首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   412篇
  免费   17篇
各国政治   36篇
工人农民   16篇
世界政治   53篇
外交国际关系   30篇
法律   180篇
中国共产党   1篇
中国政治   3篇
政治理论   107篇
综合类   3篇
  2023年   1篇
  2022年   2篇
  2020年   3篇
  2019年   5篇
  2018年   16篇
  2017年   13篇
  2016年   12篇
  2015年   10篇
  2014年   11篇
  2013年   96篇
  2012年   12篇
  2011年   13篇
  2010年   15篇
  2009年   10篇
  2008年   13篇
  2007年   15篇
  2006年   12篇
  2005年   18篇
  2004年   18篇
  2003年   10篇
  2002年   13篇
  2001年   6篇
  2000年   14篇
  1999年   2篇
  1998年   12篇
  1997年   7篇
  1996年   6篇
  1995年   5篇
  1994年   9篇
  1993年   5篇
  1992年   5篇
  1991年   2篇
  1990年   3篇
  1989年   5篇
  1988年   3篇
  1987年   2篇
  1985年   7篇
  1984年   5篇
  1983年   3篇
  1982年   2篇
  1980年   3篇
  1979年   1篇
  1978年   1篇
  1975年   3篇
排序方式: 共有429条查询结果,搜索用时 15 毫秒
61.
62.
We are the middle of a global identity crisis. New notions of identity are made possible in the online world where people eagerly share their personal data and leave ‘digital footprints’. Multiple, partial identities emerge distributed across cyberspace divorced from the physical person. The representation of personal characteristics in data sets, together with developing technologies and systems for identity management, in turn change how we are identified. Trustworthy means of electronic identification is now a key issue for business, governments and individuals in the fight against online identity crime. Yet, along with the increasing economic value of digital identity, there are also risks of identity misuse by organisations that mine large data sets for commercial purposes and in some cases by governments. Data proliferation and the non-transparency of processing practices make it impossible for the individual to track and police their use. Potential risks encompass not only threats to our privacy, but also knowledge-engineering that can falsify digital profiles attributed to us with harmful consequences. This panel session will address some of the big challenges around identity in the digital age and what they mean for policy and law (its regulation and protection). Questions for discussion include: What does identity mean today? What types of legal solutions are fit for purpose to protect modern identity interests? What rights, obligations and responsibilities should be associated with our digital identities? Should identity management be regulated and who should be held liable and for what? What should be the role of private and public sectors in identity assurance schemes? What are the global drivers of identity policies? How can due process be ensured where automated technologies affect the rights and concerns of citizens? How can individuals be more empowered to control their identity data and give informed consent to its use? How are biometrics and location-tracking devices used in body surveillance changing the identity landscape?  相似文献   
63.
This study examines outcomes related to a parent representation pilot program in Travis County, Texas. Participation in the pilot program was related to earlier attorney appointment, a higher percentage of attorney presence across the life of the case, and a higher percentage of permanent outcomes for children. Parents’ percentage of presence at hearings across the life of the case was related to the child being returned home, dismissal of the juvenile dependency petition, and permanent management conservatorship. Early attorney appointment (i.e., less than 10 days from the initial hearing to full appointment) was related to permanent case outcomes.  相似文献   
64.
The prisoner's dilemma and stag hunt games, as well as the apparent benefits of collaboration, have motivated governments to promote more frequent and effective collaboration through a variety of policy approaches. Sometimes, multiple kinds of policies are applied concurrently, and yet little is understood about how these policies might interact with each other. This study uses a simulation approach to examine one such case, when policies focused on increasing collaboration competence interact with those that motivate parties to collaborate based on payoff and non‐payoff incentives. Theoretically, our findings suggest seven testable hypotheses for future, rigorous research. Practically, our initial findings suggest that increasing competency generally improves the performance of incentive‐based policies, but not always. Exhortation policies can go too far and may be more prone to doing so when the target population's competency is higher. This means that decision makers are more at risk of applying too much exhortation effort, especially if they are also concurrently applying a competency‐building approach. © 2011 by the Association for Public Policy Analysis and Management.  相似文献   
65.
66.
