首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   81篇
  免费   0篇
各国政治   3篇
工人农民   7篇
世界政治   6篇
外交国际关系   6篇
法律   28篇
政治理论   24篇
综合类   7篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   6篇
  2018年   2篇
  2017年   3篇
  2016年   2篇
  2015年   2篇
  2014年   2篇
  2013年   14篇
  2012年   1篇
  2011年   1篇
  2010年   1篇
  2009年   1篇
  2008年   1篇
  2007年   4篇
  2006年   2篇
  2004年   4篇
  2003年   3篇
  2002年   3篇
  2001年   2篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1995年   2篇
  1994年   2篇
  1993年   1篇
  1991年   1篇
  1990年   3篇
  1988年   2篇
  1987年   1篇
  1982年   1篇
  1975年   2篇
  1972年   1篇
  1971年   1篇
  1970年   3篇
  1969年   1篇
排序方式: 共有81条查询结果,搜索用时 15 毫秒
61.
62.
63.
Observing the divergent tracks taken by historians of the ‘modern self’ and those of the ‘modern body’ the article focuses on health and fitness movements in Britain, c.1920s–1930s. Asking whether there is a place for the body in the history of women performing ‘the self’ in this context, the article suggests a way in which contemporaries found a way to have a ‘self’ in the body. Contemporary notions of the body emphasised its interdependence with ‘the mind’, health and happiness being functions of each other. In the language of health and beauty was a language of inner vitality and outer radiance, a modern formulation of the individual as a ‘self’ equipped to embrace the exciting but uncertain possibilities of the ‘modern world’. Popular print culture on ‘healthy living’, reports by the BMA and the National Fitness Council are considered along with more extensive discussion of the Women's League for Health and Beauty founded in 1930 by Mollie Bagot Stack and inherited by her daughter, Prunella, ‘Britain's Perfect Girl’, in 1935.  相似文献   
64.
This article reports on a recent research project exploring academic perspectives on the threat posed by cyberterrorism. The project employed a survey method, which returned 118 responses from researchers working across 24 different countries. The article begins with a brief review of existing literature on this topic, distinguishing between those concerned by an imminent threat of cyberterrorism, and other, more skeptical, views. Following a discussion on method, the article's analysis section then details findings from three research questions: (1) Does cyberterrorism constitute a significant threat? If so, against whom or what?; (2) Has a cyberterrorism attack ever taken place?; and (3) What are the most effective countermeasures against cyberterrorism? Are there significant differences to more traditional forms of anti- or counterterrorism? The article concludes by reflecting on areas of continuity and discontinuity between academic debate on cyberterrorism and on terrorism more broadly.  相似文献   
65.
Carbon dioxide and a wide variety of other industrial gases, including methane, ozone, and feron, trap a portion of the earth's thermal radiation that would otherwise escape into space. This radiative trapping of energy produces the heating of the atmosphere popularly labeled the greenhouse effect. Detailed observations from remote stations show that the carbon dioxide concentration of the atmosphere has increased from 316 parts per million by volume (ppmv) in 1958 to 350 ppmv in 1986. The exponential growth in carbon dioxide levels parallels the increased worldwide use of carbon-based fuels. Methane concentrations are increasing at a rate of one to two percent per year, lower atmosphere ozone at a somewhat smaller rate, and freons at a current rate of five percent per year. Calculations of the expected increase in the average temperature of the earth's surface since 1900 lead to a value of about 0.5 °C if the moderating effect of the earth's oceans is taken into account. Calculations are based on models that range in complexity from simple energy balance considerations to detailed three-dimensionsl calculations that strain the capacity of current digital computers. Detailed analysis of tens of millions of surface-temperature observations indicate an average warming of about 0.5 °C since the turn of the century and a greater warming of 2 °C in high latitudes. Major climatic shifts can be expected as the warming proceeds at an increasing pace. The rate of anticipated warming is historically unpercedented.  相似文献   
66.
In this brief report, we present information on the Strength at Home intervention to treat male active duty or military veteran perpetrators of intimate partner violence (IPV) as well as preliminary pilot study findings. Strength at Home is a 12-session cognitive-behavioral group intervention developed by the authors that is based on a social information processing model of IPV perpetration. Six men referred to two intervention groups and five collateral female partners participated in this pilot study. Findings indicated large reductions for most indices of physical and psychological IPV from pre-treatment to 6-month follow-up. These initial results are promising though the small sample size and other study limitations preclude our ability to draw firm conclusions.  相似文献   
67.
68.
This article comparatively analyses the cases of Mexico and Chile to understand how women's movements contest the meaning of citizenship in various national contexts. We also assess the consequences that different movement strategies, such as ‘autonomy’ versus ‘double militancy’, have for movements' citizenship goals. To explain the different outcomes in the two cases, we focus on the nature of the democratic transition, the internal coherence of women's movements, the nature of alliances with other civil society actors, the ideological orientation of the newly democratized state, the form of women's agency within the state, and the nature of the neoliberal economic reforms. We argue that a serious problem for women in both Chile and Mexico is the fact that governments themselves are deploying the concept of citizenship as a way to legitimate their social and economic policies. While women's movements seek to broaden the meaning of citizenship to include social rights, neoliberal governments employ the rhetoric of citizen activism to encourage society to provide its own solutions to economic hardship and poverty. While this trend is occurring in both Chile and Mexico, there are some features of the political opportunity structure in Chile that enable organized women to contest the state's more narrow vision of democratic citizenship. In Mexico, on the other hand, the neoliberal economic discourse of the current government is matched by a profoundly conservative ideological rhetoric, thereby reducing the political opportunities for women to forward a gender equality agenda.  相似文献   
69.
Sex Differences in Political Knowledge in Britain   总被引:1,自引:0,他引:1  
This paper analyses, and examines the interpretation of, sex differences in political knowledge as measured in the context of nationally representative British surveys. The paper discusses the construction and operationalisation of 'knowledge' measures in survey research. British survey research finds striking sex differences in scores on political knowledge items. The inclusion of contextual variables, and of interactions between sex and other relevant variables, attenuates but does not eliminate consistent sex differences.  相似文献   
70.
This article explores constructions of cyberterrorism within the global news media between 2008 and 2013. It begins by arguing that the preoccupation with questions of definition, threat and response in academic literature on cyberterrorism is problematic, for two reasons. First, because it neglects the constitutivity of representations of cyberterrorism in the news media and beyond; second, because it prioritises policy-relevant research. To address this, the article provides a discursive analysis drawing on original empirical research into 31 news media outlets across the world. Although there is genuine heterogeneity in representations of cyberterrorism therein, we argue that constructions of this threat rely heavily on two strategies. First, appeals to authoritative or expert “witnesses” and their institutional or epistemic credibility; second, generic or historical analogies, which help shape understanding of the likelihood and consequences of cyberterrorist attack. These strategies have particular discursive importance, we argue, given the lack of readily available empirical examples of the “reality” of cyberterrorism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号