首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   80篇
  免费   5篇
  85篇
  2024年   1篇
  2023年   1篇
  2021年   1篇
  2020年   1篇
  2019年   1篇
  2018年   4篇
  2017年   2篇
  2016年   4篇
  2015年   1篇
  2014年   7篇
  2013年   7篇
  2012年   4篇
  2011年   3篇
  2010年   2篇
  2008年   6篇
  2007年   4篇
  2005年   3篇
  2004年   5篇
  2003年   6篇
  2002年   1篇
  2000年   2篇
  1999年   3篇
  1997年   2篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
  1990年   2篇
  1989年   1篇
  1982年   3篇
  1981年   2篇
  1979年   1篇
  1973年   1篇
  1954年   1篇
排序方式: 共有85条查询结果,搜索用时 0 毫秒
61.
62.
This paper explores the international implications of liberal theories which extend justice to sentient animals. In particular, it asks whether they imply that coercive military intervention in a state by external agents to prevent, halt or minimise violations of basic animal rights (‘humane intervention’) can be justified. In so doing, it employs Simon Caney's theory of humanitarian intervention and applies it to non-human animals. It argues that while humane intervention can be justified in principle using Caney's assumptions, justifying any particular intervention on behalf of animals is much more difficult – and in present circumstances impossible. If these claims are correct, a number of important conclusions follow. First, all states lack legitimacy because of the horrors that they inflict upon animals. As a result of this, all states are prima facie liable to intervention by external agents. To remedy this situation, all states have the responsibility to massively transform their relationship with non-human animals, and to build international institutions to oversee the proper protection of their most basic rights.  相似文献   
63.
Striking results recently demonstrated that visualizing search for a target can facilitate visual search for that target on subsequent trials (Reinhart et al. 2015). This visualization benefit was even greater than the benefit of actually repeating search for the target. We registered a close replication and generalization of the original experiment. Our results show clear benefits of repeatedly searching for the same target, but we found no benefit associated with visualization. The difficulty of the search task and the ability to monitor compliance with instructions to visualize are both possible explanations for the failure to replicate, and both should be carefully considered in future research exploring this interesting phenomenon.  相似文献   
64.
We report the outcomes from our solution-focused brief therapy outpatient clinic in adult mental health. A questionnaire was sent to clients and their family doctors one year after they ceased to attend. Seventy-five clients were referred, of whom fifty-three were seen and forty-one traced at follow-up. Thirty-one (76%) reported a good outcome, with an overall average of 5.02 sessions, 20% attending only one session. Combining these data with our previous studies, 170 referrals were received of whom 136 attended and 118 were traced. Good outcome was reported by eighty-three clients (70%) with a mean of 4.03 sessions per case. There was no significant difference between the groups in solving additional problems or seeking further professional help. New problems were significantly less common in the 'good outcome' group. Long-standing problems did less well. In all three studies there were no significant differences in outcome between socioeconomic groups.  相似文献   
65.
66.
This validation study analyses data from a sample of North American terrorist attackers (n = 33) and non‐attackers (n = 23) through the lens of the Terrorist Radicalization Assessment Protocol (TRAP‐18; Meloy, 2017) utilizing a multivariate statistical approach – multidimensional scaling – to visualize potential clustering (co‐occurrence) of risk factors. Rarely done in terrorism research, the results plotted in two‐dimensional space show the clustering and co‐occurrence of most of the eight proximal warning behaviors among the attackers, but not among the non‐attackers, and less of a clustering and association of distal characteristics, but their presence in both attackers and non‐attackers. These findings provide further empirical support for the rational‐theoretical model of the TRAP‐18, a structured professional judgment instrument for threat assessment of lone actor terrorists. It advances the quantitative analysis of operationally relevant and behaviorally observable indicators for use by law enforcement and counterterrorism professionals and their consultants. Findings are discussed in relation to other research on pre‐offense behaviors of lone actor terrorists, and recommendations are made for both operational use and further research.  相似文献   
67.
Michael Kremer defines fixed-point logics of truth based on Saul Kripke’s fixed point semantics for languages expressing their own truth concepts. Kremer axiomatizes the strong Kleene fixed-point logic of truth and the weak Kleene fixed-point logic of truth, but leaves the axiomatizability question open for the supervaluation fixed-point logic of truth and its variants. We show that the principal supervaluation fixed point logic of truth, when thought of as consequence relation, is highly complex: it is not even analytic. We also consider variants, engendered by a stronger notion of ‘fixed point’, and by variant supervaluation schemes. A ‘logic’ is often thought of, not as a consequence relation, but as a set of sentences – the sentences true on each interpretation. We axiomatize the supervaluation fixed-point logics so conceived.  相似文献   
68.
Alasdair M. Richmond 《Ratio》2000,13(3):256-274
Might time be multi‐dimensional? In exploring this question, this paper uses a thought‐experiment about dimensionality, H. G. Wells' ‘The Plattner Story’. Plattner has his left and right sides transposed after a trip through a fourth spatial dimension, a change with independent empirical consequences. This example is then generalised to reversals of the directions of time and entropy. Finally, this thought‐experiment is related to relativistic theories of time and the possibility of preserving causality in a temporally multi‐dimensional framework.  相似文献   
69.
Increasing use of social media in forensic mental health evaluations will lead to new challenges that must be resolved by forensic practitioners and the legal system. One such dilemma is the discovery of information that would typically trigger a legal duty and professional ethics obligation for mental health professionals to breach doctor-patient confidentiality to promote public safety and prevent harm to vulnerable third parties. Although the law and professional organizations offer clear guidance for practitioners in the treatment role, there is currently no clarity from the law or instruction from professional organizations on what mental health professionals should do if they discover such information during a confidential forensic evaluation. For example, a forensic evaluator may find evidence on social media of an evaluee’s threats to seriously harm others, abuse of children and the elderly, or severely impaired driving. There are no clear guidelines for how a forensic psychiatrist should respond in these complicated situations. We review the legal concepts and historical evolution of confidentiality, privilege, and mandated reporter duties that forensic practitioners should consider in these legally ambiguous situations. Finally, we discuss ethics frameworks practitioners can implement to determine their most ethical course of action when faced with such dilemmas.  相似文献   
70.
德性对于人的兴盛是必不可少的。没有道德德性,我们就不能实现从动物性理智到实践推理的转变,其次不能继续有推理的实践;如果不发展某种程度的德性,我们就不能适当地关怀和教育他人。所以,德性必须首先获得,然后才能维持在推理的实践之中。最后,我们在成为实践推理之后,我们仍然需要他人的维护,这种需要同时也是一种对德性的需要。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号