全文获取类型
收费全文 | 851篇 |
免费 | 24篇 |
专业分类
各国政治 | 28篇 |
工人农民 | 39篇 |
世界政治 | 66篇 |
外交国际关系 | 39篇 |
法律 | 439篇 |
中国政治 | 12篇 |
政治理论 | 252篇 |
出版年
2022年 | 4篇 |
2021年 | 7篇 |
2020年 | 19篇 |
2019年 | 16篇 |
2018年 | 24篇 |
2017年 | 34篇 |
2016年 | 25篇 |
2015年 | 18篇 |
2014年 | 25篇 |
2013年 | 95篇 |
2012年 | 28篇 |
2011年 | 31篇 |
2010年 | 19篇 |
2009年 | 18篇 |
2008年 | 32篇 |
2007年 | 22篇 |
2006年 | 36篇 |
2005年 | 30篇 |
2004年 | 21篇 |
2003年 | 28篇 |
2002年 | 20篇 |
2001年 | 11篇 |
2000年 | 18篇 |
1999年 | 6篇 |
1998年 | 17篇 |
1997年 | 13篇 |
1996年 | 9篇 |
1995年 | 14篇 |
1994年 | 13篇 |
1993年 | 18篇 |
1992年 | 14篇 |
1991年 | 8篇 |
1990年 | 14篇 |
1989年 | 16篇 |
1988年 | 16篇 |
1987年 | 16篇 |
1986年 | 7篇 |
1985年 | 12篇 |
1984年 | 10篇 |
1983年 | 6篇 |
1981年 | 10篇 |
1980年 | 5篇 |
1979年 | 4篇 |
1977年 | 6篇 |
1976年 | 6篇 |
1974年 | 4篇 |
1973年 | 10篇 |
1969年 | 6篇 |
1967年 | 4篇 |
1965年 | 7篇 |
排序方式: 共有875条查询结果,搜索用时 0 毫秒
181.
Sam Popple Kïrsten Way Richard Johnstone Richard Croucher Peta Miller 《Regulation & Governance》2023,17(1):234-249
Work Health and Safety Inspectors are at the forefront of efforts to protect workers from harm from psychosocial hazards, yet the application of regulatory theory to their practice has been limited. Drawing on models of responsive regulation and strategic enforcement, we analyze extensive (N = 46,348) complaint and incident notification data from an Australian Work Health and Safety Inspectorate, to compare Inspectors' responses to psychosocial versus non-psychosocial hazards. We found psychosocial hazards were less likely to be actioned than non-psychosocial hazards. When they were actioned, psychosocial hazards saw more Inspector activity, but fewer enforcement notices than non-psychosocial hazards. These findings are inconsistent with the version of responsive regulation espoused by the regulator. Our theoretical conclusion is that Weil's strategic enforcement approach is likely to offer greater possibilities for guiding future resource allocation. 相似文献
182.
183.
Sholts SB Walker PL Kuzminsky SC Miller KW Wärmländer SK 《Journal of forensic sciences》2011,56(2):333-338
Identifying group affinity from human crania is a long-standing problem in forensic and physical anthropology. Many craniofacial differences used in forensic skeletal identification are difficult to quantify, although certain measurements of the midfacial skeleton have shown high predictive value for group classifications. This study presents a new method for analyzing midfacial shape variation between different geographic groups. Three-dimensional laser scan models of 90 crania from three populations were used to obtain cross-sectional midfacial contours defined by three standard craniometric landmarks. Elliptic Fourier transforms of the contours were used to extract Fourier coefficients for statistical analysis. After cross-validation, discriminant functions based on the Fourier coefficients provided an average of 86% correct classifications for crania from the three groups. The high rate of accuracy of this method indicates its usefulness for identifying group affinities among human skeletal remains and demonstrates the advantages of digital 3D model-based analysis in forensic research. 相似文献
184.
Police notifications of incidents of domestic violence to child protection services constitute an acknowledgement of the harm that domestic violence inflicts on children. However, these notifications represent a substantial demand on child welfare services and the outcomes for children and victims of domestic violence have been questioned. This paper presents findings from the first UK study to examine these notifications in depth and examines the interface between the police and child protection services in responding to domestic violence incidents. The research reports on police interventions in 251 incidents of domestic violence involving children; the communication of information to child protection services and the subsequent filtering and service response. Social workers found that notifications conveyed little information on children's experiences of domestic violence. Forty per cent of families notified had had no previous contact with child protection services in that area, but those cases most likely to receive social work assessment or intervention were those where the case was already open. Notifications triggered a new social work intervention in only 5% of cases. The study also identified a range of innovative approaches for improving the co-ordination of police and child protective services in relation to children's exposure to domestic violence. Arrangements that maximized opportunities for police and social workers to share agency information appeared to offer the best option for achieving informed decisions about the appropriate level of service response to children and families experiencing domestic violence. 相似文献
185.
