全文获取类型
收费全文 | 1196篇 |
免费 | 24篇 |
专业分类
各国政治 | 34篇 |
工人农民 | 17篇 |
世界政治 | 17篇 |
外交国际关系 | 30篇 |
法律 | 404篇 |
中国共产党 | 42篇 |
中国政治 | 85篇 |
政治理论 | 72篇 |
综合类 | 519篇 |
出版年
2023年 | 4篇 |
2022年 | 25篇 |
2021年 | 32篇 |
2020年 | 50篇 |
2019年 | 13篇 |
2018年 | 20篇 |
2017年 | 7篇 |
2016年 | 15篇 |
2015年 | 15篇 |
2014年 | 55篇 |
2013年 | 95篇 |
2012年 | 72篇 |
2011年 | 81篇 |
2010年 | 73篇 |
2009年 | 92篇 |
2008年 | 87篇 |
2007年 | 93篇 |
2006年 | 84篇 |
2005年 | 56篇 |
2004年 | 74篇 |
2003年 | 65篇 |
2002年 | 48篇 |
2001年 | 39篇 |
2000年 | 18篇 |
1999年 | 4篇 |
1993年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有1220条查询结果,搜索用时 78 毫秒
911.
General Strain Theory (GST) places importance on the experience of negative emotional states resulting from exposure to stressful and/or negative events. Subsequent research has suggested that identifying strain might be contingent upon the use of objective or subjective measures of strain, and that the types of delinquent outcomes assessed might mediate the significance of the findings. Using a sample of nontraditional high school students, this study examines whether objective or subjective measures of academic strain will explain involvement in both substance use (e.g., alcohol, tobacco, and other drugs) or delinquent offending. We conclude with results and policy implications. 相似文献
912.
Christina Tikkinen-Piri Anna Rohunen Jouni Markkula 《Computer Law & Security Report》2018,34(1):134-153
The General Data Protection Regulation (GDPR) will come into force in the European Union (EU) in May 2018 to meet current challenges related to personal data protection and to harmonise data protection across the EU. Although the GDPR is anticipated to benefit companies by offering consistency in data protection activities and liabilities across the EU countries and by enabling more integrated EU-wide data protection policies, it poses new challenges to companies. They are not necessarily prepared for the changes and may lack awareness of the upcoming requirements and the GDPR's coercive measures. The implementation of the GDPR requirements demands substantial financial and human resources, as well as training of employees; hence, companies need guidance to support them in this transition. The purposes of this study were to compare the current Data Protection Directive 95/46/EC with the GDPR by systematically analysing their differences and to identify the GDPR's practical implications, specifically for companies that provide services based on personal data. This study aimed to identify and discuss the changes introduced by the GDPR that would have the most practical relevance to these companies and possibly affect their data management and usage practices. Therefore, a review and a thematic analysis and synthesis of the article-level changes were carried out. Through the analysis, the key practical implications of the changes were identified and classified. As a synthesis of the results, a framework was developed, presenting 12 aspects of these implications and the corresponding guidance on how to prepare for the new requirements. These aspects cover business strategies and practices, as well as organisational and technical measures. 相似文献
913.
Nick Pantlin 《Computer Law & Security Report》2018,34(5):1162-1165
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening ``on the ground'' at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition. 相似文献
914.
The EU General Data Protection Regulation (GDPR) devotes particular attention to the protection of personal data of children. The rationale is that children are less aware of the risks and the potential consequences of the processing of their personal data on their rights. Yet, the text of the GDPR offers little clarity as to the actual implementation and impact of a number of provisions that may significantly affect children and their rights, leading to legal uncertainty for data controllers, parents and children. This uncertainty relates for instance to the age of consent for processing children's data in relation to information society services, the technical requirements regarding parental consent in that regard, the interpretation of the extent to which profiling of children is allowed and the level of transparency that is required vis-à-vis children. This article aims to identify a number of key issues and questions – both theoretical and practical – that raise concerns from a multi-dimensional children's rights perspective, and to clarify remaining ambiguities in the run-up to the actual application of the GDPR from 25 May 2018 onwards. 相似文献
915.
With ever increasingly complex and disaggregated sourcing supply chains and in the wake of the GDPR application deadline, this article shines a spotlight on early emerging market practice in supplier contracts. 相似文献
916.
Mark Turner 《Computer Law & Security Report》2009,25(2):194-198
The regular article tracking developments at the national level in key European countries in the area of IT and communications – co-ordinated by Herbert Smith LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to compliment the Journal's feature articles and Briefing Notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition. 相似文献
917.