The linkage between trade and the environment stands out asan important challenge in global economic governance. Over thepast decade, the WTO devoted considerable attention to thisissue and included it on the agenda of the Doha Round. In parallel,the jurisprudence on trade and the environment has experiencedsignificant advances. This study provides an overview of themain institutional changes at the WTO and of the developmentsin the jurisprudence most relevant to the interaction betweenthe environment and trade. Specifically, this study focuseson General Agreement on Tariffs and Trade (GATT) Article XXand takes note of many positive (and a few negative) featuresof the key Appellate Body decisions.  相似文献   
67.
Some contemporary Just War theorists, like Jeff McMahan, have recently built upon an individual right of self-defense to articulate moral rules of war that are at odds with commonly accepted views. For instance, they argue that in principle combatants who fight on the unjust side ought to be liable to punishment on that basis alone. Also, they reject the conclusion that combatants fighting on both sides are morally equal. In this paper, I argue that these theorists overextend their self-defense analysis when it comes to the punishment of unjust combatants, and I show how in an important sense just and unjust combatants are morally equal. I contend that the individualistic and quid pro quo perspective of the self-defense analysis fails to consider properly how the international community, morally speaking, ought to treat combatants, and I set forth four elements of justice applicable to war, which, together, support the conclusion that in principle the international community should not take on the activity of punishing combatants solely for fighting on the unjust side.  相似文献   
68.
Abstract

We examined sex offender treatment dropout predictors, in particular, the relationship of psychopathy and sex offender risk to treatment dropout in a sample of 154 federally incarcerated sex offenders treated in a high intensity sex offender treatment program. Demographic, criminal history, mental health and treatment-related data as well as data on risk assessment measures including the Static 99, Violence Risk Scale – Sexual Offender version (VRS-SO), and Psychopathy Checklist – Revised (PCL-R) were collected. Logistic regression and discriminant function analyses were used to identify predictors that made significant and unique contributions to dropout among all the variables under study. The Emotional facet of Factor 1 of the PCL-R and never being married were found to be the most salient predictors of treatment dropout and correctly identified about 70% of the cases. The implications of the findings for managing treatment dropout and for the treatment of psychopathic offenders are discussed.  相似文献   
69.

Airport language is a spectacle, an interface for social relations between humans and machines. Signage intensifies social relations--reconfiguring territories of geophysical/architectural space into territories of recognition that speak to a productive power of language that is fundamentally non-representational. Airports are walked, the signs don't accompany or reflect upon the airport, they are machined into it. The traveller navigates through a highly textually mediated space where the signs not only enact semioticised territories but also directly intervene into the material machinic processes of travelling. As Guattari (1992: 49) might say, these point-signs 'don't simply secrete significations'. They activate the bringing into being of ontological universes. This paper focuses on 'signage' in a quite expanded yet also limited sense. It focuses on the increasing standardisation of the signifying semiologies of transit wayfinding systems which signal the primacy of pragmatic interactivity in the communicative event of walking the airport. If the controlling semiosis of non-places is, as Auge´ (1995) notes, the dominant space of supermodernity, then a thorough consideration of such signifying technologies would seem in order. This paper focuses on one of the most ubiquitous signs at the airport: the arrow. The airport's arrow is an asemic figure through which perhaps to read the semiotic technologies of the airport itself. The arrow is both a tool and a trope for the imperatives of global transit: it turns place into passage, striates space into controlled flows, and urges the traveller to 'move on'. It is a point sign that leads the way to a consideration of the technologies, both semiotic and a-semiotic, that provide the navigational and behavioural guidance that is increasingly in evidence, not only at the airport but in all public spaces.  相似文献   
70.
This article describes a new method for calculating judicial workload in dependency or child abuse and neglect cases. In contrast to traditional judicial workload methods, the method described herein produces estimates of judicial workload that take into account the complex role of the juvenile dependency court judge—a role that includes both on‐ and off‐the‐bench activities. The method provides workload estimates that give guidance to courts not only about the minimally sufficient judicial resources needed to accommodate current caseload needs, but also what level of judicial resources would be required to hold substantive dependency court hearings that comport with nationally recognized practice recommendations. The article reviews commonly used judicial workload methods, outlines the new method, and uses a pilot of the method as an example of how the method works in practice. Broader implications of this workload method are also discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号