首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9篇
  免费   1篇
工人农民   2篇
世界政治   1篇
法律   7篇
  2023年   1篇
  2018年   1篇
  2017年   1篇
  2008年   2篇
  2007年   1篇
  1995年   1篇
  1993年   2篇
  1975年   1篇
排序方式: 共有10条查询结果,搜索用时 15 毫秒
1
1.
2.
Research has demonstrated that pilots contain multiple shifting purposes, not all of which relate to simple policy testing or refinement. Judging the success of policy pilots is therefore complex, requiring more than a simple judgment against declared goals. Marsh and McConnell provide a framework against which policy success can be judged, distinguishing program success from process and political success. We adapt Boven's modification of this framework and apply it to policy pilots, arguing that pilot process, outcomes and longer-term effects can all be judged in both program and political terms. We test this new framework in a pilot program in the English National Health Service, the Vanguard program, showing how consideration of these different aspects of success sheds light on the program and its aftermath. We consider the implications of the framework for the comprehensive and multifaceted evaluation of policy pilots.  相似文献   
3.
Ample research exists on the relationship between mainstream constructions of racialized images and perceptions of criminals. Fewer studies, however, have assessed the influence of political rhetoric in the construction and the mobilization of images of criminals as the “racial other.” This study employs a qualitative content analysis guided by an intersectionality framework to answer the questions: to what extent Presidential rhetoric influenced images of criminals; and how was colorblind language used to facilitate this process? The examination of Presidential speeches related to crime policies, given from 1969 to 1996, revealed that criminal activity was primarily articulated as being committed by “young Black impoverished males.” Through the use of colorblind strategies, race, while not explicitly referenced, was the most salient dimension of the imagery of criminals depicted in Presidential rhetoric.  相似文献   
4.
Participants (n = 36) with consistent Pre-conformist ego development levels during multiple adolescent assessments were studied to determine whether and how their ego levels had changed at age 25. Those (n = 12) whose ego levels remained at the Pre-conformist level were assigned to a life-course-persistent profound ego development arrest trajectory group; those (n = 24) whose ego levels reached the Conformist or Post-conformist level at age 25 were assigned to an adolescence-limited profound ego development arrest trajectory group. Analysis of predictors and age 25 correlates of group membership revealed that selected age 14 family interaction behaviors differentiated the two groups. At age 25, members of the adolescence-limited group showed superior performance on several measures of interpersonal and intrapersonal functioning.
Stuart T. HauserEmail:
  相似文献   
5.
This study examined whether reinforcement can induce children to falsely incriminate themselves. Ninety-nine children in kindergarten through third grade were questioned regarding the staged theft of a toy. Half received reinforcement for self-incriminating responses. Within 4 min reinforced children made 52% false admissions of guilty knowledge concerning the theft, and 30% false admissions of having witnessed it. Corresponding figures for controls were 36 and 10%. Twelve percent of children admitted to participating in the theft, but the effect of reinforcement was only marginally significant. The findings indicate that reinforcement can induce children to falsely implicate themselves in wrongdoing.  相似文献   
6.
7.
8.
On July 2, 1984, the first ZapMail message was sent from Federal Express chairman Frederick W. Smith to six members of FedEx's corporate board of directors in separate cities across the country (Zemke 1986). It worked. However, by late September 1986, after suffering over $300 million in operating losses, Federal Express decided it didn't (Keller and Wilson 1986). Why? This postmortem of ZapMail draws on management and innovation theory and research, as well as historical accounts of communication technology development and market conditions from 1984 through 1986, to analyze the failure of FedEx's once-promising electronic delivery service. An analysis of the fax market in 1995 and FedEx's subsequent successful adoption of information technologies conclude this paper.  相似文献   
9.
Protective and risk factors associated with rates of early sexual debut and risky sexual behaviors for a sample of low-income adolescent boys were examined using bioecological theory framed by a resiliency perspective. Protective processes examined include a close mother–son and father–son relationship, parental monitoring and family routines, as well as the adolescent boy’s academic achievement, expectations, and school recognition. The risk factors assessed were delinquent behaviors, if the adolescent was born to a teenage mother, family structure, monthly family income, risky neighborhood environments, family of origin welfare receipt, and maternal education. Waves one (1999) and two (2001) of Welfare, Children, and Families: A Three-City Study were used (N = 528; Wave 1 ages 10–14 years). Associations between early sexual debut and risky sexual behaviors with individual, family, school, and neighborhood protective and risk factors were addressed through a series of d-probit and Ordinary Least Squares multiple regression techniques. When protective and risk factors were addressed independently, academic achievement and parental monitoring protected adolescent boys from early sexual debut and risky sexual behaviors while drug and alcohol use and school problems placed them at risk for these behaviors. However, when the model is assessed together, early parental monitoring and academic achievement were shown to protect boys’ early sexual debut and risky sexual behaviors by reducing their delinquent behaviors, specifically early drug and alcohol use and school problems.
Brenda J. LohmanEmail:
  相似文献   
10.
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号