全文获取类型
收费全文 | 530篇 |
免费 | 16篇 |
专业分类
各国政治 | 5篇 |
工人农民 | 23篇 |
世界政治 | 7篇 |
外交国际关系 | 21篇 |
法律 | 217篇 |
中国共产党 | 44篇 |
中国政治 | 60篇 |
政治理论 | 61篇 |
综合类 | 108篇 |
出版年
2023年 | 10篇 |
2022年 | 6篇 |
2021年 | 5篇 |
2020年 | 9篇 |
2019年 | 17篇 |
2018年 | 38篇 |
2017年 | 8篇 |
2016年 | 4篇 |
2015年 | 1篇 |
2014年 | 6篇 |
2013年 | 30篇 |
2012年 | 34篇 |
2011年 | 20篇 |
2010年 | 12篇 |
2009年 | 19篇 |
2008年 | 24篇 |
2007年 | 16篇 |
2006年 | 49篇 |
2005年 | 28篇 |
2004年 | 49篇 |
2003年 | 29篇 |
2002年 | 52篇 |
2001年 | 37篇 |
2000年 | 13篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1996年 | 5篇 |
1995年 | 1篇 |
1992年 | 1篇 |
1989年 | 6篇 |
1984年 | 3篇 |
1982年 | 4篇 |
1981年 | 5篇 |
1978年 | 1篇 |
排序方式: 共有546条查询结果,搜索用时 31 毫秒
131.
Gang violence creates serious safety and security concerns in the community and prisons. Treated gang and nongang members recidivated significantly less in a 24-month follow-up than their untreated matched controls. Treatment consisted of high intensity cognitive-behavioral programs that follow the risk, need, and responsivity principles (Andrews & Bonta, 2003). The treated gang members who recidivated violently after treatment received significantly shorter sentences (i.e. they committed less serious offences) than their untreated matched controls. Untreated gang members had significantly higher rates of major (but not minor) institutional offences than the other three groups. Correctional treatment that follows the risk, need and responsivity principles appears able to reduce recidivism and major institutional misconduct. Effective correctional treatment should be considered as one of the approaches in the management and rehabilitation of incarcerated gang members. 相似文献
132.
More than 25 years of research has accumulated concerning the possible biasing effects of mugshot exposure to eyewitnesses. Two separate metaanalyses were conducted on 32 independent tests of the hypothesis that prior mugshot exposure decreases witness accuracy at a subsequent lineup. Mugshot exposure both significantly decreased proportion correct and increased the false alarm rate, the effect being greater on false alarms. A mugshot commitment effect, arising from the identification of someone in a mugshot, was a substantial moderator of both these effects. Simple retroactive interference, where the target person is not included among mugshots and no one in a mugshot is present in the subsequent lineup, did not significantly impair target identification. A third metaanalysis was conducted on 19 independent tests of the hypothesis that failure of memory for facial source or context results in transference errors. The effect size was more than twice as large for "transference" studies involving mugshot exposure in proximate temporal context with the target than for "bystander" studies with no subsequent mugshot exposure. 相似文献
133.
The present experiment is the first empirical test of the Behaviour Analysis Interview (BAI), an interview technique developed by F. E. Inbau, J. E. Reid, J. P. Buckley, & B. C. Jayne (2001) designed to evoke different verbal and non-verbal responses from liars and truth-tellers. Inbau et al. expect liars to be less helpful than truth-tellers in investigations and to exhibit more nervous behaviours. Just the opposite predictions, however, follow from the deception literature, which notes that liars take their credibility less for granted and are therefore more aware of their responses and their impact on others. This suggests that liars' answers should be more helpful than truth-tellers' answers, and liars' non-verbal responses should appear more relaxed than truth-tellers' non-verbal responses. In the present experiment, 40 participants (undergraduate students) lied or told the truth about an event during a BAI interview. The interviews were coded according to Inbau et al.'s guidelines. The results showed that, compared to liars, truth-tellers (a) were more naive and evasive when explaining the purpose of the interview, and (b) were less likely to name someone who they felt certain did not commit the crime. Truth-tellers also exhibited more nervous behaviours. The results were consistent with the predictions of the deception literature, and directly opposed to the predictions of BAI. 相似文献
134.
Eyewitness identification research has reliably shown that accurate identifications are faster than inaccurate identifications. Recently, D. Dunning and S. Perretta (2002) claimed that an identification latency of 10-12 s not only best discriminates between accurate and inaccurate identifications but also produces extremely high accuracy rates, approaching 90%. Consistent with predictions from recognition memory theory, however, we show that the optimum time boundary varies with overall response latency under manipulations of retention interval and nominal lineup size, and that the accuracy rate inside the optimum time boundary is much less impressive than previously reported. We outline directions for clarifying the accuracy and latency relationship to assist the reliable diagnosis of identification accuracy. 相似文献
135.
