首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   17篇
  免费   4篇
各国政治   1篇
世界政治   1篇
外交国际关系   1篇
法律   16篇
政治理论   2篇
  2020年   1篇
  2018年   2篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   1篇
  2013年   6篇
  2012年   1篇
  2010年   1篇
  2009年   1篇
  2008年   1篇
  2006年   1篇
  2003年   1篇
  1991年   1篇
  1981年   1篇
排序方式: 共有21条查询结果,搜索用时 31 毫秒
1.
Reviews     
Vojtech Mastny, Russia's Road to the Cold War: Diplomacy, Warfare, and the Politics of Communism, 1941–1945. New York: Columbia University Press, 1979. xix + 409 pp. $16.95.

Hugh Seton‐Watson, The Imperialist Revolutionaries: Trends in World Communism in the 1960s and 1970s. Stanford, California: Hoover Institution Press, 1979. x + 157 pp. $6.95.

Egbert Jahn (ed.), Soviet Foreign Policy: Its Social and Economic Conditions. London: Allison and Busby, 1978. 160 pp. £6.50.

Stephen White, Political Culture and Soviet Politics, London: Macmillan, 1979. xi + 234 pp. £10.00 and £4.95.

Donald R. Kelley (ed.) Soviet Politics in the Brezhnev Era, New York: Praeger Publishers, 1980, vii + 269 pp. £14.25.

Morton Kaplan (ed.), The Many Faces of Communism, New York: The Free Press, 1978. x + 366 pp. $14.95.

David H. Howard, The Disequilibrium Model in a Controlled Economy, Farnborough: Lexington Books, 1980. x + 112 pp. £9.50/$20.50.

Felicity Ann O'Dell, Socialisation through children's literature: The Soviet example, Cambridge: Cambride University Press, 1978, x + 277 pp. £14.00.

Martin McCauley, Marxism‐Leninism in the German Democratic Republic. The Socialist Unity Party (SED), London: Macmillan, 1979. xix + 267 pp. £12.00.

R. W. Makepeace, Marxist Ideology and Soviet Criminal Law, Croom Helm, Barnes & Noble, 1980. 319 pp. £13.95.

Jan Tomasz Gross, Polish Society under German Occupation: The General‐gouvernement, 1939–1944, New Jersey: Princeton University Press, 1979. xviii + 343 pp. £11.00  相似文献   

2.
3.
Abstract

This study explored a sample of 244 UK adult male offenders convicted of offences involving indecent images of children (IIOC): 120 had a previous contact child sexual offence (defined as dual offenders) and 124 had no evidence of an offence against a child (defined as non-contact offenders). Offender groups were compared regarding their socio-demographic characteristics, previous convictions and IIOC possession. Key discriminatory factors that differentiated dual offenders were: access to children, previous offence history, sexual grooming and possession of IIOC that depicts similar-aged victims. In contrast, non-contact offenders could be identified from their greater amount and wider range of IIOC possession. The results suggest a homology between Internet behaviours, IIOC possession and victim selection. Implications for law enforcement agencies are discussed in terms of assisting investigative prioritisation by identifying those most at risk of committing sexual abuse against children.  相似文献   
4.
Abstract

This study investigates the variations in behaviour displayed by young people who sexually harm, as previous research has shown that they are not a homogeneous sample. Three conceptually distinct sets of behaviour were hypothesized, relating to various modes of interaction between the young people with harmful sexual behaviour (HSB) and their victim, victim as object, victim as person and victim as vehicle. Thirty-three behaviours were drawn from an extensive review of the files of 300 youths who had sexually harmed. The pattern of co-occurrence of the presence or absence of these behaviours was revealed by a multidimensional scaling procedure, Smallest Space Analysis (SSA). The results provide empirical support for three distinct behavioural themes; 258 (86%) of the youths could be assigned to one dominant mode of interaction (victim as object, victim as person or victim as vehicle). The findings have implications for the ways in which practitioners differentiate between young people with HSB.  相似文献   
5.
In this paper we examine the legal aspects of the forensic investigation of mobile telephone applications. Mobile telephone applications might be involved with a variety of types of computer misuse including fraud, theft, money laundering, dissemination of copyrighted materials or indecent images, or instances where mobile telephone applications have been involved in the transmission of malware for malicious or criminal purposes. In this paper we examine the process of the forensic investigation of mobile telephone applications, and the issues relating to obtaining digital evidence from mobile telephone applications.  相似文献   
6.
This article reviews the last five years of coalition government policy making in relation to occupational health and safety law. It shows that the most significant and influential element of this activity has been the reframing of the wider regulatory system according to a dominant ideological paradigm of ‘common‐sense’ regulation, to the detriment of other considerations and interests. A social constructionist framework assists in setting out the means through which this new ‘symbolic universe’ of regulatory possibility has been constructed and promulgated within the policymaking arena. In particular, it identifies the key role played by processes of deliberative regulatory engagement in the construction and development of this approach, and identifies the inherent vulnerability of ‘thin’ forms of deliberation to this sort of application.  相似文献   
7.
Abstract

