全文获取类型
收费全文 | 1282篇 |
免费 | 29篇 |
专业分类
各国政治 | 50篇 |
工人农民 | 70篇 |
世界政治 | 145篇 |
外交国际关系 | 100篇 |
法律 | 548篇 |
中国政治 | 5篇 |
政治理论 | 387篇 |
综合类 | 6篇 |
出版年
2024年 | 3篇 |
2023年 | 8篇 |
2022年 | 3篇 |
2021年 | 9篇 |
2020年 | 23篇 |
2019年 | 35篇 |
2018年 | 41篇 |
2017年 | 40篇 |
2016年 | 52篇 |
2015年 | 33篇 |
2014年 | 36篇 |
2013年 | 178篇 |
2012年 | 28篇 |
2011年 | 45篇 |
2010年 | 25篇 |
2009年 | 35篇 |
2008年 | 37篇 |
2007年 | 62篇 |
2006年 | 43篇 |
2005年 | 37篇 |
2004年 | 37篇 |
2003年 | 35篇 |
2002年 | 41篇 |
2001年 | 33篇 |
2000年 | 21篇 |
1999年 | 18篇 |
1998年 | 21篇 |
1997年 | 20篇 |
1996年 | 22篇 |
1995年 | 15篇 |
1994年 | 22篇 |
1993年 | 20篇 |
1992年 | 14篇 |
1991年 | 23篇 |
1990年 | 15篇 |
1989年 | 19篇 |
1988年 | 22篇 |
1987年 | 13篇 |
1986年 | 16篇 |
1985年 | 18篇 |
1984年 | 24篇 |
1983年 | 8篇 |
1982年 | 12篇 |
1981年 | 9篇 |
1980年 | 4篇 |
1979年 | 4篇 |
1978年 | 6篇 |
1977年 | 6篇 |
1975年 | 6篇 |
1974年 | 5篇 |
排序方式: 共有1311条查询结果,搜索用时 0 毫秒
961.
962.
Thomas J. Holt Mae Griffith Noah Turner Emily Greene-Colozzi Steven Chermak Joshua D. Freilich 《犯罪学与公共政策》2023,22(4):825-848
Research Summary
This study utilized a quantitative analysis of 246 cyberattack incidents reported in the Extremist CyberCrime Database to identify significant predictors of nation-state-sponsored cyberattacks relative to those performed by non-nation-state-sponsored ideological actors. Clarke and Newman's Situational Crime Prevention framework for terrorism was used to identify differential opportunities to successfully affect targets on the basis of tools, weapons, and the ability to access targets in online settings. The analysis noted nation-state-sponsored attacks were less likely to use high-visibility attack methods and more likely to utilize attack methods leading to data breaches. In addition, they were more likely to target state governments and military entities relative to ideological actors.Policy Implications
Nation-state attacks are more difficult to identify or mitigate while in process, requiring a more robust national cybersecurity policy framework to be implemented that moves beyond current practices. There is a need to better utilize all aspects of government, from legislation to grant funding, in order to deter cyberattacks from continuing into the future. 相似文献963.
Steven Malby 《Commonwealth Law Bulletin》2017,43(3-4):307-317
This paper examines the increasing role of technology in strengthening the rule of law and administration of justice. It considers the use of technology for supporting the drafting and public promulgation of laws, for promoting legal certainty and transparency, and for ensuring legal equality and participation. It concludes that technology offers significant potential in these areas. At the same time, careful reflection, research and piloting of the most powerful new technologies is required, in order to ensure that technology always strengthens the rule of law as the overall aim and guiding value. 相似文献
964.
965.
966.
967.
Steven N. Zane 《Justice Quarterly》2017,34(3):542-569
In recent decades, the number of juvenile defendants transferred to criminal court has increased dramatically, in large measure due to an expansion of available transfer mechanisms. While transfer traditionally occurred by judicial waiver of jurisdiction, alternatives have emerged and eclipsed judicial waiver as the primary route to adult court. The present study examines whether the mechanism of waiver—judicial, prosecutorial, or legislative—affects sentencing outcomes for juvenile defendants transferred to adult court. Results from multilevel models that control for state-level variation indicate that sentencing outcomes are inextricably tied to method of transfer. Most notably, non-criminal outcomes are most likely for cases that arrive in criminal court by legislative waiver. This suggests that legislative waiver is an ineffective means of sending juvenile offenders to criminal court, and provides some empirical support for the notion that judicial waiver is the most appropriate method of transfer. 相似文献
968.
Steven Chaplin 《Commonwealth Law Bulletin》2020,46(1):110-123
The spread of COVID-19 has not only placed strains on public health and the economy. It has presented challenges to the constitutional structure and the continuing requirement that parliaments within the Westminister system of government be able to operate. In such systems, the continued legitimacy of government action and accountability for those actions rests and must remain with the elected chamber of Parliament. At the same time, COVID-19 precludes normal gatherings of parliamentarians for proceedings. This article briefly explores the constitutional necessity for continued parliamentary scrutiny, the various forms such proceedings have taken to date and the application of parliamentary privilege to such proceedings. 相似文献
969.
W. John Monopoli Samantha M. Margherio Steven W. Evans Joe Xiang Megan A. Brickner Joshua M. Langberg 《Journal of school violence》2020,19(2):234-247
ABSTRACTYouth with ADHD are more at-risk for peer victimization than their typically developing peers, and may not be benefiting from current interventions. Thus, we sought to examine risk (i.e., anxiety, depression, and forms of aggression) and protective (i.e., social skills and social acceptance) factors for peer victimization in this group. Participants were 123 young adolescents diagnosed with ADHD, who were attending grades six through eight. We found that relational aggression (i.e., excluding others from activities) and anxiety symptoms were among the strongest risk factors for victimization. Anxiety symptoms were associated with victimization over and above depressive symptoms. Social acceptance buffered risk conferred by the risk factors. Future work is needed to investigate the degree to which the relations among internalizing symptoms and victimization differ in youth with ADHD relative to typically developing youth, and assess causality of the relations. 相似文献
970.
In order to move beyond the existing push/pull framework to understand disengagement, we apply a systematic coding scheme derived from Mayer and colleagues' integrative model of organizational trust to examine why people leave extremist groups. In doing so, we also rely on in-depth life history interviews with twenty former left- and right-wing extremists to examine whether antecedents of distrust vary between the two groups. Findings suggest substantial similarities and important differences between left- and right-wing extremists' decision to leave. In particular, perceptions of poor planning and organization, low-quality personnel and vindictive behavior generate perceptions of organizational distrust and disillusionment. Although findings from the current study are based on a relatively small sample, notable similarities were identified between both groups regarding sources of distrust (e.g., leaders, group members). We also identified differences regarding the role of violence in weakening solidarity and nurturing disillusionment with extremist activities. We conclude this article with suggestions for future research that extend the study of terrorism and that may have significance for how practitioners address countering violent extremism initiatives. 相似文献