首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   530篇
  免费   16篇
各国政治   5篇
工人农民   23篇
世界政治   7篇
外交国际关系   21篇
法律   217篇
中国共产党   44篇
中国政治   60篇
政治理论   61篇
综合类   108篇
  2023年   10篇
  2022年   6篇
  2021年   5篇
  2020年   9篇
  2019年   17篇
  2018年   38篇
  2017年   8篇
  2016年   4篇
  2015年   1篇
  2014年   6篇
  2013年   30篇
  2012年   34篇
  2011年   20篇
  2010年   12篇
  2009年   19篇
  2008年   24篇
  2007年   16篇
  2006年   49篇
  2005年   28篇
  2004年   49篇
  2003年   29篇
  2002年   52篇
  2001年   37篇
  2000年   13篇
  1999年   1篇
  1998年   1篇
  1997年   2篇
  1996年   5篇
  1995年   1篇
  1992年   1篇
  1989年   6篇
  1984年   3篇
  1982年   4篇
  1981年   5篇
  1978年   1篇
排序方式: 共有546条查询结果,搜索用时 31 毫秒
131.
Gang violence creates serious safety and security concerns in the community and prisons. Treated gang and nongang members recidivated significantly less in a 24-month follow-up than their untreated matched controls. Treatment consisted of high intensity cognitive-behavioral programs that follow the risk, need, and responsivity principles (Andrews & Bonta, 2003). The treated gang members who recidivated violently after treatment received significantly shorter sentences (i.e. they committed less serious offences) than their untreated matched controls. Untreated gang members had significantly higher rates of major (but not minor) institutional offences than the other three groups. Correctional treatment that follows the risk, need and responsivity principles appears able to reduce recidivism and major institutional misconduct. Effective correctional treatment should be considered as one of the approaches in the management and rehabilitation of incarcerated gang members.  相似文献   
132.
More than 25 years of research has accumulated concerning the possible biasing effects of mugshot exposure to eyewitnesses. Two separate metaanalyses were conducted on 32 independent tests of the hypothesis that prior mugshot exposure decreases witness accuracy at a subsequent lineup. Mugshot exposure both significantly decreased proportion correct and increased the false alarm rate, the effect being greater on false alarms. A mugshot commitment effect, arising from the identification of someone in a mugshot, was a substantial moderator of both these effects. Simple retroactive interference, where the target person is not included among mugshots and no one in a mugshot is present in the subsequent lineup, did not significantly impair target identification. A third metaanalysis was conducted on 19 independent tests of the hypothesis that failure of memory for facial source or context results in transference errors. The effect size was more than twice as large for "transference" studies involving mugshot exposure in proximate temporal context with the target than for "bystander" studies with no subsequent mugshot exposure.  相似文献   
133.
The present experiment is the first empirical test of the Behaviour Analysis Interview (BAI), an interview technique developed by F. E. Inbau, J. E. Reid, J. P. Buckley, & B. C. Jayne (2001) designed to evoke different verbal and non-verbal responses from liars and truth-tellers. Inbau et al. expect liars to be less helpful than truth-tellers in investigations and to exhibit more nervous behaviours. Just the opposite predictions, however, follow from the deception literature, which notes that liars take their credibility less for granted and are therefore more aware of their responses and their impact on others. This suggests that liars' answers should be more helpful than truth-tellers' answers, and liars' non-verbal responses should appear more relaxed than truth-tellers' non-verbal responses. In the present experiment, 40 participants (undergraduate students) lied or told the truth about an event during a BAI interview. The interviews were coded according to Inbau et al.'s guidelines. The results showed that, compared to liars, truth-tellers (a) were more naive and evasive when explaining the purpose of the interview, and (b) were less likely to name someone who they felt certain did not commit the crime. Truth-tellers also exhibited more nervous behaviours. The results were consistent with the predictions of the deception literature, and directly opposed to the predictions of BAI.  相似文献   
134.
Eyewitness identification research has reliably shown that accurate identifications are faster than inaccurate identifications. Recently, D. Dunning and S. Perretta (2002) claimed that an identification latency of 10-12 s not only best discriminates between accurate and inaccurate identifications but also produces extremely high accuracy rates, approaching 90%. Consistent with predictions from recognition memory theory, however, we show that the optimum time boundary varies with overall response latency under manipulations of retention interval and nominal lineup size, and that the accuracy rate inside the optimum time boundary is much less impressive than previously reported. We outline directions for clarifying the accuracy and latency relationship to assist the reliable diagnosis of identification accuracy.  相似文献   
135.
