首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   372篇
  免费   30篇
各国政治   7篇
工人农民   5篇
世界政治   3篇
外交国际关系   20篇
法律   202篇
中国共产党   2篇
中国政治   37篇
政治理论   54篇
综合类   72篇
  2024年   1篇
  2023年   12篇
  2022年   3篇
  2021年   4篇
  2020年   15篇
  2019年   18篇
  2018年   16篇
  2017年   14篇
  2016年   22篇
  2015年   9篇
  2014年   15篇
  2013年   29篇
  2012年   20篇
  2011年   22篇
  2010年   32篇
  2009年   25篇
  2008年   18篇
  2007年   19篇
  2006年   24篇
  2005年   18篇
  2004年   21篇
  2003年   12篇
  2002年   11篇
  2001年   4篇
  2000年   3篇
  1998年   3篇
  1997年   2篇
  1996年   2篇
  1995年   1篇
  1994年   3篇
  1990年   1篇
  1988年   1篇
  1985年   2篇
排序方式: 共有402条查询结果,搜索用时 15 毫秒
91.
评价尺度偏差是政治学评价类题目中常见的测量误差,“虚拟情境锚定法”被认为是一种降低此类误差的方法。本文依托北京大学中国国情研究中心2009年全国公民意识调查,在其中加入了一组采用“虚拟情境锚定法”测量外部政治效能感的题目来跟传统的效能感测量方法进行比较,实验结果发现:(1)运用传统效能感测量方法时,高效能感的比例为30.64%,而使用“虚拟情境锚定法”后,高效能感的比例占到了46.91%,这就验证了评价尺度偏差的存在。(2)效度检验发现“虚拟情境锚定法”得到具有更好建构效度的测量结果,从而验证了评价尺度偏差对测量质量的影响。通过实验对题目设计提出建议:(1)控制评价尺度偏差的基本思路是遵循测量指标设计上的具体化、标准化和高可比性原则。(2)对于能采取具体方式提问的变量,就要避免抽象题目;对于能用事实性问题测量的变量,就要避免态度性测量。(3)在测量问题选项的尺度设计上,要避免评价方向不一致,应尽可能地理顺一致的量尺向度.规避尺度不等距的问题。  相似文献   
92.
This paper focuses on methodological aspects of Voting Advice Application (VAA) research. Self-selection into the treatment and self-selection into the sample need to be controlled for if the aim is to deduce causal effects from VAA use in observational data. This paper outlines omnipresent endogeneity issues, partly imposed through unobserved factors that affect both whether individuals use VAAs and their subsequent electoral behavior. Some research on VAAs has acknowledged the problems associated with selection biases, but practically none have taken steps towards improving these shortcomings. This paper introduces various approaches for handling selection biases and applies them to VAA data from Switzerland. These methodological considerations are of outmost importance for the relevance and validity of VAA research.  相似文献   
93.
Forensic personnel generally use basic all-metal detectors for weapon searches because of their ease of use and cost efficiency. For ferromagnetic targets, an alternative easy to use and low-cost geophysical tool is a magnetic locator. The following study was designed to demonstrate the effectiveness of a common, commercially available magnetic locator in forensic weapon searches by determining the maximum depth of detection for 32 metallic forensic targets and testing the effects of metallic composition on detection. Maximum depth of detection was determined for 16 decommissioned street-level firearms, six pieces of assorted scrap metals, and 10 blunt or bladed weapons by burying each target at 5-cm intervals until the weapons were no longer detected. As expected, only ferromagnetic items were detected; weapons containing both ferromagnetic and nonferromagnetic components were generally detected to shallower depths. Overall, the magnetic locator can be a useful addition to weapon searches involving buried ferromagnetic weapons.  相似文献   
94.
