全文获取类型
收费全文 | 375篇 |
免费 | 22篇 |
专业分类
各国政治 | 28篇 |
工人农民 | 12篇 |
世界政治 | 48篇 |
外交国际关系 | 48篇 |
法律 | 139篇 |
中国共产党 | 2篇 |
中国政治 | 12篇 |
政治理论 | 92篇 |
综合类 | 16篇 |
出版年
2024年 | 1篇 |
2023年 | 6篇 |
2022年 | 1篇 |
2021年 | 10篇 |
2020年 | 14篇 |
2019年 | 18篇 |
2018年 | 22篇 |
2017年 | 28篇 |
2016年 | 14篇 |
2015年 | 20篇 |
2014年 | 16篇 |
2013年 | 106篇 |
2012年 | 24篇 |
2011年 | 15篇 |
2010年 | 13篇 |
2009年 | 20篇 |
2008年 | 9篇 |
2007年 | 10篇 |
2006年 | 15篇 |
2005年 | 11篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 7篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1996年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有397条查询结果,搜索用时 15 毫秒
101.
The policy debate over embryonic stem cell (ESC) research in the United States mainly focuses on the extent to which the government ought to provide resources for that research. This article addresses the strategic use of network positions to mobilize an effective coordination system for lifting the moratorium on funding of ESC under the Obama administration since March 2009. By identifying patterns of interactions between members in a network of embedded ties, we can explore the major actors who play the role of brokers or entrepreneurs in stem cell research funding policy under the Obama administration. For that, this article utilizes social network analysis and the G&F brokerage roles framework to identify key brokers in facilitating coordination among various members engaged in funding human stem cell research in the governance network. 相似文献
102.
Studies have begun to look at the potentially crucial impacts of group decentralization and inter-group global networking in accounting for the extent and severity of violence in insurgencies and terrorism. Groups may be able to survive more effectively, evade anti-terror or counter-insurgency strategies, and inflict greater damage or more civilian attacks by operating under more or less centralized leadership, or by making use of the resources of other like-minded groups scattered across borders. While some analysts have examined each of these possibilities, few if any have done so simultaneously with both structural and networking indicators or examined the joint effects of these indicators. We propose to do so in this study by combining existing datasets on terrorist structure and networks. Hypotheses and findings in prior studies have indicated that structural decentralization may lead to more civilian attacks if not more destruction since local cells are freer to act on their own, and that group size and centrality in the global terror networks lead to greater lethality and group survival rates. We re-examine such assumptions here with OLS and logit models combining these effects, and find that in addition to group size, network reach (eigenvalue centrality) rather than group interconnections per se (number of allies) appears to have primary impacts on group lethality, targeting, and survival, sometimes in conjunction with decentralized organizational structure. 相似文献
103.
In international development, shared ownership is assumed to be a condition for effectiveness. Academic studies question this relation, claiming shared ownership can instead lead to ineffectiveness. This study analysed the interplay between ownership and effectiveness in a transnational advocacy network for conflict prevention observed 2012–2015. Building on recent discussions about balancing unity and diversity in networks, this article unpacks the ownership/effectiveness relationship into three dimensions: collective identity, accountability processes and a shared advocacy message. We find that the question is not about more or less effectiveness, but about the processes shaping the meaning of effectiveness in particular institutional constellations. 相似文献
104.
Kristina Malmio 《Nora, Nordic Journal of Women's Studies》2017,25(4):247-262
AbstractIn this article, I study the journey of the Finland-Swedish author Monika Fagerholm’s (b. 1961) novel The American Girl to the pages of O, The Oprah Magazine. This event, here called “Fagerholm goes Oprah”, offers an illustrative example of the global movements of literature today, and of the ongoing negotiation of relations between local and global, the Nordic countries and the USA, minor literature and the global market. The article describes the different phases of the transmission of this novel, studies the means by which a novel from a minor body of literature transgresses its geo-linguistic position and, in this specific case, demonstrates the role of gender. In this way, the novel not only creates fictive, transnational spaces for its female characters and readers, but it also enters and contributes to a network of female agents in widely different geographical and cultural contexts. The event “Fagerholm goes Oprah” is a sign of the ongoing globalization of the literary field, but its reception also reveals the presence of an opposing tendency: the continuing significance of localization in literary exchange. All in all, the novel and its reception illustrate the many strategies used to create a connection between two different cultures, and also display the importance of various cultural currents in the transmission of the novel, such as feminism and Nordic Noir. 相似文献
105.