"Network neutrality" is the shorthand for a proposed regimeof economic regulation for the Internet. Because of the trendto deliver traditional telecommunications services, as wellas new forms of content and applications, by Internet protocol(IP), a regime of network neutrality regulation would displaceor subordinate a substantial portion of existing telecommunicationsregulation. If the United States adopts network neutrality regulation,other industrialized nations probably will soon follow. As aresult of their investment to create next-generation broadbandnetworks, network operators have the ability to innovate insidethe network by offering both senders and receivers of informationgreater bandwidth and prioritization of delivery. Network neutralityregulation would, among other things, prevent providers of broadbandInternet access service (such as digital subscriber line (DSL)or cable modem service) from offering a guaranteed, expediteddelivery speed in return for the payment of a fee. The practicaleffect of banning such differential pricing (called "accesstiering" by its critics) would be to prevent the pricing ofaccess to content or applications providers according to priorityof delivery. To the extent that an advertiser of a good or servicewould be willing to contract with a network operator for advertisingspace on the network operator's affiliated content, anotherpractical effect of network neutrality regulation would be toerect a barrier to vertical integration of network operatorsinto advertising-based business models that could supplementor replace revenues earned from their existing usage-based businessmodels. Moreover, by making end-users pay for the full costof broadband access, network neutrality regulation would denybroadband access to the large number of consumers who wouldnot be able to afford, or who would not have a willingness topay for, what would otherwise be less expensive access. Forexample, Google is planning to offer broadband access to end-usersfor free in San Francisco by charging other content providersfor advertising. This product offering is evidently predicatedon the belief that many end-users demand discounted or freebroadband access that is paid for by parties other than themselves.Proponents of network neutrality regulation argue that suchrestrictions on the pricing policies of network operators arenecessary to preserve innovation on the edges of the network,as opposed to innovation within the network. However, recognizingthat network congestion and real-time applications demand somedifferential pricing according to bandwidth or priority, proponentsof network neutrality regulation would allow broadband Internetaccess providers to charge higher prices to end-users (but notcontent or applications providers) who consume more bandwidthor who seek priority delivery of certain traffic. Thus, thedebate over network neutrality is essentially a debate overhow best to finance the construction and maintenance of a broadbandnetwork in a two-sided market in which senders and receivershave additive demand for the delivery of a given piece of information—andhence additive willingness to pay. Well-established tools ofRamsey pricing from regulatory economics can shed light on whethernetwork congestion and recovery of sunk investment in infrastructureare best addressed by charging providers of content and applications,broadband users, or both for expedited delivery. Apart fromthis pricing problem, an analytically simpler component of proposednetwork neutrality regulation would prohibit a network operatorfrom denying its users access to certain websites and Internetapplications, such as voice over Internet protocol (VoIP). Althoughsome instances of blocking of VoIP have been reported, suchconduct is not a serious risk to competition. To address thisconcern, I analyze whether market forces (that is, competitionamong access providers) and existing regulatory structures aresufficient to protect broadband users. I conclude that economicwelfare would be maximized by allowing access providers to differentiateservices vis-à-vis providers of content and applicationsin value-enhancing ways and by relying on existing legal regimesto protect consumers against the exercise of market power, shouldit exist.  相似文献   
136.
Previous research on child maltreatment and adult outcomes has failed to consider affective reactions to the maltreatment, which may play a critical role in victim outcomes. One such affective reaction—shame—may help to explain this relationship. In the context of maltreatment, feelings of shame are seen as a natural extension of the helplessness experienced by many victims of child maltreatment [Finkelhor, D., and Browne, A. (1986). Initial and long-term effects: A conceptual framework. In Finkelhor, D. (ed.), A Sourcebook on Child Sexual Maltreatment, Sage, Newbury Park, CA, pp. 180–198]. The current study examined the moderating role of shame in the relationship between victim reactions to child psychological maltreatment and adult anger and depressive symptoms. Results showed that shame moderated between child psychological maltreatment and adult anger for men but not for women, whereas shame moderated between child psychological maltreatment and depressive symptoms for adult women. Presence of gender-related differences suggests that gender should be considered in the design and development of therapeutic techniques for the treatment and prevention of anger and depression in adult survivors of child psychological maltreatment.  相似文献   
137.
英国警务监督管理体制特色鲜明,基本构架简明,系统完善;为公众服务是英国警务工作奉行的价值标准;它的警务工作原则、纪律要求层次分明,约束力强。英国警务监督不仅法制全、程序清、地位高、职责明,而且运作有序,效率高。我们要借鉴英国警务监督机制中先进的理念,尽快构建适应中国警察实际的警务监督管理体系。  相似文献   
138.
从制度安排上说,我国行政执法监督体制包括权力机关监督、层级监督、司法监督和社会监督。但这些制度安排还存在不足之处,监督乏力。完善我国行政执法监督体制可考虑三种制度安排,即完善权力机关的监督,整合监督体系和改进司法监督。  相似文献   
139.
随新民 《外交评论》2006,23(2):77-83
具有很强个性化特色的周恩来外交思想以传统文化内涵的哲理、和合精神为核心,兼容并蓄了异域思想之精华。和平共处、求同存异、互谅互让、共同发展思想都内涵丰富的哲理。周恩来外交思想是历时性和共时性的统一,构建“和谐世界”理念也是周恩来外交思想时代精神的展示。周恩来外交思想既是中国的,也是世界的。  相似文献   
140.
在全国开展大练兵活动的新形势下,各地公安机关结合自身特点,探索出了很多实用的练兵方法及经验。但从各地、各警种的练兵情况看内容大同小异,还缺乏层级性,也无法达到练兵的根本要求,其原因是多方面的。为此,要建立在职民警开展大练兵长效机制:一是着眼长远、建立大练兵的科学发展观,夯实练兵基础;二是根据各警种特点,建立统一、规范的练兵标准;三是建立练兵各项制度,全面提升练兵质量;四是建立健全大练兵的激励机制。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号