首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   67886篇
  免费   3280篇
各国政治   4497篇
工人农民   2826篇
世界政治   5937篇
外交国际关系   3820篇
法律   31627篇
中国共产党   10篇
中国政治   736篇
政治理论   20732篇
综合类   981篇
  2021年   404篇
  2020年   1170篇
  2019年   1523篇
  2018年   1649篇
  2017年   1938篇
  2016年   2165篇
  2015年   1833篇
  2014年   2105篇
  2013年   10539篇
  2012年   1586篇
  2011年   1701篇
  2010年   1817篇
  2009年   2050篇
  2008年   1730篇
  2007年   1693篇
  2006年   1864篇
  2005年   1743篇
  2004年   1646篇
  2003年   1462篇
  2002年   1513篇
  2001年   1510篇
  2000年   1314篇
  1999年   1186篇
  1998年   1087篇
  1997年   990篇
  1996年   946篇
  1995年   909篇
  1994年   919篇
  1993年   945篇
  1992年   947篇
  1991年   982篇
  1990年   926篇
  1989年   983篇
  1988年   961篇
  1987年   977篇
  1986年   965篇
  1985年   1018篇
  1984年   934篇
  1983年   965篇
  1982年   893篇
  1981年   827篇
  1980年   651篇
  1979年   700篇
  1978年   593篇
  1977年   526篇
  1976年   489篇
  1975年   422篇
  1974年   437篇
  1973年   445篇
  1972年   387篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
41.
The global defense industrial sector is a remarkably accurate indicator of the distribution of power in the post-Cold War international system. However, the defense industrial sector as a policy tool has received relatively little scrutiny, even though it not only reflects the international order, but also provides the United States with the ability to influence the foreign policy behavior of other states. The defense industrial sector is a powerful, if undervalued, diplomatic tool in the United States’ political arsenal.  相似文献   
42.
This paper describes several dimensions of the cost of the U.S. response to the threat of terrorism. Following an evaluation of the nature and magnitude of the threat of terrorism against the United States, the paper describes the restrictions on our civil liberties, the fiscal and other costs of the major homeland security measures, the fiscal cost of programs that make no contribution to the defense against terrorism but are rationalized on that ground, and the effects on our language and the potential for civil discourse of an extended defense against terrorism.  相似文献   
43.
44.
What drives policymakers to put the interests of others above their own? If human nature is inherently selfish, it makes sense to institutionalize incentives that counter decision makers' temptations to use their positions to benefit themselves over others. A growing literature rooted in evolutionary theories of human behavior, however, suggests that humans, under certain circumstances, have inherent predispositions towards “representational altruism,” i.e., to make an authoritative decision to benefit another at one's own expense. Drawing on Hibbing and Alford's conception of the wary cooperator, a theoretical case is made for such behavioral expectations, which are confirmed in a series of original laboratory experiments.  相似文献   
45.
In the early 1970s, Grand Canyon National Park intended to designate its land to “Wilderness,” including the controversial Colorado River corridor. However, by the end of the 1970s the potential for Wilderness designation was off the table, and would never seriously return for genuine consideration. Using Schattschneider's model of conflict, we explain how the organization of this conflict privileges the “causal story” of Wilderness opponents, and therefore why the canyon is not designated. It is our contention that members of Congress will not stand forward to support Wilderness designations without simultaneously providing benefits for extractive land use because (1) congressional representatives are more penalized for supporting than opposing Wilderness designations, (2) Wilderness advocacy groups do not pressure congressional delegates as firmly as opposition groups, and (3) key local congressional members are not likely to see Wilderness as a salient issue worth the risk of negative exposure. If these findings hold, the implication is that we may have reached the end of significant Wilderness designations in highly visible areas, unless critical aspects in land use conflict change.  相似文献   
46.
Numerous accounts reveal that congressional leaders often secure “hip‐pocket votes” or “if you need me” pledges from rank‐and‐file legislators. These are essentially options on votes. Leaders exercise sufficient options—pay legislators to convert to favorable votes—when those options will yield victory. Otherwise, they release the options. A model shows that this optimal strategy for leaders produces many small victories, few small losses, and losses that are, on average, larger than victories. We find precisely these patterns, hence strong evidence for vote options, in Congressional Quarterly key votes from 1975 through 2001 and in non‐key votes from the 106th Congress (1999–2000).  相似文献   
47.
This concept paper presents a theory of environmental scarcity developed byHomer-Dixon. Homer-Dixon developed a model to describe the consequences of scarcity for sub-national violence in third world countries. This paper hasfour interrelated purposes. First, it presents the model of scarcity developedby Thomas Homer-Dixon in 1999. Second, it assesses the way in which the scarcity model contextualizes criminal justice and criminology research, andby extension, how research in crime and justice processes can broaden the scarcity model. Third, it applies elements of the model to the United States,a goal that represents a generalization of the model from third-world to first-world settings. Fourth, it presents a particular case, the migrationof African-Americans from the rural South to urban centers in the 1950s and1960s and consequent inner-city violence in the 1960s, that displays manyelements of the environmental scarcity model.  相似文献   
48.
In 1991 the FCC implemented a price cap plan for local exchange carriers' interstate access service designed to deal with the regulatory boundaries problem arising from the breakup of AT&T in 1984. The experience with the price cap plan demonstrates the difficulty of predicting productivity growth accurately and makes clear that regulators cannot depend upon a pure price cap plan to keep prices within a reasonable range of costs. With periodic reviews to readjust plan parameters, however, a price cap plan can maintain the rate-of-return close to the target rate-of-return without diminishing the price cap plan's incentives for efficient production. A simple method of recalculating the X-factor based on the rate-of-return over the previous three years worked well in simulations. If this procedure had been used over the price cap period 1991 to 2000, prices would have been 20 percent lower and expenditures on LECs' telecommunications service subject to a price cap would have been $3.8 billion lower.  相似文献   
49.
The adjustment problems associated with sexual abuse, physical abuse, psychological maltreatment, neglect, and witnessing family violence during childhood were examined in three studies. Study 1 demonstrated significant overlap between maltreatment types in parent reports (N = 50) of maltreatment experiences of their child aged 5–12 years. Parental sexual punitiveness, traditionality, family adaptability and family cohesion significantly predicted scores on 4 maltreatment scales and children's externalizing behavior problems. Level of maltreatment predicted internalizing, externalizing, and sexual behavior problems. In Study 2, significant overlap was found between adults' retrospective reports (N = 138) of all 5 types of maltreating behaviors. Parental sexual punitiveness, traditionality, family adaptability, and family cohesion during childhood predicted the level of maltreatment and current psychopathology. Although child maltreatment scores predicted psychopathology, childhood family variables were better predictors of adjustment. Study 3 demonstrated that child maltreatment scores predicted positive aspects of adult adaptive functioning (N = 95).  相似文献   
50.
This paper considers technology transfer from a holistic perspective, defining and integrating all essential elements. Technology, technology ownership, and technology transfer are defined to enable practical management of the value of technology as an organizational asset. Concepts from value-chain movement of technology in commercial product development are used to develop a complete, detailed vision of technology transfer across corporate boundaries. Lessons enable development of a productive technology-transfer function that will speed evolution of technology to product and enable creation of new wealth.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号