首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   64篇
  免费   4篇
各国政治   1篇
工人农民   9篇
世界政治   2篇
外交国际关系   2篇
法律   41篇
政治理论   13篇
  2023年   5篇
  2022年   1篇
  2021年   2篇
  2020年   6篇
  2019年   5篇
  2018年   6篇
  2017年   1篇
  2016年   2篇
  2013年   2篇
  2012年   2篇
  2011年   3篇
  2010年   1篇
  2009年   2篇
  2008年   2篇
  2007年   3篇
  2004年   1篇
  2002年   3篇
  2001年   2篇
  2000年   2篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1990年   1篇
  1988年   2篇
  1987年   2篇
  1986年   1篇
  1985年   1篇
  1984年   2篇
排序方式: 共有68条查询结果,搜索用时 15 毫秒
1.
The goal of the current study was to examine the protective role that maternal media monitoring might have for adolescents. This was done by considering whether styles of media monitoring either directly reduced media use, or whether they buffered the associations between aggressive media use and adolescents’ prosocial behavior, aggression, and delinquency. Participants were 681 adolescents from two cities in the United States (51% female; 73% white), and their mothers, who provided data at two different time points, 2 years apart (when adolescents were roughly ages 13 and 15). Mixture modeling results revealed that mothers used four different styles of media monitoring made up of combinations of active and restrictive monitoring as well as forms of co-use. Styles that included active monitoring and connective co-use (i.e., engaging in media with the intent to connect with children) were directly associated with less media use, and moderated links between adolescents’ media use and behavioral outcomes concurrently but not longitudinally. The discussion was focused on the strength of considering multiple strategies of media monitoring together, and how this approach can inform future research in the area of parental media monitoring.  相似文献   
2.
3.
This study examined the influence of pubertal timing upon family interactions in normal and psychiatric adolescent samples. An important feature of our approach is its emphasis upon micro-analysis of family behaviors (individual speeches) and family processes (theoretically specified speech pairings). Rather than assume that global family patterns (e.g., power) shift in response to pubertal changes, we follow how types of speeches and speech sequences are associated with different pubertal timing. Using the previously constructed family coding system, the Constrainig and Enabling Coding System, we found that on-time adolescents and their parents differed from both off-time groups (early or late). These results are discussed in terms of current implications and suggestions for future research.An earlier version of this paper was presented at the SRCD Study Group on Timing of Maturation, October, 1983, at the Education Testing Service, Princeton, NJ. This research was supported by NICHD Grant 1 R01 HD18684-01, and an NIMH Research Scientist Award (Dr. Hauser).Received his Ph.D. from Harvard University. Research interest is adolescent development within the family and impact of chronic illness on adolescent development and family interaction.Received her B.A. from Wellesley College. Research interests are in humor and attractiveness.Received his M.A. from Boston University. Research interests are in methodology and statistics.Received Ed.D. from Harvard University. Research interests are in adolescent development within the family, and family coping with stress.Received M.D. from University of Chicago. Research interests are in psychosocial aspects of diabetes.Received Ed.D. from Harvard University. Research interests are in developmental psychopathology, and moral and ego development.Received Ph.D. from Ohio State University. Research interests are in assessment of ego development and family systems.Received Ph.D. from University of Miami. Research interests are in family studies and adolescent development.  相似文献   
4.
Parker  Glenn R.  Powers  Stephen C. 《Public Choice》2002,110(1-2):173-191
Despite the hypothesized propensity for shirking to marklegislative institutions, the evidence is rather equivocal;moreover, most of the research has focused exclusively onlegislator voting, thereby constraining whatevergeneralizations might emerge. The purpose of this paper is tocontribute to the debate over the question of politicalshirking by extending the range of phenomena examined toinclude congressional foreign travel. Our analysis providesevidence that opportunism is a problem in Congress. We findthat last-period problems have arisen in the area of foreigntravel, and that increased scrutiny to the problem on the partof Congress only shifted consumption patterns, i.e.,legislators began taking foreign junkets near, but not at theend of, their legislative careers. Not all foreign travelshould be construed as worthless junketing since there isstrong evidence that some foreign travel is related tomembers' responsibilities on congressional committees.  相似文献   
5.
6.
The notion of loyalty is well established in the criminological literature pertaining to ethics, ethical decision making, and ethical and ideological orientations. The present research addresses the topic of ethics and loyalty in an attempt to address three research questions germane to these areas within criminal justice and criminology. Using two samples equivalent in characteristics other than academic major, this research examines: (1) what impact gender, college major, and the ethical perspective of the observer and the nature of the actor’s action have upon the observer’s attitude toward the action (specific act of deception/truth); (2) what impact gender, college major, and the ethical perspective of the observer and the nature of the actor’s action have upon the observer’s perception of the social attractiveness of the deceiver; and (3) what impact gender, college major, the ethical perspective of the observer, and the nature of the actor’s action have upon the observer’s perception of the task attractiveness of the deceiver. Using a vignette design in this exploratory research, attempts are made to shed light on the impact of gender, major (criminal justice v. others), and ethical orientation on perceptions of an actor confronted with an ethical dilemma of loyalty versus disloyalty involving deception.  相似文献   
7.
