全文获取类型
收费全文 | 89篇 |
免费 | 5篇 |
专业分类
工人农民 | 6篇 |
世界政治 | 5篇 |
外交国际关系 | 7篇 |
法律 | 42篇 |
中国政治 | 1篇 |
政治理论 | 31篇 |
综合类 | 2篇 |
出版年
2021年 | 1篇 |
2020年 | 3篇 |
2019年 | 1篇 |
2018年 | 3篇 |
2017年 | 5篇 |
2016年 | 5篇 |
2015年 | 2篇 |
2014年 | 3篇 |
2013年 | 6篇 |
2012年 | 5篇 |
2011年 | 1篇 |
2010年 | 5篇 |
2009年 | 5篇 |
2008年 | 3篇 |
2007年 | 1篇 |
2006年 | 2篇 |
2005年 | 3篇 |
2003年 | 5篇 |
2002年 | 5篇 |
2001年 | 4篇 |
1999年 | 1篇 |
1998年 | 3篇 |
1997年 | 1篇 |
1996年 | 2篇 |
1995年 | 2篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1989年 | 2篇 |
1987年 | 1篇 |
1986年 | 2篇 |
1984年 | 2篇 |
1983年 | 2篇 |
1981年 | 1篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1971年 | 1篇 |
排序方式: 共有94条查询结果,搜索用时 31 毫秒
61.
62.
63.
64.
65.
Matthew G. Devost Brian K. Houghton Neal Allen Pollard 《Terrorism and Political Violence》2013,25(1):72-83
Information warfare represents a threat to American national security and defense. There are two general methods in which a terrorist might employ an information terrorist attack: (1) when information technology (IT) is a target, and/or (2) when IT is the tool of a larger operation. The first method would target an information system for sabotage, either electronic or physical, thus destroying or disrupting the information system itself and any information infrastructure (e.g., power, communications, etc.) dependent upon it. The second would manipulate and exploit an information system, altering or stealing data, or forcing the system to perform a function for which it was not meant (such as spoofing air traffic control). A perennial dilemma of combating terrorism in a democratic society is finding the right balance between civil liberties and civil security. The special problems associated with IT are examined. The US national security establishment needs to use a flexible, integrated response to counter information terrorists ‐ one which employs information warfare tactics tailored to counter gray‐area phenomena, but which also pools resources from ‘conventional’ counter‐terrorism and law enforcement authorities. 相似文献
66.
Environmental regulation is frequently implemented through asystem that allows states to choose whether to assume primaryauthority, or "primacy," for implementation and enforcement.This study looks at what causes states to assume this authorityin two important areas of environmental policy: air and waterpollution. It finds that in each policy area, primacy assumptionis unrelated to the "greenness" of state environmental policygenerally and negatively related to indicators of policy innovationwithin that area. Rather than being driven by commitment tothe environment, primacy assumption appears to be driven predominatelyby other factors, which differ substantially across the airand water policy arenas. These findings call into question thewidely held view that primacy assumption is an indicator ofstate environmentalism and indicate that a more nuanced viewof what causes states to assume primacy is necessary to fullyunderstand the dynamics of intergovernmental policy implementation. 相似文献
67.
C. Neal Tate 《Political Behavior》1983,5(1):51-82
The purpose of this article is to contribute to the development of a better fit between theory and methodology in judicial behavior research by reviewing, assessing, and making recommendations for the use of the latter. The methodological practice of judicial behavior research is assessed, and recommendations and projections to the future are provided. Four components of methodology—research design, data sources and generation procedures, operationalization and measurement of concepts, and statistical methods and measures—are discussed. Judicial behavior is understood to have a primary focus on the explanation of the behavior of individual decision makers, but also includes decision making within or by groups of decision makers and by courts. 相似文献
68.
Forensic anthropologists often rely on the state of decomposition to estimate the postmortem interval (PMI) in a human remains case. The state of decomposition can provide much information about the PMI, especially when decomposition is treated as a semi-continuous variable and used in conjunction with accumulated-degree-days (ADD). This preliminary study demonstrates a supplemental method of determining the PMI based on scoring decomposition using a point-based system and taking into account temperatures in which the remains were exposed. This project was designed to examine the ways that forensic anthropologists could improve their PMI estimates based on decomposition by using a more quantitative approach. A total of 68 human remains cases with a known date of death were scored for decomposition and a regression equation was calculated to predict ADD from decomposition score. ADD accounts for approximately 80% of the variation in decomposition. This study indicates that decomposition is best modeled as dependent on accumulated temperature, not just time. 相似文献
69.
Coding statements of criminal suspects facilitated tests of four hypotheses about differences between behavioral cues to deception
and the incriminating potential (IP) of the topic. Information from criminal investigations corroborated the veracity of 337
brief utterances from 28 videotaped confessions. A four-point rating of topic IP measured the degree of potential threat per
utterance. Cues discriminating true vs. false comprised word/phrase repeats, speech disfluency spikes, nonverbal overdone,
and protracted headshaking. Non-lexical sounds discriminated true vs. false inthe reverse direction. Cues that distinguished
IP only comprised speech speed, gesticulation amount, nonverbal animation level, soft weak vocal and “I (or we) just” qualifier.
Adding “I don't know” to an answer discriminated both IP and true vs. false. The results supported hypothesis about differentiating
deception cues from incriminating potential cues in high-stakes interviews, and suggested that extensive research on distinctions
between stress-related cues and cues to deception would improve deception detection. 相似文献
70.