首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   241篇
  免费   27篇
各国政治   27篇
工人农民   8篇
世界政治   16篇
外交国际关系   19篇
法律   107篇
中国政治   2篇
政治理论   88篇
综合类   1篇
  2024年   1篇
  2023年   2篇
  2022年   1篇
  2021年   5篇
  2020年   5篇
  2019年   9篇
  2018年   12篇
  2017年   21篇
  2016年   21篇
  2015年   10篇
  2014年   10篇
  2013年   36篇
  2012年   17篇
  2011年   9篇
  2010年   7篇
  2009年   11篇
  2008年   8篇
  2007年   18篇
  2006年   12篇
  2005年   10篇
  2004年   12篇
  2003年   3篇
  2002年   8篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   3篇
  1997年   4篇
  1996年   1篇
  1995年   1篇
  1993年   1篇
  1992年   1篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1984年   1篇
  1973年   1篇
排序方式: 共有268条查询结果,搜索用时 46 毫秒
261.
Despite the growing awareness of mass marketing fraud (MMF) in the financial abuse of vulnerable older people, little empirical research has been undertaken in this area. This paper is one of the first to consider the perspectives of a range of professionals who work with victims of mass marketing fraud and financial crime. MMF is a growing threat in the financial abuse of older people, and is increasingly recognised as a concern for professionals involved in supporting and safeguarding vulnerable older people. This paper considers the themes emerging from a small exploratory qualitative study into the perspectives of professionals working to safeguard those at risk of MMF and considers some of the complexities involved in tackling MMF. This involves consideration of the techniques used to groom and lure victims in plausible looking frauds, and the factors that serve to reinforce their sustained involvement in such activity.  相似文献   
262.
Since 9/11, several states have initiated military conflicts in the name of fighting terrorism. However, studies indicate that the costs of terrorism are insignificant compared to the damage created by war. This raises the question: Why do states initiate costly wars when the risk posed by terrorism appears marginal? This study presents two explanations. First, we argue that while terrorists frequently fail to achieve their strategic objectives, terrorists can accomplish tactical objectives and may transition to insurgencies by seizing control of pockets of territory. States may respond by initiating preventive wars to stop terrorists from consolidating control over their strategically valuable territories (e.g., resource‐rich areas). Second, rival states may opportunistically exploit terrorist violence by declaring that the government is a “weak state.” This allows rivals to seize portions of the government's territory under the cover of fighting terror. We test these hypotheses using post–Cold War African dyads from 1990 to 2006.  相似文献   
263.
In this article, we are interested in the extent to which federalism is able to deal with peripheral protest through shared rule channels. Shared rule as a key dimension of federal states has not thus far received adequate academic attention. Empirically, we analyse the use of all cantonal initiatives in Switzerland over the past 25 years as a particular instrument of shared rule, subsequently focusing on two peripheral regions with successful regionalist parties, Ticino and Geneva. We find that regionalist parties contribute towards radicalizing peripheral demands in search of attention from the centre. This leads to the mainstreaming of peripheral demands by pulling other parties along. We conclude that shared rule properly designed gives even the most peripheral regions a voice in national decisions, but that regionalist parties may also use shared rule instruments to mobilize their electorate at home to fight their non-regionalist competitors.  相似文献   
264.
The public's approval of Congress is at an all time low. The parties seem to have taken the legislative process hostage for their own electoral gain. Whereas traditional arguments about congressional dysfunction focus on polarized voting coalitions or outputs – particularly legislation – in this article we highlight congressional information processing and how it has changed in this highly partisan era. By coding congressional hearings according to the kind of information on which they focus, we find that members of Congress are receiving one‐sided information to a greater degree and are spending less time learning about potential solutions. We use these results to make numerous recommendations for improving how Congress gathers its information.  相似文献   
265.
The ongoing and almost record‐breaking hiatus in devolved government in Northern Ireland has brought the sustainability of the region's Assembly into sharp focus. As parties in Northern Ireland consider their options for restoring (and possibly reforming) the devolved institutions, this article takes stock of the Northern Ireland Assembly's merits and demerits. It is argued that, amidst the public's understandable exasperation with the current stalemate, it is easy to forget that the Assembly operated for a decade without suspension (2007–2017) and performed some functions reasonably well. This, of course, is not to detract from the institution's serious shortcomings, though it is argued that the worst of these could be mitigated via institutional reform. Crucially, institutional inertia is not an option. Should parties fail to address the need for institutional reform, commentators may well be right to question whether the Assembly is worth restoring.  相似文献   
266.
Republicans hold that people are dominated merely in virtue of others' having unconstrained abilities to frustrate their choices. They argue further that public officials may dominate citizens unless subject to popular control. Critics identify a dilemma. To maintain the possibility of popular control, republicans must attribute to the people an ability to control public officials merely in virtue of the possibility that they might coordinate their actions. But if the possibility of coordination suffices for attributing abilities to groups, then, even in the best case, countless groups will be dominating because it will be possible for their members to coordinate their actions with the aim of frustrating others' choices. We argue the dilemma is apparent only. To make our argument, we present a novel interpretation of the republican concept of domination with the help of a game‐theoretic model that clarifies the significance of collective action problems for republican theory.  相似文献   
267.
268.
The Military Commissions Act of 2006 represents the United States’most recent effort to establish a forum to try detainees capturedin its ‘Global War on Terrorism’. This article brieflyexplores the Act's use of the term ‘unlawful enemy combatant’to define both subject matter jurisdiction as well as the potentialsource of criminal liability. The article highlights the term'sabsence from the positive law of war as well as confusion overits legal significance in United States domestic law. Examiningthe relationship between status and protections under the lawof war, the authors conclude the Act's use of the term ‘unlawfulenemy combatant’ reflects legal convenience more thanan objective assessment of the existing laws and customs ofwar.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号