"Network neutrality" is the shorthand for a proposed regimeof economic regulation for the Internet. Because of the trendto deliver traditional telecommunications services, as wellas new forms of content and applications, by Internet protocol(IP), a regime of network neutrality regulation would displaceor subordinate a substantial portion of existing telecommunicationsregulation. If the United States adopts network neutrality regulation,other industrialized nations probably will soon follow. As aresult of their investment to create next-generation broadbandnetworks, network operators have the ability to innovate insidethe network by offering both senders and receivers of informationgreater bandwidth and prioritization of delivery. Network neutralityregulation would, among other things, prevent providers of broadbandInternet access service (such as digital subscriber line (DSL)or cable modem service) from offering a guaranteed, expediteddelivery speed in return for the payment of a fee. The practicaleffect of banning such differential pricing (called "accesstiering" by its critics) would be to prevent the pricing ofaccess to content or applications providers according to priorityof delivery. To the extent that an advertiser of a good or servicewould be willing to contract with a network operator for advertisingspace on the network operator's affiliated content, anotherpractical effect of network neutrality regulation would be toerect a barrier to vertical integration of network operatorsinto advertising-based business models that could supplementor replace revenues earned from their existing usage-based businessmodels. Moreover, by making end-users pay for the full costof broadband access, network neutrality regulation would denybroadband access to the large number of consumers who wouldnot be able to afford, or who would not have a willingness topay for, what would otherwise be less expensive access. Forexample, Google is planning to offer broadband access to end-usersfor free in San Francisco by charging other content providersfor advertising. This product offering is evidently predicatedon the belief that many end-users demand discounted or freebroadband access that is paid for by parties other than themselves.Proponents of network neutrality regulation argue that suchrestrictions on the pricing policies of network operators arenecessary to preserve innovation on the edges of the network,as opposed to innovation within the network. However, recognizingthat network congestion and real-time applications demand somedifferential pricing according to bandwidth or priority, proponentsof network neutrality regulation would allow broadband Internetaccess providers to charge higher prices to end-users (but notcontent or applications providers) who consume more bandwidthor who seek priority delivery of certain traffic. Thus, thedebate over network neutrality is essentially a debate overhow best to finance the construction and maintenance of a broadbandnetwork in a two-sided market in which senders and receivershave additive demand for the delivery of a given piece of informationandhence additive willingness to pay. Well-established tools ofRamsey pricing from regulatory economics can shed light on whethernetwork congestion and recovery of sunk investment in infrastructureare best addressed by charging providers of content and applications,broadband users, or both for expedited delivery. Apart fromthis pricing problem, an analytically simpler component of proposednetwork neutrality regulation would prohibit a network operatorfrom denying its users access to certain websites and Internetapplications, such as voice over Internet protocol (VoIP). Althoughsome instances of blocking of VoIP have been reported, suchconduct is not a serious risk to competition. To address thisconcern, I analyze whether market forces (that is, competitionamong access providers) and existing regulatory structures aresufficient to protect broadband users. I conclude that economicwelfare would be maximized by allowing access providers to differentiateservices vis-à-vis providers of content and applicationsin value-enhancing ways and by relying on existing legal regimesto protect consumers against the exercise of market power, shouldit exist. 相似文献
136.
Previous research on child maltreatment and adult outcomes has failed to consider affective reactions to the maltreatment, which may play a critical role in victim outcomes. One such affective reaction—shame—may help to explain this relationship. In the context of maltreatment, feelings of shame are seen as a natural extension of the helplessness experienced by many victims of child maltreatment [Finkelhor, D., and Browne, A. (1986). Initial and long-term effects: A conceptual framework. In Finkelhor, D. (ed.), A Sourcebook on Child Sexual Maltreatment, Sage, Newbury Park, CA, pp. 180–198]. The current study examined the moderating role of shame in the relationship between victim reactions to child psychological maltreatment and adult anger and depressive symptoms. Results showed that shame moderated between child psychological maltreatment and adult anger for men but not for women, whereas shame moderated between child psychological maltreatment and depressive symptoms for adult women. Presence of gender-related differences suggests that gender should be considered in the design and development of therapeutic techniques for the treatment and prevention of anger and depression in adult survivors of child psychological maltreatment. 相似文献
137.
李钢 《湖南公安高等专科学校学报》2005,17(2):89-93
英国警务监督管理体制特色鲜明,基本构架简明,系统完善;为公众服务是英国警务工作奉行的价值标准;它的警务工作原则、纪律要求层次分明,约束力强。英国警务监督不仅法制全、程序清、地位高、职责明,而且运作有序,效率高。我们要借鉴英国警务监督机制中先进的理念,尽快构建适应中国警察实际的警务监督管理体系。 相似文献
138.
周海生 《山东行政学院学报》2006,(5):68-70
从制度安排上说,我国行政执法监督体制包括权力机关监督、层级监督、司法监督和社会监督。但这些制度安排还存在不足之处,监督乏力。完善我国行政执法监督体制可考虑三种制度安排,即完善权力机关的监督,整合监督体系和改进司法监督。 相似文献
139.
具有很强个性化特色的周恩来外交思想以传统文化内涵的哲理、和合精神为核心,兼容并蓄了异域思想之精华。和平共处、求同存异、互谅互让、共同发展思想都内涵丰富的哲理。周恩来外交思想是历时性和共时性的统一,构建“和谐世界”理念也是周恩来外交思想时代精神的展示。周恩来外交思想既是中国的,也是世界的。 相似文献
140.
在全国开展大练兵活动的新形势下,各地公安机关结合自身特点,探索出了很多实用的练兵方法及经验。但从各地、各警种的练兵情况看内容大同小异,还缺乏层级性,也无法达到练兵的根本要求,其原因是多方面的。为此,要建立在职民警开展大练兵长效机制:一是着眼长远、建立大练兵的科学发展观,夯实练兵基础;二是根据各警种特点,建立统一、规范的练兵标准;三是建立练兵各项制度,全面提升练兵质量;四是建立健全大练兵的激励机制。 相似文献