首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   146篇
  免费   5篇
各国政治   18篇
工人农民   7篇
世界政治   17篇
外交国际关系   10篇
法律   47篇
中国政治   1篇
政治理论   51篇
  2023年   1篇
  2021年   2篇
  2020年   4篇
  2019年   2篇
  2018年   2篇
  2017年   10篇
  2016年   7篇
  2015年   5篇
  2014年   8篇
  2013年   19篇
  2012年   4篇
  2011年   5篇
  2010年   1篇
  2009年   3篇
  2008年   10篇
  2007年   6篇
  2006年   1篇
  2005年   3篇
  2004年   3篇
  2003年   2篇
  2002年   1篇
  2001年   2篇
  2000年   3篇
  1999年   4篇
  1998年   3篇
  1997年   3篇
  1996年   1篇
  1995年   4篇
  1994年   7篇
  1993年   1篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1989年   4篇
  1988年   2篇
  1987年   1篇
  1985年   2篇
  1984年   2篇
  1982年   1篇
  1980年   4篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
  1974年   1篇
排序方式: 共有151条查询结果,搜索用时 15 毫秒
91.
92.
93.
This article analyses the treatment of non-professional suretyship agreements across the EU in the context provided by Commission initiatives aimed firstly at creating a single market in financial services and secondly at improving the coherence of European private law. Predictably, given their polycontextual function, we are confronted with starkly divergent national approaches towards such agreements: a 'Tower of Babel' rather than a 'common core'. The article proceeds to consider how we may see elements of commonality arising through the tension between the differing national approaches – seen in terms of a Unitary Network. In the course of this analysis the treble paradox of surety protection is described. The article finishes with a prediction of the relevance of a dual-track strategy in this field: involving measures of sector-specific, vertical harmonisation, and a programme of common-law style, non-legislative harmonisation through judicial convergence.  相似文献   
94.
95.
There are many situations in which deception may arise and understanding the behaviors associated with it are compounded by various contexts in which it may occur. This paper sets out a coding protocol for identifying cues to deception and reports on three studies, in which deception was studied in different contexts. The contexts involved manipulating risks (i.e., probability) of being detected and reconnaissance, both of which are related to terrorist activities. Two of the studies examined the impact of changing the risks of deception detection, whilst the third investigated increased cognitive demand of duplex deception tasks including reconnaissance and deception. In all three studies, cues to deception were analyzed in relation to observable body movements and subjective impressions given by participants. In general, the results indicate a pattern of hand movement reduction by deceivers, and suggest the notion that raising the risk of detection influences deceivers’ behaviors. Participants in the higher risk condition displayed increased negative affect (found in deceivers) and tension (found in both deceivers and truth-tellers) than those in lower risk conditions.  相似文献   
96.
97.
This article uses the controversy within the United States (US) military over the use of social media by individual military professionals as a window into larger debates about the nature of information-age conflict. Information and associated technologies are now central to the US military imaginary. But the controversy over social media is one indicator that the dominant discourse of information-age conflict is neither stable nor total. The introduction of a new technology can serve as an antagonism that turns latent, potential contradictions into substantive differences for policymaking. Thus, though the US military generally has embraced information and communication technologies (ICTs), the introduction of a particular ICT can still be a source of controversy. Military imaginaries, technologies and the relationships between them remain dynamic, contingent and sometimes contentious.  相似文献   
98.
The richest neighborhoods in the unincorporated suburbs have a stronger incentive to form a new city to escape the redistribution that is occurring there. Wealthy families also may desire to establish a new city if this enables the provision of government services that middle income voters would not fund. With three different measures of household well being??based on educational attainment, income, and home values??we consistently found that the relatively wealthier neighborhoods were more likely to be part of a new city by the end of the decade. Population density also played a big role  相似文献   
99.
A growing body of evidence looks at violence and harm caused to women working in lap dancing clubs. However, little attention has been paid to the wider impact of the licensing of sex entertainment venues (SEVs) on women's sense of safety and well-being in city centres where they are concentrated. This article contributes to the debate around the licensing of lap dancing clubs and gendered harm, using testimonies from a participatory photography research project facilitated by Sara Parker. Findings support feminist arguments that women's sense of safety and wellbeing in public spaces is compromised by the widespread use of sexualised imagery of women and girls in public spaces and by the growth of SEVs such as lap dancing clubs.  相似文献   
100.
This paper presents work conducted as part the ‘Shades of Grey’ (EP/H02302X/1) research project that aims to develop scientific interventions for the detection of suspicious behaviors in public spaces. To provide an understanding of security and counter-terrorism work in different contexts the project adopted a human factors approach as part of a program of user requirements gathering exercises. These activities focussed on the needs of different end-users and stakeholders, ranging from frontline security personnel, managers and strategic security policy makers. By taking a user-centred approach, the discipline of human factors can be integrated into the security/counter-terrorism domain to support the design of practical security solutions. This paper presents a case study investigation using data collected from three security agencies. Common themes are explored, ranging from ‘the importance of temporal measures’ to ‘enhancing positive user experiences’. These factors are discussed in relation to the practical application of human factors methods within security research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号