全文获取类型
收费全文 | 113篇 |
免费 | 5篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 10篇 |
世界政治 | 5篇 |
外交国际关系 | 19篇 |
法律 | 44篇 |
中国政治 | 1篇 |
政治理论 | 30篇 |
出版年
2021年 | 2篇 |
2020年 | 1篇 |
2019年 | 5篇 |
2018年 | 2篇 |
2017年 | 8篇 |
2016年 | 9篇 |
2015年 | 3篇 |
2014年 | 3篇 |
2013年 | 17篇 |
2012年 | 3篇 |
2011年 | 6篇 |
2010年 | 3篇 |
2009年 | 7篇 |
2008年 | 4篇 |
2007年 | 3篇 |
2006年 | 2篇 |
2004年 | 4篇 |
2003年 | 2篇 |
2001年 | 2篇 |
1999年 | 4篇 |
1998年 | 1篇 |
1997年 | 4篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1986年 | 2篇 |
1984年 | 2篇 |
1982年 | 2篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有118条查询结果,搜索用时 15 毫秒
71.
The impact of bullying in all forms on the mental health and safety of adolescents is of particular interest, especially in the wake of new methods of bullying that victimize youths through technology. The current study examined the relationship between victimization from both physical and cyber bullying and adolescent suicidal behavior. Violent behavior, substance use, and unsafe sexual behavior were tested as mediators between two forms of bullying, cyber and physical, and suicidal behavior. Data were taken from a large risk-behavior screening study with a sample of 4,693 public high school students (mean age = 16.11, 47 % female). The study’s findings showed that both physical bullying and cyber bullying associated with substance use, violent behavior, unsafe sexual behavior, and suicidal behavior. Substance use, violent behavior, and unsafe sexual behavior also all associated with suicidal behavior. Substance use and violent behavior partially mediated the relationship between both forms of bullying and suicidal behavior. The comparable amount of variance in suicidal behavior accounted for by both cyber bullying and physical bullying underscores the important of further cyber bullying research. The direct association of each risk behavior with suicidal behavior also underscores the importance of reducing risk behaviors. Moreover, the role of violence and substance use as mediating behaviors offers an explanation of how risk behaviors can increase an adolescent’s likelihood of suicidal behavior through habituation to physical pain and psychological anxiety. 相似文献
72.
Brett Bowden 《Global Society》2006,20(2):155-178
Just as domestic civil society is widely regarded as serving the greater common good of a national democratic political community, global civil society is also promoted as a vehicle through which a host of humanity's ills may be remedied. This article argues that the pinning of such high hopes on global civil society is mistaken, for its proponents have failed to recognise that global civil society is insufficiently analogous to domestic civil society for it to be a similarly positive force. At the national level, civil society functions in a balanced interdependence with the state. At the global level there is no equivalent of the state to provide the necessary scrutiny and regulation that at the national level prevents constituents of domestic civil society from committing injustices. 相似文献
73.
On an energy‐equivalent basis Central Asia is predominantly a gas producing region, with Turkmenistan and Uzbekistan contributing substantially to the regional total. Kazakhstan is the primary oil producer in the region. Xinjiang, one of the poorest areas of China, is noted for its vast oil, gas and coal resources, though still largely undeveloped. As a means of facilitating economic development and prosperity in Central Asia and nearby Xinjiang, officials are promoting trade and investment among the countries in the region. This paper examines emerging economic relations within Central Asia and Xinjiang, with a focus on the lucrative oil and gas sectors. Importantly, the cooperation is being influenced by centuries‐old cultural and ethnic ties. 相似文献
74.
75.
Brett S. Silverman 《Family Court Review》2001,39(1):85-103
The author focuses on the issues involving the unsealing of adoption records—allowing adoptees to discover who their birth parents are. He first examines the history of adoption and the development of adoption laws in the United States and then discusses currently enacted adoption statutes. Next, the author considers the benefits and disadvantages of unsealing adoption records to the birth parents, the adoptee, and the adoptive parents. He suggest a model law and offers an analysis of its advantages and problems. Through this proposal, the author hopes to assuage many of the problems existing in adoption laws now. 相似文献
76.
East Asian cultures are widely held to be fairly homogeneous in that they highly value harmonious social relationships. We propose, however, that the focus (dyadic versus group) and the nature (emotional versus instrumental) of social relations vary among the Chinese, Japanese, and Korean cultures in ways that have important implications for the negotiation tactics typically employed by managers from these three cultures. Our data are from a web survey administered to three hundred eighty‐eight managers from China, Japan, and South Korea. In this article, we discuss how the differences in the focus and the nature of business relationships in China, Japan, and Korea are manifested in the different norms for negotiation tactics endorsed by managers from these three countries. 相似文献
77.
Brett G. Johnson 《Communication Law & Policy》2016,21(2):175-220
Pundits have recently used the term “heckler's veto” to describe instances in which vocal audiences seek to silence offensive or controversial speech by putting pressure on institutions that control the private forums that host the speech. The use of the term in these contexts, however, fails to take into account the jurisprudential nuances of the heckler's veto principle, as well as the principle's unique position within First Amendment theory. This article fills a void in mass communication law scholarship by examining the development of the heckler's veto principle in cases from the Supreme Court of the United States that discuss the persistent challenges that the heckler's veto principle presents and by analyzing the principle from the perspective of First Amendment theory. The purpose of these analyses is to distill the social values of tolerating extreme speech, and to apply those values to the governance of private forums of communication. 相似文献
78.
Brett Eterovic‐Soric M.S. Kim‐Kwang Raymond Choo Ph.D. Sameera Mubarak Ph.D. Helen Ashman Ph.D. 《Journal of forensic sciences》2017,62(4):1054-1070
In this paper, we review literature on antiforensics published between 2010 and 2016 and reveal the surprising lack of up‐to‐date research on this topic. This research aims to contribute to this knowledge gap by investigating different antiforensic techniques for devices running Windows 7, one of the most popular operating systems. An approach which allows for removal or obfuscation of most forensic evidence is then presented. Using the Trojan software DarkComet RAT as a case study, we demonstrate the utility of our approach and that a Trojan Horse infection may be a legitimate possibility, even if there is no evidence of an infection on a seized computer's hard drive. Up‐to‐date information regarding how forensic artifacts can be compromised will allow relevant stakeholders to make informed decisions when deciding the outcome of legal cases involving digital evidence. 相似文献
79.
80.
P. R. Brett 《Australian Journal of Public Administration》1978,37(1):21-32
Abstract: It is important to distinguish between the possible and the probable when speculating about developments in technology. It is difficult to foresee the uses which will be made of an invention, and often they are not the uses first proposed. With new technological developments almost anything is technically possible, although practical development of a possibility can be slower and more difficult than expected. Moreover, successful technical development does not guarantee acceptance by the public. Technology impinges on public administration in three ways. It is a tool, it creates new tasks, and new technology can change the expectations within society of the role and function of government and hence the role of public administration. Examples of the use of technology as a tool in public administration are evident in the areas of travel, telecommunications and data processing. Changes in technology create new administrative tasks related to increased public awareness of the dangers of many forms of technology, leading, for example, to consideration of problems of pollution, personal privacy and computer-related crime. New expectations created by the increased information available through technological advances in communication will prompt increasing calls for open planning and public participation in decision making which will in turn lead to increased visibility of administrators and a greater measure of real accountability. 相似文献