首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   80篇
  免费   10篇
各国政治   12篇
工人农民   1篇
世界政治   10篇
外交国际关系   3篇
法律   44篇
政治理论   20篇
  2023年   2篇
  2022年   2篇
  2020年   1篇
  2019年   4篇
  2018年   4篇
  2017年   6篇
  2016年   8篇
  2015年   3篇
  2014年   4篇
  2013年   9篇
  2011年   2篇
  2010年   1篇
  2009年   1篇
  2008年   2篇
  2007年   2篇
  2006年   4篇
  2005年   3篇
  2004年   3篇
  2003年   5篇
  2002年   2篇
  2000年   2篇
  1998年   1篇
  1997年   2篇
  1994年   1篇
  1993年   1篇
  1988年   1篇
  1986年   2篇
  1985年   1篇
  1984年   2篇
  1982年   2篇
  1980年   2篇
  1977年   2篇
  1976年   1篇
  1965年   2篇
排序方式: 共有90条查询结果,搜索用时 15 毫秒
81.
82.
83.
Andrew Gelman Department of Statistics and Department of Political Science, Columbia University, New York, NY e-mail: gelman{at}stat.columbia.edu, www.stat.columbia.edu/~gelman/ David K. Park Department of Political Science, Washington University, St. Louis, MO e-mail: dpark{at}artsci.wustl.edu Noah Kaplan Department of Political Science, University of Houston, Houston, TX e-mail: nkaplan{at}uh.edu Logistic regression models have been used in political sciencefor estimating ideal points of legislators and Supreme Courtjustices. These models present estimation and identifiabilitychallenges, such as improper variance estimates, scale and translationinvariance, reflection invariance, and issues with outliers.We address these issues using Bayesian hierarchical modeling,linear transformations, informative regression predictors, andexplicit modeling for outliers. In addition, we explore newways to usefully display inferences and check model fit.  相似文献   
84.
This study compared the ability of 30 developmentally handicapped (DH) and 30 nonhandicapped individuals in their ability to report on witnessed events. Participants watched a film clip and were asked to respond to five different types of questions about it. Misleading or leading questions were embedded in three of the question types Results indicated that in response to free recall and very general questions, DH participants did not provide as complete responses as did nonhandicapped participants, although the information provided by both groups tended to be quite accurate. Both groups, and particularly DH individuals, were less accurate in responding to more focused shortanswer recall questions. In response to correct leading specific and statement questions, requiring recognition of the information provided, DH and control participants were comparable in their performance. DH participants had greater difficulty with misleading recall questions and false leading specific and statement questions. Results are discussed in terms of optimizing eyewitness accuracy in DH individuals.  相似文献   
85.
86.
87.
88.
89.
Attachment with parents is central to a child's development. It is well established that the quality of this attachment in early childhood is a strong predictor of developmental and psychological functioning throughout the life span. One of the primary issues in custody evaluations is assessing the quality of the child's attachment to each parent and the parents' capacity to foster security and to consider what this might mean for short‐ and medium‐term decisions about their care. The nature of attachment measures is summarized, and the combined use of three attachment‐caregiving instruments in a custody evaluation is illustrated through the case of a toddler whose parents were engaged in a high‐conflict divorce. The case study demonstrates how, in addition to standard clinical observations, including a set of attachment‐based instruments with a standardized psychological test battery provided information critical to a recommendation for custody and parent visitation.  相似文献   
90.

Research Summary

This study utilized a quantitative analysis of 246 cyberattack incidents reported in the Extremist CyberCrime Database to identify significant predictors of nation-state-sponsored cyberattacks relative to those performed by non-nation-state-sponsored ideological actors. Clarke and Newman's Situational Crime Prevention framework for terrorism was used to identify differential opportunities to successfully affect targets on the basis of tools, weapons, and the ability to access targets in online settings. The analysis noted nation-state-sponsored attacks were less likely to use high-visibility attack methods and more likely to utilize attack methods leading to data breaches. In addition, they were more likely to target state governments and military entities relative to ideological actors.

Policy Implications

Nation-state attacks are more difficult to identify or mitigate while in process, requiring a more robust national cybersecurity policy framework to be implemented that moves beyond current practices. There is a need to better utilize all aspects of government, from legislation to grant funding, in order to deter cyberattacks from continuing into the future.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号