全文获取类型
收费全文 | 1409篇 |
免费 | 56篇 |
专业分类
各国政治 | 66篇 |
工人农民 | 61篇 |
世界政治 | 123篇 |
外交国际关系 | 78篇 |
法律 | 699篇 |
中国共产党 | 1篇 |
中国政治 | 46篇 |
政治理论 | 382篇 |
综合类 | 9篇 |
出版年
2021年 | 9篇 |
2020年 | 21篇 |
2019年 | 27篇 |
2018年 | 50篇 |
2017年 | 55篇 |
2016年 | 43篇 |
2015年 | 31篇 |
2014年 | 50篇 |
2013年 | 220篇 |
2012年 | 42篇 |
2011年 | 62篇 |
2010年 | 38篇 |
2009年 | 31篇 |
2008年 | 55篇 |
2007年 | 54篇 |
2006年 | 64篇 |
2005年 | 54篇 |
2004年 | 54篇 |
2003年 | 53篇 |
2002年 | 32篇 |
2001年 | 19篇 |
2000年 | 17篇 |
1999年 | 18篇 |
1998年 | 16篇 |
1997年 | 14篇 |
1996年 | 11篇 |
1995年 | 17篇 |
1994年 | 21篇 |
1993年 | 16篇 |
1992年 | 12篇 |
1991年 | 11篇 |
1990年 | 9篇 |
1989年 | 14篇 |
1988年 | 15篇 |
1987年 | 15篇 |
1986年 | 7篇 |
1985年 | 16篇 |
1984年 | 9篇 |
1983年 | 13篇 |
1982年 | 12篇 |
1981年 | 7篇 |
1979年 | 10篇 |
1978年 | 13篇 |
1977年 | 9篇 |
1976年 | 11篇 |
1975年 | 13篇 |
1974年 | 11篇 |
1973年 | 8篇 |
1972年 | 11篇 |
1967年 | 8篇 |
排序方式: 共有1465条查询结果,搜索用时 15 毫秒
251.
252.
253.
254.
White J 《Journal of health politics, policy and law》2007,32(2):221-246
Traditional Medicare is being threatened from two political directions. The current Republican coalition, on the right, simply dislikes social insurance in principle. It seeks privatization for its own sake. Another perspective, centrist and well established among political and economic elites, worries that the program is "unaffordable," whatever its basic merits. Defenders of traditional Medicare need to address both threats by explaining why the budgetary fears are misconceived and why privatization is simply a bad idea. In order to do this, they need to take the budgetary high ground, argue more strenuously for short-term cost controls, and criticize the extra spending that the Bush administration has used to encourage private plans within Medicare. Defenders of social insurance should also seek good policy and political allies by proposing that Medicare's network of providers, prices, and administration be made available to employers (and other pools) in much the way that self-insured groups currently rent networks from private insurers. 相似文献
255.
Shechory M Nachson I Glicksohn J 《International journal of offender therapy and comparative criminology》2010,54(1):113-130
In this study, the interactive effect of stereotype and suggestion on accuracy of memory was examined by presenting 645 participants (native Israelis and immigrants from the former Soviet Union and Ethiopia) with three versions of a story about a worker who is waiting in a manager's office for a meeting. All versions were identical except for the worker's name, which implied a Russian or an Ethiopian immigrant or a person of no ethnic origin. Each participant was presented with one version of the story. After an hour delay, the participants' memories were tested via two questionnaires that differed in terms of level of suggestion. Data analyses show that (a) when a suggestion matched the participant's stereotypical perception, the suggestion was incorporated into memory but (b) when the suggestion contradicted the stereotype, it did not influence memory. The conclusion was that recall is influenced by stereotypes but can be enhanced by compatible suggestions. 相似文献
256.
Augustine Joseph Kposowa Michelle A. Adams Glenn T. Tsunokai 《Crime, Law and Social Change》2010,53(2):159-181
The purpose of the study was to estimate associations between citizenship status and arrest for crimes among male arrestees.
