全文获取类型
收费全文 | 532篇 |
免费 | 17篇 |
专业分类
各国政治 | 41篇 |
工人农民 | 34篇 |
世界政治 | 30篇 |
外交国际关系 | 15篇 |
法律 | 261篇 |
中国政治 | 7篇 |
政治理论 | 153篇 |
综合类 | 8篇 |
出版年
2021年 | 4篇 |
2020年 | 14篇 |
2019年 | 14篇 |
2018年 | 17篇 |
2017年 | 16篇 |
2016年 | 15篇 |
2015年 | 12篇 |
2014年 | 12篇 |
2013年 | 67篇 |
2012年 | 10篇 |
2011年 | 9篇 |
2010年 | 10篇 |
2009年 | 11篇 |
2008年 | 13篇 |
2007年 | 20篇 |
2006年 | 8篇 |
2005年 | 8篇 |
2004年 | 7篇 |
2003年 | 9篇 |
2002年 | 10篇 |
2001年 | 16篇 |
2000年 | 14篇 |
1999年 | 10篇 |
1998年 | 5篇 |
1997年 | 11篇 |
1995年 | 8篇 |
1994年 | 10篇 |
1993年 | 6篇 |
1992年 | 9篇 |
1991年 | 9篇 |
1988年 | 10篇 |
1987年 | 11篇 |
1986年 | 11篇 |
1985年 | 8篇 |
1984年 | 8篇 |
1983年 | 8篇 |
1982年 | 5篇 |
1981年 | 17篇 |
1980年 | 14篇 |
1977年 | 5篇 |
1976年 | 4篇 |
1975年 | 6篇 |
1973年 | 5篇 |
1971年 | 3篇 |
1970年 | 4篇 |
1969年 | 7篇 |
1968年 | 4篇 |
1967年 | 4篇 |
1966年 | 7篇 |
1964年 | 3篇 |
排序方式: 共有549条查询结果,搜索用时 15 毫秒
391.
Left realists contend that people lacking legitimate means of solving the problem of relative deprivation may come into contact
with other frustrated disenfranchised people and form subcultures, which in turn, encourage criminal behaviors. Absent from
this theory is an attempt to address how, today, subcultural development in North America and elsewhere is heavily shaped
simultaneously by the recent destructive consequences of right-wing Friedman or Chicago School economic policies and marginalized
men’s attempts to live up to the principles of hegemonic masculinity. The purpose of this paper, then, is to offer a new left
realist theory that emphasizes the contribution of these two key determinants. 相似文献
392.
Harry Blagg 《Criminal Justice Matters》2013,92(1)
The British criminology community has been orphaned this year. The deaths of Stan Cohen, Mary McIntosh and now Geoff Pearson have left many of us feeling bereft. Barbara Hudson's reflection on Stan's career in the June 2013 issue of Criminal Justice Matters was adorned with memories of his kindness and unerring decency. For those of us fortunate to have known Geoff well and work alongside him there are clear parallels. Geoff Pearson left us a glittering legacy of scholarly works that have become embedded into the ‘common sense’ of criminological theory. Yet, Geoff himself was no lofty scholar, he was one of the most approachable and personable individuals one could wish to meet: generous with his time, interested in the views and experiences of others and a passionate advocate for the outsider. 相似文献
393.
Schwartz SJ Beyers W Luyckx K Soenens B Zamboanga BL Forthun LF Hardy SA Vazsonyi AT Ham LS Kim SY Whitbourne SK Waterman AS 《Journal of youth and adolescence》2011,40(7):839-859
Identity is a critical developmental task during the transition to adulthood in Western societies. The purpose of the present study was to evaluate an empirically based, cluster-analytic identity status model, to examine whether all four of Marcia's identity statuses (diffusion, foreclosure, moratorium, and achievement) would emerge empirically, and to identify different patterns of identity formation among American college-attending emerging adults. An ethnically diverse sample of 9,034 emerging-adult students (73% female; mean age 19.73?years) from 30 U.S. universities completed measures of identity exploration (ruminative, in breadth, and in depth) and commitment (commitment making and identification with commitment), identity synthesis and confusion, positive and negative psychosocial functioning, and health-compromising behaviors. The identity status cluster solution that emerged provided an adequate fit to the data and included all four of Marcia's original identity statuses, along with Carefree Diffusion and Undifferentiated statuses. Results provided evidence for concurrent validity, construct validity, and practical applicability of these statuses. Implications for identity research are discussed. 相似文献
394.
Kevin M. Beaver Meghan W. RowlandJoseph A. Schwartz Joseph L. Nedelec 《Journal of criminal justice》2011,39(5):426
Purpose
Research has consistently revealed that measures of psychopathy and psychopathic personality traits represent some of the most consistent predictors of violent criminal involvement. As a result, there has been a considerable amount of interest in trying to identify the various etiological factors related to psychopathy. The current study builds on this existing body of literature by examining the genetic foundations to psychopathic personality traits.Methods
An adoption-based research design is used to estimate genetic effects on psychopathic personality traits. Adoptees are drawn from the National Longitudinal Study of Adolescent Health.Results
Analyses revealed that having a biological criminal father was related to psychopathic personality traits for male adoptees, but not for female adoptees. For males, having a criminal biological father increased the odds of scoring in the extreme of the psychopathic personality trait scale by a factor ranging between 4.3 and 8.5. However, there was no association between having a biological criminal mother and psychopathic personality traits for adoptees.Conclusions
Psychopathic personality traits are transmitted from father-to-offspring due to genetic reasons. 相似文献395.
