首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13360篇
  免费   735篇
各国政治   702篇
工人农民   527篇
世界政治   1192篇
外交国际关系   513篇
法律   8545篇
中国共产党   1篇
中国政治   61篇
政治理论   2496篇
综合类   58篇
  2023年   76篇
  2021年   123篇
  2020年   297篇
  2019年   368篇
  2018年   388篇
  2017年   477篇
  2016年   462篇
  2015年   351篇
  2014年   425篇
  2013年   1503篇
  2012年   371篇
  2011年   416篇
  2010年   365篇
  2009年   364篇
  2008年   387篇
  2007年   372篇
  2006年   371篇
  2005年   312篇
  2004年   330篇
  2003年   303篇
  2002年   284篇
  2001年   511篇
  2000年   473篇
  1999年   331篇
  1998年   210篇
  1997年   162篇
  1996年   140篇
  1995年   138篇
  1994年   164篇
  1993年   150篇
  1992年   211篇
  1991年   235篇
  1990年   215篇
  1989年   221篇
  1988年   212篇
  1987年   201篇
  1986年   233篇
  1985年   211篇
  1984年   167篇
  1983年   174篇
  1982年   117篇
  1981年   123篇
  1980年   94篇
  1979年   138篇
  1978年   81篇
  1977年   80篇
  1976年   72篇
  1974年   78篇
  1973年   76篇
  1972年   74篇
排序方式: 共有10000条查询结果,搜索用时 46 毫秒
1.
Criminal Law Forum - Fair labelling is an established principle of criminal justice that scrutinises the way that States use language in labelling criminal defendants and their conduct. I argue...  相似文献   
2.
Kalulé  Peter 《Law and Critique》2019,30(2):137-158
Law and Critique - Generally, regulation is thought of as a constant that carries with it both a formative and conservative power, a power that standardises, demarcates and forms an order, through...  相似文献   
3.
This research note argues that the “lone wolf” typology should be fundamentally reconsidered. Based on a three-year empirical research project, two key points are made to support this argument. First, the authors found that ties to online and offline radical milieus are critical to lone actors' adoption and maintenance of both the motive and capability to commit acts of terrorism. Second, in terms of pre-attack behaviors, the majority of lone actors are not the stealthy and highly capable terrorists the “lone wolf” moniker alludes to. These findings not only urge a reconsideration of the utility of the lone-wolf concept, they are also particularly relevant for counterterrorism professionals, whose conceptions of this threat may have closed off avenues for detection and interdiction that do, in fact, exist.  相似文献   
4.
This article investigates off-farm work decisions by smallholder farm households. Using data on 1,101 households from Burkina Faso, it demonstrates that in addition to the usual household socio-demographic characteristics, remittances, access to information and beneficiary of specific training affect off-farm work decisions, as well as rainfall factors and idiosyncratic health shocks. Community characteristics such as accessibility and number of inhabitants are also key factors. While suggesting that off-farm work is less likely to be undertaken for accumulation purposes, these results have important policy implications. In particular, policy measures should consider each segment as a separate entity.  相似文献   
5.
ABSTRACT

Since the late 20th century, the federal government has regulated colleges’ and universities’ handling of campus sexual and gender-based violence (CSGBV). Although the arc of history has bent toward establishing greater protections for victims of such violence, new proposed regulation by the U.S. Department of Education under the Trump administration focuses more heavily on ensuring due process rights for students accused of CSGBV. Most recently, in November 2018, U.S. Secretary of Education, Betsy DeVos submitted a proposed rule change to the regulation of Title IX of the Education Amendments of 1972. This article provides the historical context for this most recent proposed federal regulation of CSGBV and discusses the criticism of this proposal that, if it is implemented, students would become less safe in the ivory tower.  相似文献   
6.
