首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   790篇
  免费   24篇
各国政治   23篇
工人农民   37篇
世界政治   64篇
外交国际关系   38篇
法律   413篇
中国政治   12篇
政治理论   227篇
  2022年   4篇
  2021年   6篇
  2020年   17篇
  2019年   16篇
  2018年   22篇
  2017年   29篇
  2016年   24篇
  2015年   16篇
  2014年   23篇
  2013年   89篇
  2012年   26篇
  2011年   30篇
  2010年   18篇
  2009年   15篇
  2008年   22篇
  2007年   19篇
  2006年   32篇
  2005年   29篇
  2004年   21篇
  2003年   27篇
  2002年   19篇
  2001年   11篇
  2000年   15篇
  1999年   6篇
  1998年   16篇
  1997年   13篇
  1996年   7篇
  1995年   12篇
  1994年   13篇
  1993年   18篇
  1992年   14篇
  1991年   6篇
  1990年   14篇
  1989年   16篇
  1988年   16篇
  1987年   16篇
  1986年   7篇
  1985年   11篇
  1984年   10篇
  1983年   6篇
  1981年   9篇
  1980年   5篇
  1979年   4篇
  1977年   6篇
  1976年   6篇
  1974年   4篇
  1973年   9篇
  1969年   6篇
  1967年   4篇
  1965年   7篇
排序方式: 共有814条查询结果,搜索用时 46 毫秒
171.
Police notifications of incidents of domestic violence to child protection services constitute an acknowledgement of the harm that domestic violence inflicts on children. However, these notifications represent a substantial demand on child welfare services and the outcomes for children and victims of domestic violence have been questioned. This paper presents findings from the first UK study to examine these notifications in depth and examines the interface between the police and child protection services in responding to domestic violence incidents. The research reports on police interventions in 251 incidents of domestic violence involving children; the communication of information to child protection services and the subsequent filtering and service response. Social workers found that notifications conveyed little information on children's experiences of domestic violence. Forty per cent of families notified had had no previous contact with child protection services in that area, but those cases most likely to receive social work assessment or intervention were those where the case was already open. Notifications triggered a new social work intervention in only 5% of cases. The study also identified a range of innovative approaches for improving the co-ordination of police and child protective services in relation to children's exposure to domestic violence. Arrangements that maximized opportunities for police and social workers to share agency information appeared to offer the best option for achieving informed decisions about the appropriate level of service response to children and families experiencing domestic violence.  相似文献   
172.
Fast‐paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. However, encryption both requires careful data management policies to be successful and does not ward off the insider threat. Indeed, we find no empirical evidence of a decrease in publicized instances of data loss associated with the use of encryption. Instead, there are actually increases in the cases of publicized data loss due to internal fraud or loss of computer equipment. © 2011 by the Association for Public Policy Analysis and Management.  相似文献   
173.
Both domestic violence and trafficking in humans pose serious problems worldwide. However, there are differences in the ways in which battered immigrant women and trafficked immigrant women are responded to by governmental agencies in Greece and in the USA. Trafficking in humans has been securitized, that is, framed as an issue linked to international security risk. As such, countries that do not take legal action to stop human trafficking could face US sanctions such as loss of United States military and economic assistance. Under significant international pressure, Greece, since 2002, passed a law that criminalized trafficking in humans and took necessary steps for providing protection and assistance to trafficked victims. Nevertheless, domestic violence and battered women remain silent in Greek society, and the availability of services to victims of domestic violence has eroded. We argue that, due to different issue framing of victims of trafficking and battered women, the connection of trafficking in humans to national security fosters different legal protection outcomes. The comparison of battered immigrant women and trafficked victims between Greece and the USA reveals significant differences in protection of battered immigrant women in the Organization for Economic Cooperation and Development (OECD) area. This article elucidates why there are public policy differences within OECD states that all grant a priority to prevention of human trafficking.  相似文献   
174.
