全文获取类型
收费全文 | 146篇 |
免费 | 5篇 |
专业分类
各国政治 | 18篇 |
工人农民 | 7篇 |
世界政治 | 17篇 |
外交国际关系 | 10篇 |
法律 | 47篇 |
中国政治 | 1篇 |
政治理论 | 51篇 |
出版年
2023年 | 1篇 |
2021年 | 2篇 |
2020年 | 4篇 |
2019年 | 2篇 |
2018年 | 2篇 |
2017年 | 10篇 |
2016年 | 7篇 |
2015年 | 5篇 |
2014年 | 8篇 |
2013年 | 19篇 |
2012年 | 4篇 |
2011年 | 5篇 |
2010年 | 1篇 |
2009年 | 3篇 |
2008年 | 10篇 |
2007年 | 6篇 |
2006年 | 1篇 |
2005年 | 3篇 |
2004年 | 3篇 |
2003年 | 2篇 |
2002年 | 1篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 4篇 |
1998年 | 3篇 |
1997年 | 3篇 |
1996年 | 1篇 |
1995年 | 4篇 |
1994年 | 7篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1982年 | 1篇 |
1980年 | 4篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1974年 | 1篇 |
排序方式: 共有151条查询结果,搜索用时 15 毫秒
91.
92.
93.
Mel Kenny 《The Modern law review》2007,70(2):175-196
This article analyses the treatment of non-professional suretyship agreements across the EU in the context provided by Commission initiatives aimed firstly at creating a single market in financial services and secondly at improving the coherence of European private law. Predictably, given their polycontextual function, we are confronted with starkly divergent national approaches towards such agreements: a 'Tower of Babel' rather than a 'common core'. The article proceeds to consider how we may see elements of commonality arising through the tension between the differing national approaches – seen in terms of a Unitary Network. In the course of this analysis the treble paradox of surety protection is described. The article finishes with a prediction of the relevance of a dual-track strategy in this field: involving measures of sector-specific, vertical harmonisation, and a programme of common-law style, non-legislative harmonisation through judicial convergence. 相似文献
94.
95.
Ke Zhang Lara A. Frumkin Alex Stedmon Glyn Lawson 《Journal of Police and Criminal Psychology》2013,28(2):150-161
There are many situations in which deception may arise and understanding the behaviors associated with it are compounded by various contexts in which it may occur. This paper sets out a coding protocol for identifying cues to deception and reports on three studies, in which deception was studied in different contexts. The contexts involved manipulating risks (i.e., probability) of being detected and reconnaissance, both of which are related to terrorist activities. Two of the studies examined the impact of changing the risks of deception detection, whilst the third investigated increased cognitive demand of duplex deception tasks including reconnaissance and deception. In all three studies, cues to deception were analyzed in relation to observable body movements and subjective impressions given by participants. In general, the results indicate a pattern of hand movement reduction by deceivers, and suggest the notion that raising the risk of detection influences deceivers’ behaviors. Participants in the higher risk condition displayed increased negative affect (found in deceivers) and tension (found in both deceivers and truth-tellers) than those in lower risk conditions. 相似文献
96.
97.
Sean Lawson 《Cambridge Review of International Affairs》2014,27(2):226-245
This article uses the controversy within the United States (US) military over the use of social media by individual military professionals as a window into larger debates about the nature of information-age conflict. Information and associated technologies are now central to the US military imaginary. But the controversy over social media is one indicator that the dominant discourse of information-age conflict is neither stable nor total. The introduction of a new technology can serve as an antagonism that turns latent, potential contradictions into substantive differences for policymaking. Thus, though the US military generally has embraced information and communication technologies (ICTs), the introduction of a particular ICT can still be a source of controversy. Military imaginaries, technologies and the relationships between them remain dynamic, contingent and sometimes contentious. 相似文献
98.
The richest neighborhoods in the unincorporated suburbs have a stronger incentive to form a new city to escape the redistribution that is occurring there. Wealthy families also may desire to establish a new city if this enables the provision of government services that middle income voters would not fund. With three different measures of household well being??based on educational attainment, income, and home values??we consistently found that the relatively wealthier neighborhoods were more likely to be part of a new city by the end of the decade. Population density also played a big role 相似文献
99.
Kenny MacAskill 《Criminal Justice Matters》2013,92(1):10-14
A growing body of evidence looks at violence and harm caused to women working in lap dancing clubs. However, little attention has been paid to the wider impact of the licensing of sex entertainment venues (SEVs) on women's sense of safety and well-being in city centres where they are concentrated. This article contributes to the debate around the licensing of lap dancing clubs and gendered harm, using testimonies from a participatory photography research project facilitated by Sara Parker. Findings support feminist arguments that women's sense of safety and wellbeing in public spaces is compromised by the widespread use of sexualised imagery of women and girls in public spaces and by the growth of SEVs such as lap dancing clubs. 相似文献
100.
Rose Saikayasit Alex W. Stedmon Glyn Lawson 《Journal of Police and Criminal Psychology》2013,28(2):162-170
This paper presents work conducted as part the ‘Shades of Grey’ (EP/H02302X/1) research project that aims to develop scientific interventions for the detection of suspicious behaviors in public spaces. To provide an understanding of security and counter-terrorism work in different contexts the project adopted a human factors approach as part of a program of user requirements gathering exercises. These activities focussed on the needs of different end-users and stakeholders, ranging from frontline security personnel, managers and strategic security policy makers. By taking a user-centred approach, the discipline of human factors can be integrated into the security/counter-terrorism domain to support the design of practical security solutions. This paper presents a case study investigation using data collected from three security agencies. Common themes are explored, ranging from ‘the importance of temporal measures’ to ‘enhancing positive user experiences’. These factors are discussed in relation to the practical application of human factors methods within security research. 相似文献