Mary Spooner 《Journal of family violence》2009,24(6):377-387
The English-speaking Caribbean state of Barbados enacted protection orders legislation in 1992. The goal was to protect household
members from domestic abuse inflicted by those with whom they live. To understand the impact of this policy, the study utilized
a survival analysis model to test the hypothesis that eligibility for protection orders on Barbados contributed to a significantly
lower hazard of repeat abuse for women, compared to women on St. Kitts where protection orders were not available. Data were
drawn from police reports that document incidents of domestic abuse reported on Barbados and St. Kitts where high rates of
domestic abuse persist. The study found only a negligible difference between the hazard of repeat abuse of women on St. Kitts
and women on Barbados.
相似文献
Mary SpoonerEmail: |
918.
论我国领事保护制度的内涵 总被引:1,自引:0,他引:1
领事保护制度虽然历史悠久,但其内涵一直模糊不清.围绕我国的领事实践和<中国领事保护和协助指南>,对领事保护的实施主体,权利性质、实施条件、保护对象以及保护方式进行评析.在肯定优点,指出不足和填补空白的基础上,尝试提出我国领事保护制度较为理想的内涵表述. 相似文献
919.
随着全球化趋势的加强和现代化进程的加快,非物质文化遗产正受到越来越大的冲击,甘肃省非物质文化遗产的保护工作也面临着严峻的形势。尽管甘肃省在非物质文化遗产保护方面,制定一些保护政策,开展了一系列的保护活动,但是依然存在着不少问题,本文从实例出发对存在问题和成因进行了分析,以期对保护工作有所裨益。 相似文献
920.
Repeat burglary victimisation: a tale of two theories 总被引:2,自引:0,他引:2
Shane D. Johnson 《Journal of Experimental Criminology》2008,4(3):215-240
Research consistently demonstrates that crime is spatially concentrated. Considering repeat burglary, studies conducted across
a variety of countries and for different periods of time demonstrate that events also cluster in time. Two theories have been
proposed to explain patterns of repeat victimisation. The first suggests that repeat victimisation is the consequence of a
contagion-like process. If a home has been burgled on one occasion, the risk to the home is boosted, most likely because offenders will return to exploit good opportunities further (e.g. to steal replaced items or those left
behind). In contrast, the second suggests that repeat victimisation may be explained by time-stable variation in risk across
homes and a chance process. Different offenders independently target attractive locations for which risk is flagged. Understanding the contribution of the two explanations is important for both criminological understanding and crime reduction.
Hitherto, research concerned with repeat victimisation has adopted a top-down methodology, analysing either victimisation
or offender data. In this paper, results are reported for a simple micro-simulation experiment used to examine patterns of
victimisation under conditions where the contributions of both theoretical mechanisms are varied. The findings suggest that
increasing the heterogeneity of target attractiveness can generate spatial concentrations of crime not dissimilar to those
discussed above, but that a contagion-like process is (also) required to generate the time course of repeat victimisation.
The implications of the findings are discussed.
Shane D. Johnson is a Reader at the University College London (UCL) Jill Dando Institute of Crime Science. He has a PhD and an MA in Psychology and a BSc in Computer Science. He has particular interests in the spatial and temporal distribution of crime, crime forecasting, computer simulation, evaluation methods, and design against crime. He has conducted work for a variety of sponsors, including the Arts and Humanities Research Council, the Engineering and Physical Science Research Council, and the Home Office, and he currently coordinates an international research network funded by the British Academy. He has published over 50 original research papers on a range of topics within the fields of criminology and forensic psychology in journals including the Journal of Quantitative Criminology, Criminology and Public Policy and the British Journal of Criminology. 相似文献
Shane D. JohnsonEmail: |
Shane D. Johnson is a Reader at the University College London (UCL) Jill Dando Institute of Crime Science. He has a PhD and an MA in Psychology and a BSc in Computer Science. He has particular interests in the spatial and temporal distribution of crime, crime forecasting, computer simulation, evaluation methods, and design against crime. He has conducted work for a variety of sponsors, including the Arts and Humanities Research Council, the Engineering and Physical Science Research Council, and the Home Office, and he currently coordinates an international research network funded by the British Academy. He has published over 50 original research papers on a range of topics within the fields of criminology and forensic psychology in journals including the Journal of Quantitative Criminology, Criminology and Public Policy and the British Journal of Criminology. 相似文献