首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   126篇
  免费   11篇
各国政治   1篇
工人农民   3篇
世界政治   2篇
外交国际关系   6篇
法律   72篇
中国共产党   2篇
中国政治   6篇
政治理论   14篇
综合类   31篇
  2023年   3篇
  2022年   1篇
  2020年   6篇
  2019年   2篇
  2018年   3篇
  2017年   3篇
  2016年   6篇
  2015年   3篇
  2014年   13篇
  2013年   15篇
  2012年   6篇
  2011年   8篇
  2010年   7篇
  2009年   4篇
  2008年   7篇
  2007年   8篇
  2006年   6篇
  2005年   7篇
  2004年   4篇
  2003年   4篇
  2002年   5篇
  2001年   3篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1994年   3篇
  1990年   1篇
  1988年   2篇
  1987年   1篇
排序方式: 共有137条查询结果,搜索用时 15 毫秒
131.
Abstract

Despite development in high-risk environments, many youths are resilient and do not engage in antisocial behaviour and crime. Research on human traits such as intelligence and morality, suggest that the implicit theories (ITs) people have about the controllability of their behaviour, as either fixed (entity beliefs) or malleable (incremental beliefs) may play a part in successful behavioural outcomes. Using this as a framework, the function of ITs about crime in successful adolescent development was investigated among 422 ‘at-risk’ youths. Incremental ITs of criminality were found to significantly predict less self-reported involvement in youth offending, controlling for academic attainment. Entity ITs, conversely, were associated with an increased rate of participation in deviant behaviour. Further analysis revealed that incremental ITs of criminality moderated the negative effects of associating with delinquent peers on adolescent behaviour. The results demonstrate the direct and indirect protective function of incremental ITs of criminality for youths at risk and highlight the value of investigating further the protective processes that are involved in preventing youth crime.  相似文献   
132.
Abstract

This study investigates attributions towards the perpetrator, the victim and the victim's parents in a hypothetical internet solicitation case. A community sample of 187 respondents read a vignette outlining an internet chatroom conversation between a 10-year-old girl and a 25-year-old man, followed by a depicted sexual assault, before rating 26 attribution items. Principal components analysis extracted six reliable and interpretable factors which were then subjected to a two-respondent gender×two-victim age×two-victim internet naivety×two-parental neglect between-subjects multiple analyses of variance (MANOVA). While levels of victim naivety had no impact on any measure, parents who were neglectful of their child's online activities were deemed more culpable for their child's later abuse than were parents who took an active interest in their child's activities. In general, females deemed the victim more credible than males. Implications are discussed.  相似文献   
133.
In Bilta (UK) Ltd (in liquidation) v Nazir (No 2), the Court of Appeal held that the ex turpi causa defence was inapplicable by refusing to attribute the fraud of the directors and the sole shareholder to the company in connection with the company's claim against them and third party co‐conspirators. It is significant that the court has not only clarified the law in relation to attribution, but it did so by rejecting the majority's reasoning and endorsing the dissenting judgment in the House of Lords decision in Stone & Rolls (in liquidation) v Moore Stephens (a firm). This article evaluates the decision in Bilta by critically examining the fundamental principles and policies that apply to the three distinct circumstances under which corporate attribution should or should not take place.  相似文献   
134.
Are electorally vulnerable politicians really less likely to support controversial legislation, such as pension reforms? While the literature on welfare state retrenchment has increasingly pointed to the role of electoral factors in the dynamics of social policy cutbacks, there are few studies that actually measure the magnitude of electoral pressure and its consequent impact on the politics of reform. To this end, the authors have developed a quantitative measure of the electoral vulnerability of politicians and tested its impact on pension reform outcomes using an original dataset comprising 16 Western European countries from 1980 to 2003. In line with expectations, the results show that the impact of electoral vulnerability on reform depends upon the system of interest intermediation. In corporatist systems, electoral vulnerability indeed impedes reform. But in pluralist systems, increased electoral vulnerability is associated with higher levels of reform. This is because unions in corporatist (but not in pluralist) systems can exploit electoral vulnerability in pre‐legislative bargaining, and thus pressure politicians. Consequently, this study has broader implications for the differential responsiveness of democracies to redistributive issues more generally.  相似文献   
135.
近年来,国内外学者有关南海断续线法律地位的研究,大抵集中在“历史性水域”、“历史性权利”、“海上疆域线”和“岛屿归属线”4个方面。本文通过对这4个方面的研究进行评述,认为无论从断续线产生时的历史背景,或者从目前中国政府发布的有关声明来看,把断续线的法律地位定为“岛屿归属线”还是比较符合实际,可以认可的。  相似文献   
136.
行政法关系的设定权与立法机关表达国家意志的权力是同一范畴的东西。行政法关系的设定权是能够由设定主体直接确定相关权利与义务的权力。这种权力与行政主体的一般行政管理权存在较大差别,其在我国行政法治中具有非常重要的地位。行政法关系设定权有相应的制度构设,用法律手段对这一权力加以调整。在设定权的法律调控价值上,应选择限权式价值;在设定权的法律形式上,最好能够通过一部法典将行政法关系的设定权予以规定;在设定权的主体权限上,必须以实体权限的规定为核心,形式要件以实体要件为转移;在设定权的程序规则上,必须有程序上的保障机制。  相似文献   
137.
This paper explores the struggles of China's party-state to address chronic food safety problems by adopting international best practices of risk-based regulation. Despite formally adopting risk-based approaches for targeting inspections and enforcement in 2002, implementation has been halting and uneven, as we show in the first analysis of risk-based regulation beyond its OECD heartlands. Drawing on policy document analysis and 36 key informant interviews with food business operators and government officials working on food safety regulation at every level of the state, we identify contradictions between official commitments to risk-based inspection and top-down demands for zero tolerance and strict accountability, which leave local inspectors preoccupied with avoiding blame more than reducing safety risks. Our analysis advances recent scholarship on regulatory states of the global South by highlighting how risk-based ideas, instruments, and practices are refracted through the distinctive norms and style of China's reactive regulatory state.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号