首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   158篇
  免费   0篇
各国政治   3篇
工人农民   33篇
世界政治   5篇
外交国际关系   8篇
法律   88篇
中国政治   2篇
政治理论   19篇
  2023年   1篇
  2021年   1篇
  2020年   5篇
  2019年   3篇
  2018年   3篇
  2017年   5篇
  2016年   4篇
  2015年   7篇
  2014年   8篇
  2013年   28篇
  2012年   3篇
  2011年   2篇
  2010年   2篇
  2009年   3篇
  2008年   11篇
  2007年   5篇
  2006年   5篇
  2005年   6篇
  2004年   5篇
  2003年   2篇
  2002年   5篇
  2001年   4篇
  2000年   2篇
  1999年   3篇
  1998年   3篇
  1997年   3篇
  1996年   2篇
  1995年   3篇
  1994年   1篇
  1993年   4篇
  1992年   2篇
  1991年   5篇
  1989年   1篇
  1988年   1篇
  1985年   1篇
  1984年   3篇
  1983年   1篇
  1981年   3篇
  1980年   1篇
  1979年   1篇
排序方式: 共有158条查询结果,搜索用时 31 毫秒
71.
72.
73.
This article brings the state into constitutional theory by presenting a theory of the development of the American state from the late 19th century to the present. The focus of the theory is the ability of the national state to exercise sovereignty or public authority over civil society. The main thesis is that the Constitution did not establish a government with a level of public authority adequate to the requirements of a modem democratic state. The result was a mismatch between the demands of civil society and the competence of state institutions, causing a reorganization of the political institutions of civil society in the early 20th century and a crisis of public authority in the 1960s. The United States continues to experience the consequences of an imbalance between the state institutions established by an 18th-century constitution and 20th-century democratic politics.  相似文献   
74.
75.
In summer 2006, elements of the British Army were deployed to Helmand province in southern Afghanistan. The US Army followed with a surge in 2009 and 2010. The British and American military forces attempted to construct a counterinsurgency (COIN) approach to win the war in Helmand from 2006 until 2011, but the operational approach implemented was most often that of conventional warfighting. The inability to successfully implement COIN owed not to a lack of will, but rather to short tours, mission command, a lack of available resources, the particular situation on the ground in Helmand and the propensity of the Taliban to launch major conventional operations during much of the period in question.  相似文献   
76.
77.
There has been much debate in the UK as to whether copyright law should have an unjustified threats provision similar to that found in UK patent, trade mark, and registered design law. Unjustified threats provisions for copyright law exist in other commonwealth jurisdictions, such as Australia and India. We argue that all of the existing unjustified threats provisions in the UK are too narrow in their scope. Threats more generally have played a significant role in the development of copyright law, and a provision aimed at ‘unjustified’ threats may paradoxically restrict discourse about the scope of copyrights. We therefore suggest that the best way to proceed is not just to introduce an unjustified threats provision but instead to make clearer what is, and is not, protected by copyright.  相似文献   
78.
79.
The “Rotten Apple” theory states that deviant police officers are those who psychological testing fails to screen out. This concept is favored by police administrators because it offers a quick and easy solution to police deviant behavior. However, there is a growing body of literature that suggests that it is the stressful occupation that is policing that is the fertile soil from which police deviant behavior springs otherwise known as the “Rotten Barrel” theory. This article shall explore police deviant behavior from the perspective that it is the “Rotten Barrel” that leads to police deviant behavior.  相似文献   
80.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号