The purpose of this study was to investigate the relationships among self-efficacy for condom use during distress (SE-Condom Distress), self-efficacy related to general HIV prevention skills (SE-HIV), and HIV risk behaviors, attitudes, and knowledge. Two hundred and twenty two adolescents with psychiatric disorders between 13 and 18 years-old participated. Participants completed measures related to HIV Self-Efficacy, HIV Attitudes, and Sexual Behaviors. Self-efficacy for condom use during distress (SE-Condom Distress) was significantly associated with more HIV protective behaviors. Controlling for observed covariates, SE-Condom Distress was the only variable significantly associated with consistent condom use in a multiple logistic regression (OR=2.43). Self-efficacy regarding condom use during affective arousal is closely associated with HIV-related attitudes and behaviors. Clinicians need to be alert to subtle signs of distress as adolescents contemplate safer sexual behavior.  相似文献   
175.
Abstract: Tests for the identification of semen commonly involve the microscopic visualization of spermatozoa or assays for the presence of seminal markers such as acid phosphatase (AP) or prostate‐specific antigen (PSA). Here, we describe the rapid stain identification kit for the identification of semen (RSID?‐Semen), a lateral flow immunochromatographic strip test that uses two antihuman semenogelin monoclonal antibodies to detect the presence of semenogelin. The RSID?‐Semen strip is specific for human semen, detecting <2.5 nL of semen, and does not cross‐react with other human or nonhuman tissues tested. RSID?‐Semen is more sensitive with certain forensic evidence samples containing mixtures of vaginal secretions and semen than either of the commercially available PSA‐based forensic semen detection tests or tests that measure AP activity that were tested in parallel. The RSID?‐Semen kit also allows sampling a fraction of a questioned stain while retaining the majority of the sample for further processing through short tandem repeat analysis.  相似文献   
176.
Despite considerable speculation among terrorism researchers regarding the conditions leading to organizational desistance from terrorism, quantitative analysis of terrorism frequently focuses on terrorist attacks as the unit of analysis, resulting in a near complete absence of analyses of terrorist organizations themselves. Moreover, research on organizations that engage in terrorism has generally been limited to case studies of individual organizations. Toward a more general understanding of what conditions predict organizational desistance from terrorism, this study uses newly available data from the Global Terrorism Database to analyze the terrorist activity of 557 organizations that were active for at least 365 days between 1970 and 2008. Much like research on conventional crime, prior research on terrorism has focused almost exclusively on the onset of criminal behavior and has neglected determinants of declining activity. Here I use group-based trajectory models to investigate patterns of decline in organization-level terrorist activity. In particular I examine how patterns of onset relate to patterns of decline among these organizations. I first estimate the trajectory models for the organizations’ frequency of attacks, and then calculate the annual ratio of attacks to attacks-at-peak for each organization in order to isolate patterns of decline, independent of the magnitude of activity. I then repeat the trajectory analysis to determine if the relative shape of the organizational trajectory has significance beyond the overall frequency of attacks. I find that the speed and magnitude of an organization’s emergence are correlated with its longevity such that those organizations characterized by rapid onset are two to three times more likely than those characterized by moderate onset to reach moderate or high levels of attacks per year. Likewise, as the rate and overall volume of attacks at onset increase, so does the likelihood that the group will follow a persistent pattern of decline. I conclude with a discussion of the implications of patterns of decline among terrorist organizations for research and policy.  相似文献   
177.
178.
179.
180.
The Middle East is one of the most war-prone regions in the international system. What is the most powerful explanation of the war-propensity of this region? I argue that neither realism nor liberalism are able to account for variations in regional war-proneness. Instead, I advance an alternative explanation based on the concept of the state-to-nation balance in the region. This balance refers to the degree of congruence between the division of the region into territorial states and the national aspirations and political identifications of the region's peoples. The balance also refers to the prevalence of strong versus weak states in the region. Thus, I explain the Middle East's high war-proneness by focusing on its relatively low level of state-to-nation balance. This imbalance has led to a powerful combination of revisionist ideologies and state incoherence. While other regions suffer from state incoherence, powerful revisionist nationalist forces, notably pan-nationalist and irredentists (the “Greater State”), aggravate this problem in the Middle East. These revisionist forces are often transborder and are especially powerful in the Middle East because of the high degree of external/transborder incongruence in comparison with all other regions. The combination of nationalist revisionism and state incoherence has made the Middle East more prone to violence than most other regions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号