首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   414篇
  免费   27篇
各国政治   32篇
工人农民   12篇
世界政治   48篇
外交国际关系   51篇
法律   163篇
中国共产党   2篇
中国政治   10篇
政治理论   108篇
综合类   15篇
  2023年   11篇
  2022年   4篇
  2021年   12篇
  2020年   17篇
  2019年   21篇
  2018年   23篇
  2017年   32篇
  2016年   20篇
  2015年   20篇
  2014年   17篇
  2013年   105篇
  2012年   27篇
  2011年   16篇
  2010年   12篇
  2009年   21篇
  2008年   14篇
  2007年   11篇
  2006年   16篇
  2005年   11篇
  2004年   4篇
  2003年   6篇
  2002年   9篇
  2001年   2篇
  2000年   3篇
  1999年   2篇
  1998年   2篇
  1996年   1篇
  1995年   1篇
  1990年   1篇
排序方式: 共有441条查询结果,搜索用时 15 毫秒
161.
LORINE A. HUGHES 《犯罪学》2013,51(4):795-832
Data from Short and Strodtbeck's ( 1965 ) study of gangs in Chicago, 1959–1962, are used to examine the association between intragang friendship networks and violent and delinquent behaviors among 248 boys from 11 different gangs (9 Black and 2 White). Contrary to expectations of tightly connected gangs being the most dangerous, estimates from multilevel overdispersed Poisson regression models showed significantly increased mean levels of violence among gangs with relatively low group cohesion. No relationship was observed between delinquency and gang cohesiveness, regardless of the specific network measure employed. At the individual level, popular boys were at a significantly increased risk for both delinquency and violence, suggesting a link between prestigious positions within the structure of gang friendship networks and conformity with group processes. The implications of these findings for detached worker intervention are discussed.  相似文献   
162.
Su-Mei Ooi 《Democratization》2013,20(2):311-334
External state pressure is understood to have played a causally significant role in democratic breakthrough in Taiwan and South Korea during the 1980s. This article problematizes the international dimensions of democratization in Taiwan and South Korea by first providing a revisionist account of external agency which involved complex networks of transnational nonstate and substate actors. These included human rights activists, Christian churches and related ecumenical organizations, members of the Taiwanese and Korean diaspora communities in the US, academics and students, foreign journalists, and members of the US Congress. In forming a transnational “protection regime” during the 1970s and 1980s to protect the political opposition from repressive governments, they contributed to the development of effective democratic movements. The case studies provide us with a more comprehensive view of the international dimensions of democratization, speaking to both the country specific and general theoretical literatures on democratization at the same time.  相似文献   
163.
Though a large body of research has found that peer social network characteristics influence both offending and victimization, relatively little is known about the influence of social network characteristics on adolescent sexual victimization. Attractiveness and sociability largely indicate popularity for teenage females, which in turn leads to earlier onset of dating, greater dating options, and potential risk of sexual victimization—an observation not tested in the criminological and criminal justice literature. We suggest and evaluate 2 competing hypotheses: that popularity within a network insulates females from sexual victimization and that popularity may increase exposure to delinquent others and facilitate sexual victimization. Results suggest that popularity does not have a consistent effect but instead that its role is conditioned by the deviance of the network. Popularity is associated with an increase in the likelihood of victimization when peer deviance is high but with a decrease when peer deviance is low. We further demonstrate that an interaction between a female's own drinking and the proportion of her friends that are male strongly affects her likelihood of sexual victimization. Implications for policy and future research are explored.  相似文献   
164.
X-chromosomal short tandem repeats (X-STRs) are very useful in complex paternity cases because they are inherited by male and female offspring in different ways. They complement autosomal STRs (as-STRs) allowing higher paternity probabilities to be attained. These probabilities are expressed in a likelihood ratio (LR). The formulae needed to calculate LR depend on the genotype combinations of suspected pedigrees. LR can also be obtained by the use of Bayesian networks (BNs). These are graphical representations of real situations that can be used to easily calculate complex probabilities. In the present work, two BNs are presented, which are designed to derive LRs for half-sisters/half-sisters and mother/daughter/paternal grandmother relationships. These networks were validated against known formulae and show themselves to be useful in other suspect pedigree situations than those for which they were developed. The BNs were applied in two paternity cases. The application of the mother/daughter/paternal grandmother BN highlighted the complementary value of X-STRs to as-STRs. The same case evaluated without the mother underlined that missing information tends to be conservative if the alleged father is the biological father and otherwise nonconservative. The half-sisters case shows a limitation of statistical interpretations in regard to high allelic frequencies.  相似文献   
165.
