首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   143篇
  免费   11篇
各国政治   7篇
工人农民   10篇
世界政治   12篇
外交国际关系   1篇
法律   92篇
中国政治   5篇
政治理论   26篇
综合类   1篇
  2022年   2篇
  2021年   2篇
  2020年   5篇
  2019年   5篇
  2018年   15篇
  2017年   8篇
  2016年   8篇
  2015年   7篇
  2014年   4篇
  2013年   20篇
  2012年   4篇
  2011年   5篇
  2010年   4篇
  2009年   6篇
  2008年   1篇
  2007年   7篇
  2006年   8篇
  2005年   6篇
  2004年   7篇
  2003年   2篇
  2002年   4篇
  2001年   1篇
  2000年   3篇
  1999年   2篇
  1996年   1篇
  1994年   1篇
  1992年   1篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1984年   2篇
  1983年   1篇
  1980年   2篇
  1979年   1篇
  1973年   1篇
  1966年   1篇
排序方式: 共有154条查询结果,搜索用时 15 毫秒
1.
ABSTRACT

This study examines the views of students on the ethics of tax evasion, their intentions to evade tax, and investigates the factors that predict such intentions. Relying on the extended version of the Theory of Planned Behaviour, the study investigated whether attitudes, subjective norms, perceived behavioural control, and moral obligation may be good predictors of the intention to evade tax. Data were gathered from 662 students of University of Ghana Business School using questionnaires. The hypotheses were tested using the structural equation modelling technique. Results indicate that the intention to evade tax among the students is low and most respondents generally perceive tax evasion as an unethical practice. The results also demonstrate that attitude, subjective norms and moral obligations have important implications on the intention to evade tax. The evidence we provide should be useful to governments and tax agencies interested in promoting responsible tax compliance behaviour among individual taxpayers.  相似文献   
2.
Providing legal protection against the 'hacking' of technological locks used to protect copyrighted works recently has been the subject of an international treaty (the World Intellectual Property Organization Copyright Treaty), a European Community Directive (the Information Society Directive) and major copyright legislation in the USA (the Digital Millennium Copyright Act). By making hacking illegal, these legal protections fortify the technological protections employed by copyright owners to reduce infringement of their works. While copyright owners may use technological protections to compensate for the increased infringement potential in a digital world, technological protections can also be used to obtain far greater protection than the law would otherwise grant the copyright owner. In this article, Professor Loren argues that attention needs to be shifted from providing legal protection for technological protections, to providing legal protections against the overzealous use of these technological protections by content providers. She argues that laws should be enacted, and perhaps even treaties should be signed, that would prohibit the use of technological protections to impermissibly invade certain use rights recognized by a country's copyright laws.  相似文献   
3.
4.
This Paper was presented at the XVII World Congress of the International Association of Youth and Family Law Judges and Magistrates, Belfast, Northern Ireland, 22 August to 1 September 2006.  相似文献   
5.
6.
When a bullet punctures a surface, it leaves behind a bullet impact, which can be analyzed in order to determine the origin and trajectory path from which a bullet was discharged using many different scientific methods to reconstruct a shooting scene. The purpose of the research was to test the accuracy and repeatability of reconstructing the impact angle of single bullet impacts using the ellipse method. The research was conducted by firing various calibers of ammunition into drywall panels positioned at varying angles of incidence from 88° until ricochet occurred. This was done in order to determine which caliber type and angle of incidence are most accurate and precise for reconstructing a shooting scene. The study examined four caliber types fired into drywall panels, with 5 repeated shots for each of the 11 angles of incidence (n = 220). Furthermore, 31 participants partook in the study to estimate a bullet impact angle of incidence utilizing the ellipse method. The results show that the best performance (accuracy and repeatability) is seen with the measurements of the 0.45 caliber ammunition. When angle of incidences is low (<64°), the performance (accuracy and repeatability) was seen to be better in all caliber ammunitions. Overall, the data provided for single bullet impacts deposited in drywall show that the ellipse method is useful in providing measurements for most crime scene reconstruction purposes and has also demonstrated that results vary depending on the type of ammunition, firearm, and angle of incidence being examined.  相似文献   
7.
8.
This paper examines a civil society challenge to UK government legislation withdrawing welfare support from asylum seekers who do not claim on entry to the country. Drawing on the work of Habermas and Alexander, it considers the role of the courts as a deliberative space and elaborates the scope for civil repair in the case of a group rendered marginal by the law. In so doing, it also suggests how links could be made with the broadened conception of citizenship proposed by Isin and Turner.  相似文献   
9.
Reformers have traditionally assumed that agencies can combat corruption through controls such as tighter oversight, increased regulation, internal audits, reorganizations, and performance accountability mechanisms. But this case study of the New York City school custodial system shows how a corrupt agency can derail these devices. New York City's $500,000,000 custodial system, responsible for maintaining its 1,200 schools, has been unleashing scandals since the 1920s despite decades of regulations, multiple reorganizations, and layers of oversight. Its history shows that a deviant culture—a management "captured" by special interests—and an infrastructure enmeshed in abusive policies will resist controls, no matter how well-crafted. True reform requires tackling institutionalized corruption through strategies like overhauling management, eradicating special interests, and aggressively punishing misconduct.  相似文献   
10.
Because of difficulties collecting sales taxes on Internet sales, several states have engaged in an effort (the Streamlined Sales Tax Project, SSTP) to simplify their sales tax systems. One hope among SSTP proponents is that a simplified system will result in Internet vendors voluntarily collecting the sales tax. We address two issues:
  • ? Will states adopt the extensive reforms proposed by the SSTP?
  • ? Will vendors voluntarily collect the sales tax?
We argue that states are unlikely to adopt extensive reforms, but if they did, many vendors would voluntarily collect sales taxes.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号