首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   89篇
  免费   5篇
工人农民   6篇
世界政治   5篇
外交国际关系   7篇
法律   42篇
中国政治   1篇
政治理论   31篇
综合类   2篇
  2021年   1篇
  2020年   3篇
  2019年   1篇
  2018年   3篇
  2017年   5篇
  2016年   5篇
  2015年   2篇
  2014年   3篇
  2013年   6篇
  2012年   5篇
  2011年   1篇
  2010年   5篇
  2009年   5篇
  2008年   3篇
  2007年   1篇
  2006年   2篇
  2005年   3篇
  2003年   5篇
  2002年   5篇
  2001年   4篇
  1999年   1篇
  1998年   3篇
  1997年   1篇
  1996年   2篇
  1995年   2篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1989年   2篇
  1987年   1篇
  1986年   2篇
  1984年   2篇
  1983年   2篇
  1981年   1篇
  1976年   1篇
  1975年   2篇
  1971年   1篇
排序方式: 共有94条查询结果,搜索用时 31 毫秒
61.
62.
63.
64.
65.
Information warfare represents a threat to American national security and defense. There are two general methods in which a terrorist might employ an information terrorist attack: (1) when information technology (IT) is a target, and/or (2) when IT is the tool of a larger operation. The first method would target an information system for sabotage, either electronic or physical, thus destroying or disrupting the information system itself and any information infrastructure (e.g., power, communications, etc.) dependent upon it. The second would manipulate and exploit an information system, altering or stealing data, or forcing the system to perform a function for which it was not meant (such as spoofing air traffic control). A perennial dilemma of combating terrorism in a democratic society is finding the right balance between civil liberties and civil security. The special problems associated with IT are examined. The US national security establishment needs to use a flexible, integrated response to counter information terrorists ‐ one which employs information warfare tactics tailored to counter gray‐area phenomena, but which also pools resources from ‘conventional’ counter‐terrorism and law enforcement authorities.  相似文献   
66.
Woods  Neal D. 《Publius》2006,36(2):259-276
Environmental regulation is frequently implemented through asystem that allows states to choose whether to assume primaryauthority, or "primacy," for implementation and enforcement.This study looks at what causes states to assume this authorityin two important areas of environmental policy: air and waterpollution. It finds that in each policy area, primacy assumptionis unrelated to the "greenness" of state environmental policygenerally and negatively related to indicators of policy innovationwithin that area. Rather than being driven by commitment tothe environment, primacy assumption appears to be driven predominatelyby other factors, which differ substantially across the airand water policy arenas. These findings call into question thewidely held view that primacy assumption is an indicator ofstate environmentalism and indicate that a more nuanced viewof what causes states to assume primacy is necessary to fullyunderstand the dynamics of intergovernmental policy implementation.  相似文献   
67.
The purpose of this article is to contribute to the development of a better fit between theory and methodology in judicial behavior research by reviewing, assessing, and making recommendations for the use of the latter. The methodological practice of judicial behavior research is assessed, and recommendations and projections to the future are provided. Four components of methodology—research design, data sources and generation procedures, operationalization and measurement of concepts, and statistical methods and measures—are discussed. Judicial behavior is understood to have a primary focus on the explanation of the behavior of individual decision makers, but also includes decision making within or by groups of decision makers and by courts.  相似文献   
68.
Forensic anthropologists often rely on the state of decomposition to estimate the postmortem interval (PMI) in a human remains case. The state of decomposition can provide much information about the PMI, especially when decomposition is treated as a semi-continuous variable and used in conjunction with accumulated-degree-days (ADD). This preliminary study demonstrates a supplemental method of determining the PMI based on scoring decomposition using a point-based system and taking into account temperatures in which the remains were exposed. This project was designed to examine the ways that forensic anthropologists could improve their PMI estimates based on decomposition by using a more quantitative approach. A total of 68 human remains cases with a known date of death were scored for decomposition and a regression equation was calculated to predict ADD from decomposition score. ADD accounts for approximately 80% of the variation in decomposition. This study indicates that decomposition is best modeled as dependent on accumulated temperature, not just time.  相似文献   
69.
Coding statements of criminal suspects facilitated tests of four hypotheses about differences between behavioral cues to deception and the incriminating potential (IP) of the topic. Information from criminal investigations corroborated the veracity of 337 brief utterances from 28 videotaped confessions. A four-point rating of topic IP measured the degree of potential threat per utterance. Cues discriminating true vs. false comprised word/phrase repeats, speech disfluency spikes, nonverbal overdone, and protracted headshaking. Non-lexical sounds discriminated true vs. false inthe reverse direction. Cues that distinguished IP only comprised speech speed, gesticulation amount, nonverbal animation level, soft weak vocal and “I (or we) just” qualifier. Adding “I don't know” to an answer discriminated both IP and true vs. false. The results supported hypothesis about differentiating deception cues from incriminating potential cues in high-stakes interviews, and suggested that extensive research on distinctions between stress-related cues and cues to deception would improve deception detection.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号