首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   456篇
  免费   16篇
各国政治   28篇
工人农民   10篇
世界政治   41篇
外交国际关系   34篇
法律   249篇
中国共产党   4篇
中国政治   18篇
政治理论   73篇
综合类   15篇
  2023年   2篇
  2021年   4篇
  2020年   11篇
  2019年   16篇
  2018年   13篇
  2017年   10篇
  2016年   26篇
  2015年   10篇
  2014年   7篇
  2013年   63篇
  2012年   19篇
  2011年   10篇
  2010年   14篇
  2009年   19篇
  2008年   15篇
  2007年   20篇
  2006年   14篇
  2005年   18篇
  2004年   15篇
  2003年   5篇
  2002年   13篇
  2001年   11篇
  2000年   13篇
  1999年   12篇
  1998年   10篇
  1997年   10篇
  1996年   4篇
  1995年   6篇
  1994年   5篇
  1993年   4篇
  1992年   5篇
  1991年   4篇
  1990年   4篇
  1989年   4篇
  1988年   4篇
  1987年   5篇
  1986年   5篇
  1985年   5篇
  1984年   5篇
  1983年   6篇
  1981年   6篇
  1980年   4篇
  1979年   3篇
  1977年   1篇
  1976年   1篇
  1974年   3篇
  1973年   2篇
  1971年   2篇
  1970年   1篇
  1967年   1篇
排序方式: 共有472条查询结果,搜索用时 31 毫秒
81.
82.
This article addresses the problem of generational transmission of collective memory in Hong Kong about the 1989 Tiananmen Square incident. It focuses on the young participants in the annual 4 June commemoration rallies and examines the process of mnemonic socialization that brought them into the community of 4 June commemoration. Drawing upon a rally onsite survey and in-depth interviews, this study found that many young people went through a dynamic process of gradual discovery in which various social institutions—school, family and media—played complementary roles. Their understanding of Tiananmen tended to be simplified and essentialized. Yet the loss of details through essentialization has arguably allowed them to uphold a clear-cut moral judgment regarding the event and dismiss certain memory-blurring discourses straightforwardly.  相似文献   
83.
84.
The commentary by academics on the proposed European General Data Protection Regulation in [2013] 29 CLSR 180 has provoked thoughts in response. The responder strongly agrees with the doubts expressed about the definition of personal data, anonymisation and the identifiability of individuals. On the other hand, he disagrees with the views on consent and legitimacy and proposes support for a risk-based approach to data protection. He suggests that data protection does not need to be defended from the attack that it stifles business, but is justifiable for its assertion of fundamental rights. In conclusion, he shares the criticism of the European Commission's delegated and implementing powers and is concerned that the Regulation will be rushed to a conclusion for reasons of political ambition.  相似文献   
85.
Recent scholarship argues that how members of Congress respond to an ongoing war significantly influences the president's strategic calculations. However, the literature is comparably silent on the factors influencing the public positions members take during the course of a military venture. Accounting for both national and local electoral incentives, we develop a theory positing that partisanship conditions congressional responses to casualties in the aggregate, but that all members respond to casualties in their constituency by increasingly criticizing the war. Analyzing an original database of more than 7,500 content‐coded House floor speeches on the Iraq War, we find strong support for both hypotheses. We also find that Democrats from high‐casualty constituencies were significantly more likely to cast antiwar roll‐call votes than their peers. Finally, we show that this significant variation in congressional antiwar position taking strongly correlates with geographic differences in public support for war.  相似文献   
86.
Until the latter part of the 1960s, the American public was inattentive to the problem of crime in the upperworld. Due to a confluence of events (e.g., Watergate affair, Vietnam War, civil rights movement), concern about this lawlessness rose precipitously in the 1970s. Public attention toward and willingness to punish white-collar crime has persisted into the twenty-first century. We argue, however, that due to a series of recent scandals (e.g., Enron, WorldCom), public opinion about upperworld offenders has been transformed qualitatively. High-profile offenders are now seen not as respected community citizens but as “bad guys” whose crimes reflect inordinate greed and a disturbing lack of concern for victims. This typification is conducive to the prosecution of white-collar offenders but may have the unanticipated consequence of deflecting attention away from structural sources of corporate illegal enterprises.  相似文献   
87.
Law is a specialized semiotic realm, but lawyers generally are ignorant of this fact. Lawyers may manage meaning, but they also are managed by meaning. Seemingly trapped by the weight of pre-existing signs, their attempts to manage these meanings generally are limited to technical interventions and instrumentalist strategies. Signs have power over lawyers because they are embedded in narratives, a semiotic economy that confronts the lawyer as “given” even though it is dynamic and constantly under construction. Most lawyers do not make meaning through legal narratives; rather, they parrot bits of the controlling narratives in response to certain problems. Because clients often can achieve their objectives when their lawyers crudely manipulate the symbols of law, these endeavors pay very well. Well-paid lawyers tend not to ask too many questions. Consequently, semiotics is, at best, misunderstood by lawyers; more likely it is wholly unknown. A lawyer’s avowed instrumentalism is the very problem to be addressed in this regard. For the scope of discussion, I refer to Vico’s famous On the Study Methods of Our Time and draw my conclusion for the lawyer of our time.  相似文献   
88.
Research Summary Over the past two decades, researchers have been increasingly interested in measuring the risk of offender recidivism as a means of advancing public safety and of directing treatment interventions. In this context, one instrument widely used in assessing offenders is the Level of Service Inventory‐Revised (LSI‐R). Recently, however, the LSI‐R has been criticized for being a male‐specific assessment instrument that is a weak predictor of criminal behavior in females. Through the use of meta‐analytic techniques, we assessed this assertion. A total of 27 effect sizes yielded an average r value of .35 ([confidence interval] CI = .34 to .36) for the relationship of the LSI‐R with recidivism for female offenders (N= 14,737). When available, we also made within‐sample comparisons based on gender. These comparisons produced effect sizes for males and females that were statistically similar. Policy Implications These results are consistent with those generated in previous research on the LSI‐R. They call into question prevailing critiques that the LSI‐R has predictive validity for male but not for female offenders. At this stage, it seems that corrections officials should be advised that the LSI‐R remains an important instrument for assessing all offenders as a prelude to the delivery of treatment services, especially those based on the principles of effective intervention. Critics should be encouraged, however, to construct and validate through research additional gender‐specific instruments that revise, if not rival, the LSI‐R.  相似文献   
89.
90.
Little attention has been given to repeat violent and sexual victimization among college women. Using two national-level data sets, the authors find that a small proportion of college women experience a large proportion of violent and sexual victimizations. Women are more likely to experience repeat sexual victimization than repeat violence incidents. Repeat victimization tends to happen in the same month of the initial victimization, and the most likely next type of victimization is by far the same type of victimization. Comparing incident-level characteristics of repeat incidents to single incidents, there are few differences, with the exception that, in a larger proportion of single incidents, women took self-protective action. Implications for prevention and educational programs are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号