This article argues that Donald Trump’s Asian strategy hardly marks a radical transformation from Barack Obama’s ‘pivot to Asia’. This is because the ‘pivot to Asia’ never really existed. Although Obama was successful in building legitimacy for the strategy through international norms, he failed to translate his lofty rhetoric into practice. Much of his original pivot components (building a constructive relationship with China, coordinating with Asian allies and multilateralism in the Association of South East Asian Nations and the Trans-Pacific Partnership) has either failed or did not live up to expectations. Donald Trump was adamant that the Asian pivot was a bad strategy and that he would not follow it. But although he completely discarded Obama’s legitimization of the rebalance (as Trump speaks pragmatically and does not care about international norms), in actuality he has followed many of Obama’s policies, and even improved on some of them. That being said, Trump’s ‘pivot actions’ appear to be erratic, pragmatic short-term actions rather than a meticulously planned long-term strategy similar to Obama’s rebalance (which did not materialize). Thus, while Obama failed to transform the pivot into an effective strategy, neither is Trump’s effectiveness backed by a coherent Asian strategy.  相似文献   
7.
ABSTRACT

Copyright is inherently intertwined with the development of technology and none more so than the advent of the Internet and sharing technologies. More recently, social media platforms have become the latest challenge for copyright law and policy. This article builds on the literature that recognises the underlying conflict between copyright and social networking sites (SNSs); namely that the basic implication of copyright is the restriction of copying, whereas the ethos of social networking is the promotion of sharing. In particular, this article focuses on the disparity between the restricted acts of copying and communication to the public under copyright law and the encouragement of sharing on SNS Instagram. In doing so, it contextualises the debate surrounding copyright and social media and provides an understanding of the legal implications of using Instagram. As such this paper analyses (1) the infringement of copyright protected work on Instagram, and (2) the user-agreement and licensing of copyright material on Instagram. This study concludes that the disparity between the principles of copyright and social media lead to confusion and vulnerability of users. Therefore, it is suggested that Instagram should better inform its users of the implications of sharing third-party content as well as the terms of its user agreement. This could be done by implementing a copyright strategy, which includes a notice and takedown system as well as investing in producing educational content for users. Perhaps SNSs, such as Instagram might be more motivated to take steps to recognise intellectual property rights if they were considered Internet Services Provides such as YouTube.  相似文献   
8.
Why did the Punjab bear the brunt of the mass violence and the migration that accompanied the partition of India? This paper makes the case for analytical eclecticism by showing that the following three explanations – centred respectively on democratisation, nationalism, and ideas; the commitment problem; and the security dilemma – account for the violence/migration in the different stages in the run-up to the partition of India. Instead of arguing that ‘everything mattered’, this paper elucidates the complex causality at work by demonstrating how these factors interacted with one another during the different stages leading to India’s partition.  相似文献   
9.
Journal of Youth and Adolescence - In the original publication, the legends for Figs 4 and 5 were incorrect, such that each regression line was mislabeled with the incorrect country. Below are the...  相似文献   
10.
This study describes the performance of handheld Raman devices for determining whether suspect pharmaceutical tablets declared to contain controlled substances were consistent with authentic (CWA) or not consistent with authentic (NCWA) tablets using a simple, rapid, field-friendly method capable of being used by nonexperts. Twenty-five authentic products and 84 known NCWA tablets were examined using three “parent” devices for a total of 327 analyses. On average, the parent devices yielded a true pass rate of 100%, a true fail rate of 98.4%, a false pass rate of 1.6%, and a false fail rate of 0%. The methods/libraries were then transferred to 13 identical “daughter” devices, which were used to examine 10 suspect finished dosage forms in duplicate (six known NCWA tablets and four authentic tablets) for a total of 260 measurements. On average, the daughter devices had a true pass rate of 100%, a true fail rate of 95.5%, a false pass rate of 4.5%, and a false fail rate of 0.0%. These data demonstrate that the parent–daughter electronic transfer method was successful, which permits the ability to develop methods in the laboratory that can be seamlessly pushed out to field devices. The methods can then be used to (i) prioritize samples for additional testing using other more time-consuming laboratory-based techniques needed to detect and quantify active ingredients and (ii) help support the interdiction of dangerous tablets at ports of entry, thereby preventing them from reaching the supply chain.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号