首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   172篇
  免费   31篇
各国政治   10篇
工人农民   13篇
世界政治   23篇
外交国际关系   8篇
法律   86篇
中国政治   2篇
政治理论   59篇
综合类   2篇
  2023年   2篇
  2022年   2篇
  2021年   2篇
  2020年   4篇
  2019年   3篇
  2018年   6篇
  2017年   16篇
  2016年   9篇
  2015年   10篇
  2014年   8篇
  2013年   24篇
  2012年   5篇
  2011年   4篇
  2010年   9篇
  2009年   5篇
  2008年   6篇
  2007年   5篇
  2006年   7篇
  2005年   3篇
  2004年   4篇
  2003年   10篇
  2002年   4篇
  2001年   5篇
  2000年   9篇
  1999年   3篇
  1998年   3篇
  1996年   2篇
  1995年   3篇
  1994年   6篇
  1993年   1篇
  1992年   4篇
  1991年   2篇
  1989年   1篇
  1988年   3篇
  1987年   2篇
  1986年   1篇
  1984年   2篇
  1978年   2篇
  1977年   1篇
  1976年   2篇
  1974年   1篇
  1973年   1篇
  1972年   1篇
排序方式: 共有203条查询结果,搜索用时 15 毫秒
101.
102.
103.
Between 1999 and 2001, I interviewed or surveyed nearly 300 Native Americans in seven states, in an effort to uncover insights into the prevalence, dynamics, and local contexts of hate crime as experienced by Native Americans living in remote, rural reservations. One of the predominant themes that emerged revolved around one of the most damaging effects of the ongoing racial harassment and violence that threatens them on a daily basis. What I have observed is that hate crime has become an institutionalized mechanism for establishing boundaries, both social and physical. It reinforces historical patterns of withdrawal and isolation, in short, segregation. Through violence, the threat of violence, or even through the malevolent gaze, Native Americans are daily reminded that there are places in which they are not welcome. For too many American Indians, the perception, if not the reality of ‘what’s out there’ has its intended effect of keeping people in their place.  相似文献   
104.
Abstract

Efforts to explain the success of the Chinese Communist revolution have preoccupied more than a few American historians and political scientists in recent years. Most of these scholars, following the trail blazed by George Taylor's The Struggle for North China, have focused attention on the War of Resistance period (1937–1945) in search of the factors responsible for the phenomenal growth in Communist power. Chalmers Johnson, with his famous thesis of “peasant nationalism,” emphasizes the importance of the Japanese invasion for rural mobilization in China. Mark Selden, by contrast, identifies the Communist Party's positive wartime policies—the “Yenan Way”—as the key to revolutionary victory. Carl Dorris, while agreeing with much of Selden's explanation, locates the source of these successful wartime policies not in the capital of Yenan, but in the guerrilla bases of North China, especially Jin-Cha-Ji.  相似文献   
105.
106.
A randomized field trial was conducted to test the effectiveness of a community-based intervention to enhance the prosocial interaction and psychological well-being of urban, Head Start parents with a history of child maltreatment. One-hundred and sixteen socially isolated parents participated. Forty of these parents had a history of child maltreatment. Maltreatment and non-maltreatment parents were assigned randomly to intervention and control conditions. The intervention involved 10 group-training sessions focusing on the relationship between stress and social support. Analyses revealed a significant main effect for the intervention group with intervention parents reporting lower levels of stress and higher levels of social activity than controls. No main effects for maltreatment status or maltreatment by intervention group interactions were found. Implications for community-based treatment were discussed.  相似文献   
107.
This article takes stock of public service motivation research to identify achievements, challenges, and an agenda for research to build on progress made since 1990. After enumerating achievements and challenges, the authors take stock of progress on extant proposals to strengthen research. In addition, several new proposals are offered, among them conducting more research on the disaggregated construct, developing grounded theory of public service motivation to understand contextual variations across cultures and political institutions, and improving current measures to better capture loyalty to governance regime as an institutional dimension of the public service motivation construct.  相似文献   
108.
Dextromethorphan (DXM) is abused most commonly among adolescents as a recreational drug to generate a dissociative experience. The objective of the study was to assess driving with and without DXM ingestion. The effects of one‐time maximum daily doses of DXM 120 mg versus a guaifenesin 400 mg dose were compared among 40 healthy subjects using a crossover design. Subjects’ ability to drive was assessed by their performance in a driving simulator (STISIM® Drive driving simulator software) and by conducting a standardized field sobriety test (SFST) administered 1‐h postdrug administration. The one‐time dose of DXM 120 mg did not demonstrate driving impairment on the STISIM® Drive driving simulator or increase SFST failures compared to guaifenesin 400 mg. Doses greater than the currently recommended maximum daily dose of 120 mg are necessary to perturb driving behavior.  相似文献   
109.
Carnivore is a surveillance technology, a software program housed in a computer unit, which is installed by properly authorized FBI agents on a particular Internet Service Provider’s (ISP) network. The Carnivore software system is used together with a tap on the ISP’s network to “intercept, filter, seize and decipher digital communications on the Internet”. The system is described as a “specialized network analyzer” that works by “sniffing” a network and copying and storing a warranted subset of its traffic. In the FBI’s own words “Carnivore chews on all data on the network, but it only actually eats the information authorized by a court order”. This article, in two parts, will provide an overview of the FBI’s Carnivore electronic surveillance system. The Carnivore software’s evolution, its ‘prey’ and the system’s relationship with Internet Service Providers will be the focus of the study. (Although the FBI’s Carnivore surveillance system is now officially called DCS1000, as the surveillance system is more commonly referred to as “Carnivore”, that term will be used throughout). Also addressed in the article are misconceptions about Carnivore, publicly available sniffer programs, Carnivore’s functionality, methods to counter Carnivore as well as the software’s limitations. In addition, the pertinent American law allowing for wiretapping and electronic surveillance as well as programs and policies outside the United States regarding electronic surveillance are surveyed, and an overview of ECHELON, the global interception and relay system, is provided. The aim is to provide the paper’s readers with a better understanding of these surveillance systems: naturally, only through an in-depth knowledge can the benefits and dangers they present for the public (government), private (individual communications users) and technical industry (ISPs) be understood.  相似文献   
110.

Objectives

Informed by situational crime prevention (SCP) this study evaluates the effectiveness of the “West Bank Barrier” that the Israeli government began to construct in 2002 in order to prevent suicide bombing attacks.

Methods

Drawing on crime wave models of past SCP research, the study uses a time series of terrorist attacks and fatalities and their location in respect to the Barrier, which was constructed in different sections over different periods of time, between 1999 and 2011.

Results

The Barrier together with associated security activities was effective in preventing suicide bombings and other attacks and fatalities with little if any apparent displacement. Changes in terrorist behavior likely resulted from the construction of the Barrier, not from other external factors or events.

Conclusions

In some locations, terrorists adapted to changed circumstances by committing more opportunistic attacks that require less planning. Fatalities and attacks were also reduced on the Palestinian side of the Barrier, producing an expected “diffusion of benefits” though the amount of reduction was considerably more than in past SCP studies. The defensive roles of the Barrier and offensive opportunities it presents, are identified as possible explanations. The study highlights the importance of SCP in crime and counter-terrorism policy.
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号