全文获取类型
收费全文 | 414篇 |
免费 | 27篇 |
专业分类
各国政治 | 32篇 |
工人农民 | 12篇 |
世界政治 | 48篇 |
外交国际关系 | 51篇 |
法律 | 163篇 |
中国共产党 | 2篇 |
中国政治 | 10篇 |
政治理论 | 108篇 |
综合类 | 15篇 |
出版年
2023年 | 11篇 |
2022年 | 4篇 |
2021年 | 12篇 |
2020年 | 17篇 |
2019年 | 21篇 |
2018年 | 23篇 |
2017年 | 32篇 |
2016年 | 20篇 |
2015年 | 20篇 |
2014年 | 17篇 |
2013年 | 105篇 |
2012年 | 27篇 |
2011年 | 16篇 |
2010年 | 12篇 |
2009年 | 21篇 |
2008年 | 14篇 |
2007年 | 11篇 |
2006年 | 16篇 |
2005年 | 11篇 |
2004年 | 4篇 |
2003年 | 6篇 |
2002年 | 9篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有441条查询结果,搜索用时 15 毫秒
161.
LORINE A. HUGHES 《犯罪学》2013,51(4):795-832
Data from Short and Strodtbeck's ( 1965 ) study of gangs in Chicago, 1959–1962, are used to examine the association between intragang friendship networks and violent and delinquent behaviors among 248 boys from 11 different gangs (9 Black and 2 White). Contrary to expectations of tightly connected gangs being the most dangerous, estimates from multilevel overdispersed Poisson regression models showed significantly increased mean levels of violence among gangs with relatively low group cohesion. No relationship was observed between delinquency and gang cohesiveness, regardless of the specific network measure employed. At the individual level, popular boys were at a significantly increased risk for both delinquency and violence, suggesting a link between prestigious positions within the structure of gang friendship networks and conformity with group processes. The implications of these findings for detached worker intervention are discussed. 相似文献
162.
Su-Mei Ooi 《Democratization》2013,20(2):311-334
External state pressure is understood to have played a causally significant role in democratic breakthrough in Taiwan and South Korea during the 1980s. This article problematizes the international dimensions of democratization in Taiwan and South Korea by first providing a revisionist account of external agency which involved complex networks of transnational nonstate and substate actors. These included human rights activists, Christian churches and related ecumenical organizations, members of the Taiwanese and Korean diaspora communities in the US, academics and students, foreign journalists, and members of the US Congress. In forming a transnational “protection regime” during the 1970s and 1980s to protect the political opposition from repressive governments, they contributed to the development of effective democratic movements. The case studies provide us with a more comprehensive view of the international dimensions of democratization, speaking to both the country specific and general theoretical literatures on democratization at the same time. 相似文献
163.
John Stogner Bonnie S. Fisher Eric A. Stewart Christopher J. Schreck 《Women & Criminal Justice》2013,23(1):62-81
Though a large body of research has found that peer social network characteristics influence both offending and victimization, relatively little is known about the influence of social network characteristics on adolescent sexual victimization. Attractiveness and sociability largely indicate popularity for teenage females, which in turn leads to earlier onset of dating, greater dating options, and potential risk of sexual victimization—an observation not tested in the criminological and criminal justice literature. We suggest and evaluate 2 competing hypotheses: that popularity within a network insulates females from sexual victimization and that popularity may increase exposure to delinquent others and facilitate sexual victimization. Results suggest that popularity does not have a consistent effect but instead that its role is conditioned by the deviance of the network. Popularity is associated with an increase in the likelihood of victimization when peer deviance is high but with a decrease when peer deviance is low. We further demonstrate that an interaction between a female's own drinking and the proportion of her friends that are male strongly affects her likelihood of sexual victimization. Implications for policy and future research are explored. 相似文献
164.