This paper examines the structure and modus operandi of South Asian criminal organisations operating in the UK. It is based on empirical research conducted between 2005 and 2006 among prisoners sentenced for drug offences, a number of drug distributors operating in the market, and observers with a knowledge of the drugs business working for the police force or for rehabilitation services. First, the paper offers an overview of the debate on organised crime, and after a methodological note, the research findings are utilised to propose a typology. Hypotheses are formulated around the illicit drug enterprises involved in British markets. Finally, the implications for law enforcement with respect to these enterprises are discussed.
Vincenzo RuggieroEmail:
  相似文献   
166.
Abstract: Recent trends in global networks are leading toward service‐oriented architectures and sensor networks. On one hand of the spectrum, this means deployment of services from numerous providers to form new service composites, and on the other hand this means emergence of Internet of things. Both these kinds belong to a plethora of realms and can be deployed in many ways, which will pose serious problems in cases of abuse. Consequently, both trends increase the need for new approaches to digital forensics that would furnish admissible evidence for litigation. Because technology alone is clearly not sufficient, it has to be adequately supported by appropriate investigative procedures, which have yet become a subject of an international consensus. This paper therefore provides appropriate a holistic framework to foster an internationally agreed upon approach in digital forensics along with necessary improvements. It is based on a top‐down approach, starting with legal, continuing with organizational, and ending with technical issues. More precisely, the paper presents a new architectural technological solution that addresses the core forensic principles at its roots. It deploys so‐called leveled message authentication codes and digital signatures to provide data integrity in a way that significantly eases forensic investigations into attacked systems in their operational state. Further, using a top‐down approach a conceptual framework for forensics readiness is given, which provides levels of abstraction and procedural guides embellished with a process model that allow investigators perform routine investigations, without becoming overwhelmed by low‐level details. As low‐level details should not be left out, the framework is further evaluated to include these details to allow organizations to configure their systems for proactive collection and preservation of potential digital evidence in a structured manner. The main reason behind this approach is to stimulate efforts on an internationally agreed “template legislation,” similarly to model law in the area of electronic commerce, which would enable harmonized national implementations in the area of digital forensics.  相似文献   
167.
论食品安全国际法律规制中的软法   总被引:1,自引:0,他引:1  
食品安全国际法律规制中的软法主要表现为跨政府治理网络中的国际软法和有关国际组织制定的国际软法。前者是指不同国家的食品安全政府职能部门之间以双边备忘录等形式达成的非条约性协议。后者是指专业性国际组织、区域性国际组织和国际非政府组织制定的与食品安全相关的指导建议、行动计划、原则宣言和标准等国际文件。这些没有法律约束力但具有实际效力的国际软法在食品安全国际法律规制中发挥着独特的补充和辅助功能,理应引起我们的关注。  相似文献   
168.
169.
Using social network analysis (SNA), we propose a model for targeting criminal networks. The model we present here is a revised version of our existing model (Schwartz and Rouselle in IALEIA Journal, 18(1):18–14, 2008), which itself builds on Steve Borgatti’s SNA-based key player approach. Whereas Borgatti’s approach focuses solely on actors’ network positions, our model also incorporates the relative strength or potency of actors, as well as the strength of the relationships binding network actors.
Tony (D.A.) Rouselle
  相似文献   
170.
In this paper, we propose two methods to recover damaged audio files using deep neural networks. The presented audio file recovery methods differ from the conventional file carving-based recovery method because the former restore lost data, which are difficult to recover with the latter method. This research suggests that recovery tasks, which are essential yet very difficult or very time consuming, can be automated with the proposed recovery methods using deep neural networks. We apply feed-forward and Long Short Term Memory neural networks for the tasks. The experimental results show that deep neural networks can distinguish speech signals from non-speech signals, and can also identify the encoding methods of the audio files at the level of bits. This leads to successful recovery of the damaged audio files, which are otherwise difficult to recover using the conventional file-carving-based methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号