Anna Romanou 《Computer Law & Security Report》2018,34(1):99-110
This article examines the extent to which Privacy by Design can safeguard privacy and personal data within a rapidly evolving society. This paper will first briefly explain the theoretical concept and the general principles of Privacy by Design, as laid down in the General Data Protection Regulation. Then, by indicating specific examples of the implementation of the Privacy by Design approach, it will be demonstrated why the implementation of Privacy by Design is a necessity in a number of sectors where specific data protection concerns arise (biometrics, e-health and video-surveillance) and how it can be implemented. 相似文献
106.
民族村寨旅游开发的CCTV模式——以西双版纳"中缅第一寨"勐景来为例 总被引:8,自引:1,他引:7
民族旅游的开发是近年来旅游学术界和实践中争论较多的问题,主要围绕民族文化的保护与开发而展开。村寨旅游是民族旅游开发中一种主要的形式,本文在比较几种民族村寨开发模式的基础上,以“中缅第一寨”———勐景来的成功开发实践为案例分析,提出一种以保护开发为前提、公司起主导作用、有鲜明特色主题、村民普遍受益的多赢发展模式,即CCTV模式。 相似文献
107.
As the closed-circuit television (CCTV) security industry transitioned from analog media to digital video recorders (DVRs) with digital storage, the law enforcement community struggled with the means with which to collect the recordings. New guidelines needed to be established to determine the collection method which would be efficient as well as provide the best quality evidence from live DVRs. A test design was developed to measure, quantify, and rank the quality of acquisition methods used on live systems from DVRs typically used in digital CCTV systems. The purpose was to determine guidelines for acquiring the best quality video for investigative purposes. A test pattern which provided multiple quantifiable metrics for comparison between the methods of acquisition was used. The methods of acquisition included direct data download of the proprietary file and open file format as well as recording the video playback from the DVR via the available display monitor connections including the composite video, Video Graphics Array (VGA), and high-definition multimedia interface (HDMI). While some acquisition methods may provide the best quality evidence, other methods of acquisition are not to be discounted depending on the situation and need for efficiency. As an investigator that needs to retrieve video evidence from live digital CCTV systems, the proprietary file format, overall, provides the best quality evidence. However, depending on the circumstance and as recording technology continues to evolve, options other than the proprietary file format may provide quality that is equal to or greater than the proprietary file format. 相似文献
108.
Jerzy Sarnecki 《Journal of Quantitative Criminology》1990,6(1):31-50
This study covers all persons under the age of 20 who were suspected of having committed a crime in the Swedish city of Borlänge (approx. 50,000 inhabitants) during the years of 1975–1977. The juveniles (575 in all) were followed up during a total of 10 years. A sociometric method based on police data was developed for studying co-offending patterns. The method was validated through a smaller number of interviews with the juveniles. This study shows that a large majority of the most delinquency active juveniles was associated with a large network of delinquent relations. The stronger the connection to this network, the more substantial, serious, and long-lasting were the delinquency and other asociality. This network also seemed to be very important with regard to the reproduction of juvenile delinquency in the municipality. At the end of the follow-up period juvenile delinquency in Borlänge had basically the same character as at the beginning, even though the juveniles included in the network were, to a large extent, new. The young offenders who were central figures in the new network had successively learned their roles from the network's old members.This paper is based on results published initially in a report entitledDelinquent Networks (Sarnecki, 1986). 相似文献
109.
This study follows recent research on criminal earnings and examines the impact of underlying traits (low self-control) and personal organization features (nonredundant networking) on the criminal earnings of a sample of incarcerated offenders previously involved in market and predatory crimes. Controlling for various background factors (age, noncriminal income, lambda and costs of doing crime), both low self-control and nonredundant networking independently explain why some offenders are more successful than others in achieving higher monetary standards through crime. Although efficient, brokerage-like networking enhances market offenders' earnings, low self-control emerges as an asset for predatory offenders: the lower their self-control, the higher their criminal earnings. For market offenders, however, low self-control has no direct effect, but it does mitigate the impact of effective networking on criminal earnings. The results emerging from this study have implications for Gottfredson and Hirschi's theory of crime and the advent of a criminal network perspective. Extensions are also made toward the conventional/criminal embeddedness framework and deterrence research. 相似文献
110.
As surveillance cameras are increasingly installed, their films are often submitted as evidence of crime, but very scant detailed information such as features and clothes is obtained due to the limited camera performance. Height, however, is relatively not significantly influenced by the camera performance. This paper studied the height measurement method using images from a CCTV. The information on the height was obtained via photogrammetry, including the reference points in the photographed area and the calculation of the relationship between a 3D space and a 2D image through linear and nonlinear calibration. Using this correlation, this paper suggested the height measurement method, which projects a 3D virtual ruler onto the image. This method has been proven to offer more stable values within the range of data convergence than those of other existing methods. 相似文献