X-chromosomal short tandem repeats (X-STRs) are very useful in complex paternity cases because they are inherited by male and female offspring in different ways. They complement autosomal STRs (as-STRs) allowing higher paternity probabilities to be attained. These probabilities are expressed in a likelihood ratio (LR). The formulae needed to calculate LR depend on the genotype combinations of suspected pedigrees. LR can also be obtained by the use of Bayesian networks (BNs). These are graphical representations of real situations that can be used to easily calculate complex probabilities. In the present work, two BNs are presented, which are designed to derive LRs for half-sisters/half-sisters and mother/daughter/paternal grandmother relationships. These networks were validated against known formulae and show themselves to be useful in other suspect pedigree situations than those for which they were developed. The BNs were applied in two paternity cases. The application of the mother/daughter/paternal grandmother BN highlighted the complementary value of X-STRs to as-STRs. The same case evaluated without the mother underlined that missing information tends to be conservative if the alleged father is the biological father and otherwise nonconservative. The half-sisters case shows a limitation of statistical interpretations in regard to high allelic frequencies. 相似文献
165.
This paper examines the structure and modus operandi of South Asian criminal organisations operating in the UK. It is based
on empirical research conducted between 2005 and 2006 among prisoners sentenced for drug offences, a number of drug distributors
operating in the market, and observers with a knowledge of the drugs business working for the police force or for rehabilitation
services. First, the paper offers an overview of the debate on organised crime, and after a methodological note, the research
findings are utilised to propose a typology. Hypotheses are formulated around the illicit drug enterprises involved in British
markets. Finally, the implications for law enforcement with respect to these enterprises are discussed.
相似文献
Vincenzo RuggieroEmail: |
166.
Denis Trček Ph.D. Habtamu Abie Ph.D. Åsmund Skomedal Ph.D. Iztok Starc B.Sc. 《Journal of forensic sciences》2010,55(6):1471-1480
Abstract: Recent trends in global networks are leading toward service‐oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top‐down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so‐called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top‐down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low‐level details. As low‐level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts on an internationally agreed “template legislation,” similarly to model law in the area of electronic commerce, which would enable harmonized national implementations in the area of digital forensics. 相似文献
167.
论食品安全国际法律规制中的软法 总被引:1,自引:0,他引:1
食品安全国际法律规制中的软法主要表现为跨政府治理网络中的国际软法和有关国际组织制定的国际软法。前者是指不同国家的食品安全政府职能部门之间以双边备忘录等形式达成的非条约性协议。后者是指专业性国际组织、区域性国际组织和国际非政府组织制定的与食品安全相关的指导建议、行动计划、原则宣言和标准等国际文件。这些没有法律约束力但具有实际效力的国际软法在食品安全国际法律规制中发挥着独特的补充和辅助功能,理应引起我们的关注。 相似文献
168.
169.
Using social network analysis (SNA), we propose a model for targeting criminal networks. The model we present here is a revised
version of our existing model (Schwartz and Rouselle in IALEIA Journal, 18(1):18–14, 2008), which itself builds on Steve Borgatti’s SNA-based key player approach. Whereas Borgatti’s approach focuses solely on actors’
network positions, our model also incorporates the relative strength or potency of actors, as well as the strength of the
relationships binding network actors.
相似文献
Tony (D.A.) Rouselle |
170.
In this paper, we propose two methods to recover damaged audio files using deep neural networks. The presented audio file recovery methods differ from the conventional file carving-based recovery method because the former restore lost data, which are difficult to recover with the latter method. This research suggests that recovery tasks, which are essential yet very difficult or very time consuming, can be automated with the proposed recovery methods using deep neural networks. We apply feed-forward and Long Short Term Memory neural networks for the tasks. The experimental results show that deep neural networks can distinguish speech signals from non-speech signals, and can also identify the encoding methods of the audio files at the level of bits. This leads to successful recovery of the damaged audio files, which are otherwise difficult to recover using the conventional file-carving-based methods. 相似文献