Although practitioner impact and support in the adult sex offender field has gained increasing research recognition, less is known about these issues in work with children and young people with harmful sexual behaviours which is the focus of this study. Using qualitative methods, 16 practitioners from one organisation took part in semi-structured interviews. Quantitative data were also obtained via a subsequent postal questionnaire. Findings revealed that positive effects far outweighed negative impact. Furthermore, practitioners identified organisational factors as being more directly related to negative impact. It was concluded that meaningful supervision and support involve various key components. Whilst recognising essential case management and accountability requirements, supervision (ideally by a manager experienced in sexual behaviour work) should be practitioner led and focused and support for employees should be trusted, confidential and separate from organisational procedures (i.e. performance appraisal). External clinical supervision by an experienced supervisor was also suggested as helpful.  相似文献   
8.
Fire investigation is a challenging area for the forensic investigator. The aim of this work was to use spectral changes to paint samples to estimate the temperatures to which a paint has been heated. Five paint samples (one clay paint, two car paints, one metallic paint, and one matt emulsion) have been fully characterized by a combination of attenuated total reflectance Fourier transform infrared (ATR‐IR), Raman, X‐ray fluorescence spectroscopy and powder X‐ray diffraction. The thermal decomposition of these paints has been investigated by means of ATR‐IR and thermal gravimetric analysis. Clear temperature markers are observed in the ATR‐IR spectra namely: loss of ν(C = O) band, >300°C; appearance of water bands on cooling, >500°C; alterations to ν(Si–O) bands due to dehydration of silicate clays, >700°C; diminution of ν(CO3) and δ(CO3) modes of CaCO3, >950°C. We suggest the possible use of portable ATR‐IR for nondestructive, in situ analysis of paints.  相似文献   
9.
We have carried out experiments to investigate the aging of latent fingerprints deposited on black PVC over a period of 4–15 weeks. A thumbprint was used in each case and before deposition of the print the donor rubbed their thumb around their nose to add sebaceous deposits. We have studied the effect of heat, light, and moisture and we find that moisture is the most significant factor in the degradation of the latent print. We have attempted to enhance these latent prints by dusting with valine powder or powders composed of valine mixed with gold or red fluorescent commercial fingerprint powders. To make a direct comparison between “treated” and “untreated” prints, the prints were cut in half with one‐half being “treated” and one‐half not. Our studies show the best results being obtained when powders of valine and red fluorescent powders are applied prior to cyanoacrylate fuming.  相似文献   
10.
The successful enforcement of health and safety regulation is reliant upon the ability of regulatory agencies to demonstrate the legitimacy of the system of regulatory controls. While 'big cases' are central to this process, there are also significant legitimatory implications associated with 'minor' cases, including media-reported tales of pettiness and heavy-handedness in the interpretation and enforcement of the law. The popular media regularly report stories of 'regulatory unreasonableness', and they can pass quickly into mainstream public knowledge. A story's appeal becomes more important than its factual veracity; they are a form of 'regulatory myth'. This paper discusses the implications of regulatory myths for health and safety regulators, and analyses their challenges for regulators, paying particular attention to the Health and Safety Executive (HSE) which has made concerted efforts to address regulatory myths attaching to its activities. It will be shown that such stories constitute sustained normative challenges to the legitimacy of the regulator, and political challenges to the burgeoning regulatory state, because they reflect some of the key concerns of late-modern society.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号