首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   437篇
  免费   17篇
各国政治   12篇
工人农民   13篇
世界政治   17篇
外交国际关系   34篇
法律   155篇
中国共产党   5篇
中国政治   67篇
政治理论   59篇
综合类   92篇
  2023年   4篇
  2022年   3篇
  2021年   6篇
  2020年   11篇
  2019年   13篇
  2018年   20篇
  2017年   21篇
  2016年   15篇
  2015年   9篇
  2014年   26篇
  2013年   91篇
  2012年   32篇
  2011年   41篇
  2010年   14篇
  2009年   22篇
  2008年   12篇
  2007年   20篇
  2006年   21篇
  2005年   18篇
  2004年   11篇
  2003年   11篇
  2002年   9篇
  2001年   14篇
  2000年   5篇
  1999年   2篇
  1998年   2篇
  1989年   1篇
排序方式: 共有454条查询结果,搜索用时 31 毫秒
251.
252.
Attention-deficit hyperactivity disorder (ADHD) in witness-victim/suspect interviews holds strong relevance for policing. Four purpose-written vignettes were used to test the extent to which ADHD interviewee behaviour impacts on the work of 46 experienced Australian detectives and their ability to identify ADHD as a likely diagnosis. Detectives reported frequently encountering ADHD-type interviewees in their work; perceiving such interviewees to be at a very significant risk of future contact with the criminal justice system; and perceiving ADHD-type behaviour to exert a highly significant impact on interviewing time efficiency as well as quality. Detectives gave highly significant ratings of ADHD as a likely explanation of vignettes describing ADHD-type behaviour for witness-victims as well as suspects. However, they could not identify ADHD as the most likely explanation over and above other possibilities. Implications are discussed in terms of a rationale for future research targeting police awareness and training needs in ADHD.  相似文献   
253.
The ability to describe individual episodes of repeated events (such as ongoing abuse) can enhance children’s testimony and assist the progression of their cases through the legal system. Open-ended prompts have been advocated as a means to assist children in accurately retrieving information about individual episodes. In the current study, two subtypes of open-ended prompts (cued and general invitations) were compared for their effects on five- to nine-year-olds’ (n?=?203) reports about individual episodes of a repeated event. Interviews occurred 1–2 weeks after the last of 4 event sessions. Cued invitations assisted children to provide specific details about individual episodes of a repeated event, while general invitations were useful to elicit more broad happenings of the episodes. The accuracy of responses to general invitations was similar for children of all ages up to one week after the event, but at a longer interview delay younger children were less accurate than older children. There were no differences in the accuracy of responses to cued invitations as a function of age or interview delay. Results suggest that interviewers tasked with eliciting accounts of individual episodes from a repeated event, such as ongoing abuse, should consider the differential efficacy of each prompt-type on children’s reports.  相似文献   
254.
网络谣言几乎与群体性突发事件如影随形,贯穿于群体性突发事件的全过程,对群体性突发事件的孕育、发生、演变甚至结束都起着重要的影响。纵观近年来处置网络谣言危机的实践,我们可以发现部分地方政府部门在应对网络谣言时缺乏敏感度和预警性,缺乏舆论引导的积极性、主动性,缺乏总结反思和持续关注,不仅影响了群体性突发事件的顺利解决,甚至激化了矛盾,使事态进一步扩大。因此,政府部门必须针对网络谣言在各个阶段的不同特点,制定不同的网络谣言控制策略,增强信息的透明度,有针对性地加强对网络谣言的控制。  相似文献   
255.
本研究采用调查问卷法,对北京市某高职院校372名学生英语自我效能感与其学习策略运用情况进行调查。研究结果发现自我效能与学习策略之间呈显著的正相关关系,表明了学生的自我效能感越强,越能够有效地使用英语学习策略。此外,还对如何提高学生的英语学习自我效能,进而改善英语学习策略的使用提高英语水平提出了合理化建议。  相似文献   
256.
257.
《Patterns of Prejudice》2012,46(1):65-81
After the democratic transition to post-Communist Poland, ultraconservative groups found themselves legitimately able to propagate a nationalist ideology. They focused on an idea of ‘national identity’ that clearly and restrictively defined the boundaries of the national community. In the late 1990s a far-right movement supported by a radical faction of the Roman Catholic Church gained wide public support and, eventually, political legitimization. The fears of those for whom the transition of the socio-economic system did not bring a change for the better have been exploited by activists and institutions that consistently point to various foreign ‘threats’ (external and internal) against Poland’s political and economic independence and against national integrity. Starnawski analyses forms of anti-pluralist backlash as strategies undertaken by the ultra-conservative media. Provided is a case study of Nasz Dziennik, one of the major Polish newspapers to disseminate a far-right discourse that combines a concept of ‘national identity’ with radical Catholicism. Such nationalistoriented media use rhetoric that claims to be representative of the dominant group, and attempt to provide the audience with a restrictive sense of identity that is based on the construction of elements that are considered foreign and threatening to a sense of nationhood, a mobilization of the audience against foreign ‘threats’, and the exclusion or marginalization of elements depicted as incongruous with collective identity, especially the cultures of national and ethnic minorities (both ‘native’ minorities and recent immigrants), minority religions and alternative cultures, as well as liberal advocates of diversity. Since Polish society is in large part culturally homogeneous, its members are more often exposed to stereotyped images of minority groups than they are to face-to-face contact with members of minorities. Therefore, Starnawski argues, exploring the contemporary nationalist discourse in ‘pluralizing’ societies such as Poland is no less essential for the diagnosis of anti-democratic obstacles than studying the actual conditions of minority groups themselves. The future of social and cultural pluralism in Poland heavily depends on the majority’s awareness of diversity and its ability to promote attitudes of openness to and understanding of cultural differences on the one hand, and a readiness to extend the notion of ‘Polishness’ to a wide range of cultural and social categories on the other.  相似文献   
258.
Forensic science laboratories are being challenged by the expanding decentralization of forensic capabilities, particularly for digital traces. This study recommends laboratories undertake digital transformations to capitalize on the decentralization movement, develop a more comprehensive understanding of crime and security‐relevant problems, and play a more central role in problem‐solving collaboratively with law enforcement organizations and other stakeholders. A framework for the bilateral transfer of information and knowledge is proposed to magnify the impact of forensic science laboratories on abating crime, strengthening security, and reinforcing the criminal justice system. To accomplish digital transformations, laboratories require personnel with different expertise, including investigative reasoning, knowledge codification, data analytics, and forensic intelligence. Ultimately, this study encourages managers, educators, researchers, and policymakers to look beyond the usefulness of forensic results for solving individual investigations, and to realize the value of combined forensic knowledge and intelligence for developing broader strategies to deal with crime in digitalized society.  相似文献   
259.
This work introduces novel methods for conducting forensic analysis of file allocation traces, collectively called digital stratigraphy. These in‐depth forensic analysis methods can provide insight into the origin, composition, distribution, and time frame of strata within storage media. Using case examples and empirical studies, this paper illuminates the successes, challenges, and limitations of digital stratigraphy. This study also shows how understanding file allocation methods can provide insight into concealment activities and how real‐world computer usage can complicate digital stratigraphy. Furthermore, this work explains how forensic analysts have misinterpreted traces of normal file system behavior as indications of concealment activities. This work raises awareness of the value of taking the overall context into account when analyzing file system traces. This work calls for further research in this area and for forensic tools to provide necessary information for such contextual analysis, such as highlighting mass deletion, mass copying, and potential backdating.  相似文献   
260.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号