396.
Harry Wechsler 《政策研究评论》2012,29(1):63-89
The central position of this article is that validation and interoperability are paramount for the effective and ethical use of biometrics. Illuminating the relevance for policymakers of the science underlying the security and privacy aspects of biometrics, this article calls for adequate and enforceable performance metrics that can be independently corroborated. Accordingly, the article considers biometrics and forensics for the dual challenges of addressing security and privacy using smart identity management. The discussion revolves around the concepts of “personally identifiable information” (PII) and interoperability with emphasis on quantitative performance analysis and validation for uncontrolled operational settings, variable demographics, and distributed and federated operations. Validation metrics includes expected rates of identification/misidentification, precision, and recall. The complementary concepts of identity and anonymity are addressed in terms of expected performance, functionality, law and ethics, forensics, and statistical learning. Biometrics encompasses appearance, behavior, and cognitive state or intent. Modes of deployment and performance evaluation for biometrics are detailed, with operational and adversarial challenges for both security and privacy described in terms of trustworthiness, vulnerabilities, functional creep, and feasibility of safeguards. The article underscores how lack of interoperability is mostly due to overfitting and tuning to well‐controlled settings, so that validation merely confirms “teaching to the test” rather than preparation for real‐world deployment. Most important for validation is reproducibility of results including full information on the experimental design used, that forensic exclusion is allowed, and that scientific methods for performance evaluation are followed. The article concludes with expected developments regarding technology use and advancements that bear on security and privacy, including data streams and video, de‐anonymization and reidentification, social media analytics and cyber security, and smart camera networks and surveillance. 相似文献
397.
Harry McVea 《The Modern law review》2012,75(6):1123-1136
The Court of Appeal's decision in Fulham Football Club (1987) Ltd v Richards & Anor is both of interest and significance. By embracing the idea of the parties’ ability to ‘contract out’ of their statutory right to petition the court for relief under section 994 of the Companies Act 2006 (the so‐called ‘unfair prejudice’ remedy), their Lordships have not only contrived to stunt the future development of unfair prejudice as a minority shareholder remedy but, and more importantly for the purposes of this case note, their decision has reasserted and extended the contractual analogy in modern UK company law. 相似文献
398.
The development and initial psychometric investigation of the Dating Attitudes Inventory (DAI) is reported. The DAI was created, to fill a gap in the literature and to measure specific masculine ideology and traditional gender attitudes that rationalize the abuse of women. Using a sample (n = 164) of male college students, a 20-item measure was developed consisting of two subscales (Rationalization of Abuse and Dominance and Control) and a total score. The 20-item DAI and other measures used for validation were completed by 216 male college students. The DAI correlated in theoretically expected ways with measures of propensity for abusiveness, relational dominance, and masculine gender role stress. A confirmatory factor analysis supported the two theorized factors of the DAI. Results of the present study offer initial support for the validity and reliability of the DAI. The authors discuss the importance of measuring masculine gender role attitudes and beliefs that support and rationalize dating violence. 相似文献
399.
The noncontemporariness of speech is important to both of the two general approaches to speaker identification. Ear-witness identification is one of them; in that instance, the time at which the identification is made is noncontemporary. A substantial amount of research has been carried out on this relationship and it now is well established that an auditor's memory for a voice decays sharply over time. It is the second approach to speaker identification which is of present interest. In this case, samples of a speaker's utterances are obtained at different points in time. For example, a threat call will be recorded and then sometime later (often very much later), a suspect' s exemplar recording will be obtained. In this instance, it is the speech samples that are noncontemporary and they are the materials that are subjected to some form of speaker identification. Prevailing opinion is that noncontemporary speech itself poses just as difficult a challenge to the identification process as does the listener's memory decay in earwitness identification. Accordingly, series of aural-perceptual speaker identification projects were carried out on noncontemporary speech: first, two with latencies of 4 and 8 weeks followed by 4 and 32 weeks plus two more with the pairs separated by 6 and 20 years. Mean correct noncontemporary identification initially dropped to 75-80% at week 4 and this general level was sustained for up to six years. It was only after 20 years had elapsed that a significant drop (to 33%) was noted. It can be concluded that a listener's competency in identifying noncontemporary speech samples will show only modest decay over rather substantial periods of time and, hence, this factor should have only a minimal negative effect on the speaker identification process. 相似文献
400.
The application of resolution measurements to an electrophoretic system can give a quantitative analysis of the health of that system. Capillary electrophoresis has become a routine method for the analysis of DNA and resolution measurements can be used to assess the resulting electropherogram. A number of methods are available to evaluate resolution and three methods are detailed in the current work. Parameters such as polymer concentration and column length were also examined in terms of resolution, and changes therein, if these parameters were modified. 相似文献