The storage and use of explosives is regulated at the state and federal level, with a particular focus on physical security and rigorous accounting of the explosive inventory. For those working with explosives for the training and testing of explosive-detecting canines, cross-contamination is an important concern. Hence, explosives intended for use with canine teams must be placed into secondary storage containers that are new, clean, and airtight. A variety of containers meet these requirements and include screw-top glass jars (e.g., mason jars). However, an additional need from the explosive-detecting canine community is secondary containers that can also be used as training aids whereby the volatiles emitted by explosives are emitted in a predictable and stable manner. Currently, a generally accepted method for the storage of explosives and controlled emission of explosive vapor for canine detection does not exist. Ideally, such containers should allow odor to escape from the training aid but block external contaminates such as particulates or other volatiles. One method in use places the explosive inside a permeable cotton bag when in use for training and then stores the cotton bag inside an impermeable nylon bag for long-term storage. This paper describes the testing of an odor permeable membrane device (OPMD) as a new way to store and deploy training aids. We measured the evaporation rate and flux of various liquid explosives and volatile compounds that have been identified in the headspace of actual explosives. OPMDs were used in addition to traditional storage containers to monitor the contamination and degradation of 14 explosives used as canine training aids. Explosives were stored individually using traditional storage bags or inside an OPMD at two locations, one of which actively used the training aids. Samples from each storage type at both locations were collected at 0, 3, 6, and 9 months and analyzed using Fourier Transform Infrared (FTIR) Spectroscopy and Gas Chromatography–Mass Spectrometry (GC–MS) with Solid-Phase Microextraction (SPME). FTIR analyses showed no signs of degradation. GC–MS identified cross-contamination from ethylene glycol dinitrate (EGDN) and/or 2,3-dimethyl-2,3-dinitrobutane (DMNB) across almost all samples regardless of storage condition. The contamination was found to be higher among training aids that were stored in traditional ways and that were in active use by canine teams.  相似文献   
8.
Human hairs are one of the most commonly encountered items of trace evidence. Currently, conventional methods for hair analysis include microscopic comparison and DNA analysis (nuclear and mitochondrial). Each approach has its own drawbacks. Hair proteins are stable and offer an alternative to DNA testing, as demonstrated with proteomics for distinguishing humans. However, proteomics is complicated and requires identifying peptides to remain intact following harsh sample preparation methods. Alternatively, the actual amino acid content of a hair sample may also offer important identifying information and actually requires proteins and peptides to be broken down completely rather than remaining intact. This study evaluated the discriminating power of using hair amino acid ratios to differentiate hair samples from 10 unrelated individuals with dark colored hair. Hair proteins were digested, derivatized, and analyzed using gas chromatography–mass spectrometry. Amino acid ratios were calculated for each individual and comparisons using ANOVA and post-hoc pairwise t-test with Bonferroni correction were made with amino acid ratios for individuals. Overall, out of the 45 possible pairwise comparisons between all hair samples, 38 (84%) were differentiable. Out of the 36 possible pairwise comparisons between brown haired individuals, 32 (89%) were considered differentiable using univariate statistics. Multivariate statistics were also attempted but, overall, univariate models were sufficient for exclusionary purposes. These results indicate that amino acid ratio analysis can potentially be used as an exclusionary method using hair if DNA analysis cannot be performed, or to corroborate conclusions made following microscopic analysis.  相似文献   
9.
The occurrence of secondary DNA transfer has been previously established. However, the transfer of DNA through an intermediary has not been revisited with more sensitive current technologies implemented to increase the likelihood of obtaining results from low‐template/low‐quality samples. This study evaluated whether this increased sensitivity could lead to the detection of interpretable secondary DNA transfer profiles. After two minutes of hand to hand contact, participants immediately handled assigned knives. Swabbings of the knives with detectable amounts of DNA were amplified with the Identifiler® Plus Amplification Kit and injected on a 3130xl. DNA typing results indicated that secondary DNA transfer was detected in 85% of the samples. In five samples, the secondary contributor was either the only contributor or the major contributor identified despite never coming into direct contact with the knife. This study demonstrates the risk of assuming that DNA recovered from an object resulted from direct contact.  相似文献   
10.
This paper extends concepts about agenda-building politics within the policy literature by considering the implications of `big science' agenda-building politics for policyrnaking. It argues that agenda-building in the `big science' policy arena is distinct from agenda-building in the general social problem-solving policy arena. The general policy development process and the `big science' policy development process are contrasted conceptually. Two different cases of agenda-building in big science are then highlighted to offer empirical evidence of the differences between the two processes. A distinction is drawn between the contemporary conceptualization of agenda-building in the general policy arena and the big science policy arena and comments are made about the value of the paper for policy learning. Accordingly, the paper has important implications for the science policy arena and perhaps the larger policy arena.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号