The primary hypothesis was that citizenship status (a rough proxy for immigration) has significant effects on arrest for violent
personal crimes, property crimes, and four other selected offenses. Data were derived from the Arrestee Drug Abuse Monitoring
(ADAM) Program for the years 2000 through 2002 inclusive. Our sample comprised male arrestees only. Logistic regression models
were fitted to the data to estimate the citizenship status-crime relationship. Results showed no significant association between
citizenship status and arrest for violent crimes. Non-citizens were 15% less likely than citizens to be arrested for property
crimes; they were also less likely to be arrested for weapons offenses and drug offenses. Non-citizens were much less likely
to test positive on NIDA-5 drugs than citizens. Non-citizens were, however, 50% more likely than citizens to be arrested for
forgery/counterfeiting. It was concluded that public perceptions about the relationship of citizenship status to criminal
behavior may be exaggerated and may not be borne out by empirical evidence. Limitations of the study are pointed out, including
the fact that in the ADAM data, naturalized immigrants are lumped together with native born citizens. 相似文献
257.
Kelly R. Kamnikar M.A. Amber M. Plemons M.A. Joseph T. Hefner Ph.D. 《Journal of forensic sciences》2018,63(2):361-370
As part of a much larger investigation into the use of macromorphoscopic trait data by forensic anthropologists to estimate ancestry from unidentified skeletal remains, we conducted a fourteen‐year (2002–2016) intraobserver error study. Motivated by the development of a large macromorphoscopic database―which will potentially utilize data collected in 2002―quantification of observer error, the impact of technological improvements in macromorphoscopic trait data collection and observer experience is necessary. To maximize comparisons between the two samples, ten macromorphoscopic traits were assessed. Results revealed three patterns of error relating to observer experience, the introduction of new technologies, and error inherent in the method. Overall, this study found the effect of error on macromorphoscopic trait analysis could be predicted and did not significantly impact their utility. 相似文献
258.
Diagnosing Crime and Diagnosing Disease‐II: Visual Pattern Perception and Diagnostic Accuracy
下载免费PDF全文
![点击此处可从《Journal of forensic sciences》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Previously, we reviewed how general cognitive processes might be susceptible to bias across both forensic and clinical fields, and how interdisciplinary comparisons could reduce error. We discuss several examples of clinical tasks which are heavily dependent on visual processing, comparing them to eyewitness identification (EI). We review the “constructive” nature of visual processing, and how contextual factors influence both medical experts and witnesses in decision making and recall. Overall, studies suggest common cognitive factors uniting these visual tasks, in both their strengths and shortcomings. Recently forensic sciences have advocated reducing errors by identifying and controlling nonrelevant information. Such efforts could effectively assist medical diagnosis. We suggest potential remedies for cognitive bias in these tasks. These can generalize across the clinical and forensic domains, including controlling the sequencing of contextual factors. One solution is an agnostic primary reading before incorporation of a complete history and interpretation. 相似文献
259.
After the fiftieth anniversary of the Freedom of Information Act in 2016, criticism of the law is considerable. FOIA has failed to live up to its initial promise of peeling back the layers that too often shroud the federal government in secrecy, frustrating the news media’s efforts to contribute to an informed electorate. Issues with response rates, unorganized systems and subjective interpretations of the act’s exemptions are not uncommon. This article utilizes data gathered from 2008 to 2015 that indicate that across multiple metrics, FOIA has increasingly failed to provide records to requesting parties. The trends suggest that significant overhaul is necessary. Rather than prescribing more amendments that are little more than Band-Aids on a withering dinosaur, this article concludes with a detailed set of recommendations – highlighted by a crowd-sourced request database – that move far from FOIA’s original paper-based model that still rests at its analog core. 相似文献
260.
Joseph V. DeMarco 《Computer Law & Security Report》2018,34(4):908-911
Robust cyber-resilience depends on sound technical controls and testing of those controls in combination with rigorous cyber-security policies and practices. Increasingly, corporations and other organizations are seeking to test all of these, using methods more sophisticated than mere network penetration testing or other technical audit operations. More sophisticated organizations are also conducting so-called “Red Team” exercises, in which the organization tasks a small team of highly skilled and trained individuals to try to gain unauthorized access to physical and logical company assets and information. While such operations can have real value, they must be planned and conducted with great care in order to avoid violating the law or creating undue risk and reputational harm to the organization. This article explores these sometimes tricky issues, and offers practical risk-based guidance for organizations contemplating these types of exercises. 相似文献