists to keep secrets; and more widespread and intelligent use of encrypted applications and software could all improve the security of journalistic sources. Because of the complexity of amending multiple whistleblower protection laws and changing the government’s document classification system, the article argues that the best solutions may be to persuade news organizations to change legal tactics and to use better encryption technology.  相似文献   
132.
133.
This article describes, evaluates and reflects upon student creation of cloud-based digital flashcards as an authentic formative and summative assessment task designed for the deep learning of constitutional law. The usefulness of digital flashcards in online legal education is explored. The undergraduate law student participants in the study responded differently to the assessment task depending upon the constitutional law topic they were assigned, the perceived relevance of constructing digital flashcards to professional practice and how they reacted to this creative task. Building digital flashcards provides a potentially powerful authentic assessment task for the study of constitutional law provided it is designed to support semester long creation, validation and sharing of digital flashcards that students perceive as professionally relevant and educationally useful. Student recommendations for designing an assessment task involving the creation of digital flashcards are evaluated.  相似文献   
134.
135.
Funding contingent upon evidence development (FED) has recently been the subject of some considerable debate in the literature but relatively little has been made of its economic impact. We argue that FED has the potential to shorten the lag between innovation and access but may also (i) crowd-out more valuable interventions in situations in which there is a fixed dedicated budget; or (ii) lead to a de facto increase in the funding threshold and increased expenditure growth in situations in which the programme budget is open-ended. Although FED would typically entail periodic review of provisional or interim listings, it may prove difficult to withdraw funding even at cost/QALY ratios well in excess of current listing thresholds. Further consideration of the design and implementation of FED processes is therefore required to ensure that its introduction yields net benefits over existing processes.  相似文献   
136.
Changes in district boundaries in small magnitude electoral systems can have substantive consequences for representation. In the U.S., each decennial redistricting cycle infuses House districts with a large number of new voters, changing personal representation for many citizens. What effect does the influx of these new voters exert on member behavior? By assessing the extent of this change in constituencies in conjunction with member voting behavior on roll calls, we can determine if significant changes to a congressional district impact post-redistricting legislative behavior. Using panel data estimators and various measures of legislator behavior, we show evidence that supports this claim. Our findings have notable implications for debates over representation and electoral accountability in legislative assemblies.  相似文献   
137.
Despite nearly a century of knowledge indicating a significant number of women engaging in sexual activities with children, the phenomenon has not yet been fully acknowledged. Recently, however, there has been a marked increase in research in this area. However, due to the relatively small numbers of detections or convictions there remains a lack of data regarding: (1) the specific clinical characteristics of female sex offenders; and (2) how these clinical factors link to re-offending and treatment need. The following study examines potential risk, protective, and treatment factors that are highlighted through the process of clinical intervention, using an adapted version of the Beech and Ward (2004) risk framework. We describe how female sex offenders typically display clinical deficits in the same risk domains as their male counterparts, while noting the ways in which these deficits manifest in this population. In addition, we compare these vulnerability factors in four established types of female sex offender.  相似文献   
138.
Boston, like many other major U.S. cities, experienced an epidemic of gun violence during the late 1980s and early 1990s that was followed by a sudden large downturn in gun violence in the mid 1990s. The gun violence drop continued until the early part of the new millennium. Recent advances in criminological research suggest that there is significant clustering of crime in micro places, or “hot spots,” that generate a disproportionate amount of criminal events in a city. In this paper, we use growth curve regression models to uncover distinctive developmental trends in gun assault incidents at street segments and intersections in Boston over a 29-year period. We find that Boston gun violence is intensely concentrated at a small number of street segments and intersections rather than spread evenly across the urban landscape between 1980 and 2008. Gun violence trends at these high-activity micro places follow two general trajectories: stable concentrations of gun assaults incidents over time and volatile concentrations of gun assault incidents over time. Micro places with volatile trajectories represent less than 3% of street segments and intersections, generate more than half of all gun violence incidents, and seem to be the primary drivers of overall gun violence trends in Boston. Our findings suggest that the urban gun violence epidemic, and sudden downturn in urban gun violence in the late 1990s, may be best understood by examining highly volatile micro-level trends at a relatively small number of places in urban environments.  相似文献   
139.
Although not common occurrences, schools are occasionally the site of barricaded captive events. To date little research has examined these acts of school violence. The purpose of this article is to describe 19 school barricaded captive events that occurred between February, 1998 and September, 2007 in the United States. Data were analyzed by examination of news reports of each incident, and include the following variables: Incident location (state, community), school level and size, time of day of the event, location of the event within the school, age and sex of the subjects, information about the captives, presence of school resource officers, student screening mechanisms, behavioral changes of the subjects, the subject’s expected outcomes, injuries or fatalities, demands and deadlines, captive escapes and releases, weapons, incident resolution, tactical team response, and negotiations. Results pertain to incident demographics, prevention/mitigation, and response.  相似文献   
140.

Research Summary

Focused deterrence strategies are increasingly being applied to prevent and control gang and group‐involved violence, overt drug markets, and individual repeat offenders. Our updated examination of the effects of focused deterrence strategies on crime followed the systematic review protocols and conventions of the Campbell Collaboration. Twenty‐four quasi‐experimental evaluations were identified in this systematic review. The results of our meta‐analysis demonstrate that focused deterrence strategies are associated with an overall statistically significant, moderate crime reduction effect. Nevertheless, program effect sizes varied by program type and were smaller for evaluations with more rigorous research designs.

Policy Implications

The available empirical evidence suggests these strategies generate noteworthy crime reduction impacts and should be part of a broader portfolio of crime reduction strategies available to policy makers and practitioners. Investments still need to be made, however, to strengthen the overall rigor of program evaluations and improve our understanding of key program activities associated with observed crime reduction impacts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号