Is Google in its quest for search engine optimization through the creation of new technologies, which not only improves its search algorithms but also refines its search functions for users, doing it in a manner that makes it a perpetrator of primary copyright infringement or an invaluable facilitator for Internet functionality? How should the balance of interests in the treatment of creative works be recalibrated in the face of changes in search engine technology and operations, and the disputes that have arisen within the last decade in the context of the digital age and its needs? Using Google as a case study, this paper will look at the two main areas of dispute over the operations of information locator tools and services that either threatens search engine functionality and efficiency or weakens copyright holders’ exclusive rights. It proposes a concerted set of solutions through a reassessment and amendment of copyright law to optimize the social benefits and objectives of both the copyright regime and technological innovations in the electronic model of information archiving, indexing and delivery. A fair distribution of responsibilities and allocation of rights and liabilities will be suggested. In the process, due consideration will be given to both public and private interests, with the former taking precedence; while the recommended solutions will be made within the currently outdated framework for Internet intermediary protection (i.e. safe harbor laws) and exceptions (i.e. specific statutory exemptions and the general fair use defense) under the existing copyright regime. Thus, the proposed changes will be far reaching without being too radical a departure from current law, an evolution that will likely be more acceptable and realistic a solution to the problem.This paper is published in two parts. Part One of this paper will deal with the challenges to the copyright regime posed by the operations and technology behind the Google Images Search Engine, while Part Two that will be published in the subsequent edition of the CLSR will assess the benefits of the Google Books Search Project vis-à-vis the effects it will have on the scope of copyright protection. Recommendations are made to copyright law to accommodate both functions while generally preserving the main objectives of copyright protection.  相似文献   
95.
基于工作搜寻理论的大学毕业生就业问题研究   总被引:1,自引:0,他引:1  
本文通过对首都经济贸易大学2009年应届大学毕业生的问卷调查,分析了高校毕业生在就业过程中的工作搜寻途径、就业信息获取评价、就业歧视等问题,最后提出促进大学生就业的对策和建议。  相似文献   
96.
余凌云 《北方法学》2011,5(5):87-99
盘查是在宪法规定的迁徙自由的情境下产生的一种警察应对措施。赋予警察盘查权,实现了从"静态执法"向"动态执法"的转变,增加了警察执法的机动性、灵活性和应变能力,适应了由计划经济向市场经济转轨之后社会治安形势发生的变化与要求。对盘查的控制,主要通过程序来完成。这是盘查的随机性、及时性、合成性等属性使然。一方面,要充分发挥程序对相对人权益的保障作用,另一方面,程序也不能过于繁琐、影响行政效率。而对于相对人的协助义务,无论是国内还是国外尚无定论,是亟待理论进一步回应、有待实践努力解决的一个重要问题。  相似文献   
97.
基于计算机和互联网的犯罪案件急剧增长,由此形成的电子证据给诉讼中的证明提出了挑战。刑诉法修正案将电子证据增加为一种证据种类,但是,电子证据的收集与认证与传统证据既有相同之处又存在着很多的不同。电子证据的保护、搜查扣押、实时收集与鉴证等是传统调查方式无法取代的,也不能完全使用传统方法进行。依靠电子证据定案既要追求客观真相、依靠科学的证明,又要遵循既定的程序性规则,从而对电子证据的证明能力和证明力进行判断。  相似文献   
98.
论网络隐私权保护的现实困境及决策应对   总被引:1,自引:0,他引:1  
随着《侵权责任法》被列为2009年重点立法项目,网络隐私权保护的问题再次摆在了立法者的面前。有效保护公民的网络隐私权,需要法律法规、主管部门规定、伦理道德等外在因素予以支持,同时也需要网络用户和网络服务提供者等网络活动参与者的配合。针对保护网络隐私权遭遇的现实困境,我国保护措施的不足,应从侵权责任主体出发,从他律、道德内化以及自律三方面进行突破,寻求解决路径。  相似文献   
99.
作为一种无令状搜查,同意搜查由于缺乏事前的司法审查,侦查人员极易利用其启动的宽松条件规避法律的限制,在司法监督缺位的情况下侵犯公民的基本权利。因此,须确立并完善适合中国国情的同意搜查制度。  相似文献   
100.
Abstract: This study was conducted to assess if fingerprint specialists could be influenced by extraneous contextual information during a verification process. Participants were separated into three groups: a control group (no contextual information was given), a low bias group (minimal contextual information was given in the form of a report prompting conclusions), and a high bias group (an internationally recognized fingerprint expert provided conclusions and case information to deceive this group into believing that it was his case and conclusions). A similar experiment was later conducted with laypersons. The results showed that fingerprint experts were influenced by contextual information during fingerprint comparisons, but not towards making errors. Instead, fingerprint experts under the biasing conditions provided significantly fewer definitive and erroneous conclusions than the control group. In contrast, the novice participants were more influenced by the bias conditions and did tend to make incorrect judgments, especially when prompted towards an incorrect response by the bias prompt.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号