首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3169篇
  免费   122篇
各国政治   239篇
工人农民   113篇
世界政治   303篇
外交国际关系   207篇
法律   1310篇
中国政治   14篇
政治理论   1028篇
综合类   77篇
  2023年   12篇
  2022年   12篇
  2021年   24篇
  2020年   50篇
  2019年   58篇
  2018年   109篇
  2017年   90篇
  2016年   114篇
  2015年   64篇
  2014年   81篇
  2013年   472篇
  2012年   102篇
  2011年   110篇
  2010年   84篇
  2009年   92篇
  2008年   107篇
  2007年   141篇
  2006年   84篇
  2005年   113篇
  2004年   106篇
  2003年   78篇
  2002年   90篇
  2001年   77篇
  2000年   81篇
  1999年   64篇
  1998年   54篇
  1997年   50篇
  1996年   56篇
  1995年   47篇
  1994年   47篇
  1993年   40篇
  1992年   50篇
  1991年   53篇
  1990年   49篇
  1989年   45篇
  1988年   38篇
  1987年   24篇
  1986年   29篇
  1985年   26篇
  1984年   27篇
  1983年   23篇
  1982年   33篇
  1981年   39篇
  1980年   28篇
  1979年   14篇
  1978年   14篇
  1977年   11篇
  1976年   9篇
  1975年   13篇
  1974年   12篇
排序方式: 共有3291条查询结果,搜索用时 14 毫秒
1.
This research note argues that the “lone wolf” typology should be fundamentally reconsidered. Based on a three-year empirical research project, two key points are made to support this argument. First, the authors found that ties to online and offline radical milieus are critical to lone actors' adoption and maintenance of both the motive and capability to commit acts of terrorism. Second, in terms of pre-attack behaviors, the majority of lone actors are not the stealthy and highly capable terrorists the “lone wolf” moniker alludes to. These findings not only urge a reconsideration of the utility of the lone-wolf concept, they are also particularly relevant for counterterrorism professionals, whose conceptions of this threat may have closed off avenues for detection and interdiction that do, in fact, exist.  相似文献   
2.
Journal of Youth and Adolescence - In the original publication, the legends for Figs 4 and 5 were incorrect, such that each regression line was mislabeled with the incorrect country. Below are the...  相似文献   
3.
Following 9/11, Al-Qaeda-orchestrated plots were considered the greatest threat to Western security and sparked the coalition’s war on terror. Close to a decade later, the post-9/11 threat landscape had shifted significantly, leading then CIA-director Leon Panetta to describe “the lone-wolf strategy” as the main threat to the United States. Subsequent lone-actor attacks across the West, including the cities of London, Nice, Berlin, Stockholm, Ottawa and Charleston, further entrenched perspectives of a transformed security landscape in the “after, after-9/11” world. The unique features of lone-actor terrorism, including the challenges of interdiction and potential of copycat attacks, mean that the media is likely to play a particularly important role in shaping the reactions of the public, affected communities and copycat attackers. This article presents findings from a content analysis of British and Danish newspaper reporting of lone-actor terrorism between January 2010 and February 2015. The study highlights that lone-actor terrorism is framed, with national variations, as a significant and increasing problem in both countries; that Islamist lone-actors are often represented as distinct from far-right lone-actors; and that some reporting, despite relatively limited amplification of specific terrorist messages, potentially aids lone-actors by detailing state vulnerabilities to attacks.  相似文献   
4.
5.
6.
7.
8.
This article considers the sentencing of two eighteenth centuryparricides, one committed by a daughter, the other by a son. In eachcase the sentencing remarks are first subject to generic analysis,derived from the work of Rukiya Hasan and Susan Urmston Philips. Withinthose thematic structures there is a traditional rhetorical analysis. Bycombining both types of analysis one can demonstrate the salientfeatures of each set of judicial remarks. The focus of the article thenshifts from these texts to their contexts, and reveals features in theiroffence narratives which have been omitted in these otherwise powerfulrhetorical utterances. Explanations for these silences are given.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号