Fast‐paced IT advances have made it increasingly possible and useful for firms to collect data on their customers on an unprecedented scale. One downside of this is that firms can experience negative publicity and financial damage if their data are breached. This is particularly the case in the medical sector, where we find empirical evidence that increased digitization of patient data is associated with more data breaches. The encryption of customer data is often presented as a potential solution, because encryption acts as a disincentive for potential malicious hackers, and can minimize the risk of breached data being put to malicious use. However, encryption both requires careful data management policies to be successful and does not ward off the insider threat. Indeed, we find no empirical evidence of a decrease in publicized instances of data loss associated with the use of encryption. Instead, there are actually increases in the cases of publicized data loss due to internal fraud or loss of computer equipment. © 2011 by the Association for Public Policy Analysis and Management. 相似文献
186.
Both domestic violence and trafficking in humans pose serious problems worldwide. However, there are differences in the ways in which battered immigrant women and trafficked immigrant women are responded to by governmental agencies in Greece and in the USA. Trafficking in humans has been securitized, that is, framed as an issue linked to international security risk. As such, countries that do not take legal action to stop human trafficking could face US sanctions such as loss of United States military and economic assistance. Under significant international pressure, Greece, since 2002, passed a law that criminalized trafficking in humans and took necessary steps for providing protection and assistance to trafficked victims. Nevertheless, domestic violence and battered women remain silent in Greek society, and the availability of services to victims of domestic violence has eroded. We argue that, due to different issue framing of victims of trafficking and battered women, the connection of trafficking in humans to national security fosters different legal protection outcomes. The comparison of battered immigrant women and trafficked victims between Greece and the USA reveals significant differences in protection of battered immigrant women in the Organization for Economic Cooperation and Development (OECD) area. This article elucidates why there are public policy differences within OECD states that all grant a priority to prevention of human trafficking. 相似文献
187.
Lescano CM Brown LK Miller PM Puster KL 《Journal of prevention & intervention in the community》2007,33(1-2):51-62
The purpose of this study was to investigate the relationships among self-efficacy for condom use during distress (SE-Condom Distress), self-efficacy related to general HIV prevention skills (SE-HIV), and HIV risk behaviors, attitudes, and knowledge. Two hundred and twenty two adolescents with psychiatric disorders between 13 and 18 years-old participated. Participants completed measures related to HIV Self-Efficacy, HIV Attitudes, and Sexual Behaviors. Self-efficacy for condom use during distress (SE-Condom Distress) was significantly associated with more HIV protective behaviors. Controlling for observed covariates, SE-Condom Distress was the only variable significantly associated with consistent condom use in a multiple logistic regression (OR=2.43). Self-efficacy regarding condom use during affective arousal is closely associated with HIV-related attitudes and behaviors. Clinicians need to be alert to subtle signs of distress as adolescents contemplate safer sexual behavior. 相似文献
188.
Old J Schweers BA Boonlayangoor PW Fischer B Miller KW Reich K 《Journal of forensic sciences》2012,57(2):489-499
Abstract: Tests for the identification of semen commonly involve the microscopic visualization of spermatozoa or assays for the presence of seminal markers such as acid phosphatase (AP) or prostate‐specific antigen (PSA). Here, we describe the rapid stain identification kit for the identification of semen (RSID?‐Semen), a lateral flow immunochromatographic strip test that uses two antihuman semenogelin monoclonal antibodies to detect the presence of semenogelin. The RSID?‐Semen strip is specific for human semen, detecting <2.5 nL of semen, and does not cross‐react with other human or nonhuman tissues tested. RSID?‐Semen is more sensitive with certain forensic evidence samples containing mixtures of vaginal secretions and semen than either of the commercially available PSA‐based forensic semen detection tests or tests that measure AP activity that were tested in parallel. The RSID?‐Semen kit also allows sampling a fraction of a questioned stain while retaining the majority of the sample for further processing through short tandem repeat analysis. 相似文献
189.
Erin Miller 《Journal of Quantitative Criminology》2012,28(1):77-101
Despite considerable speculation among terrorism researchers regarding the conditions leading to organizational desistance
from terrorism, quantitative analysis of terrorism frequently focuses on terrorist attacks as the unit of analysis, resulting
in a near complete absence of analyses of terrorist organizations themselves. Moreover, research on organizations that engage
in terrorism has generally been limited to case studies of individual organizations. Toward a more general understanding of
what conditions predict organizational desistance from terrorism, this study uses newly available data from the Global Terrorism
Database to analyze the terrorist activity of 557 organizations that were active for at least 365 days between 1970 and 2008.
Much like research on conventional crime, prior research on terrorism has focused almost exclusively on the onset of criminal
behavior and has neglected determinants of declining activity. Here I use group-based trajectory models to investigate patterns
of decline in organization-level terrorist activity. In particular I examine how patterns of onset relate to patterns of decline
among these organizations. I first estimate the trajectory models for the organizations’ frequency of attacks, and then calculate
the annual ratio of attacks to attacks-at-peak for each organization in order to isolate patterns of decline, independent
of the magnitude of activity. I then repeat the trajectory analysis to determine if the relative shape of the organizational
trajectory has significance beyond the overall frequency of attacks. I find that the speed and magnitude of an organization’s
emergence are correlated with its longevity such that those organizations characterized by rapid onset are two to three times
more likely than those characterized by moderate onset to reach moderate or high levels of attacks per year. Likewise, as
the rate and overall volume of attacks at onset increase, so does the likelihood that the group will follow a persistent pattern
of decline. I conclude with a discussion of the implications of patterns of decline among terrorist organizations for research
and policy. 相似文献
190.