首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   185篇
  免费   7篇
各国政治   3篇
工人农民   9篇
世界政治   32篇
外交国际关系   7篇
法律   90篇
中国政治   2篇
政治理论   48篇
综合类   1篇
  2023年   2篇
  2020年   4篇
  2019年   7篇
  2018年   7篇
  2017年   14篇
  2016年   8篇
  2015年   2篇
  2014年   3篇
  2013年   40篇
  2012年   7篇
  2011年   6篇
  2010年   5篇
  2009年   3篇
  2008年   5篇
  2007年   6篇
  2006年   10篇
  2005年   5篇
  2004年   5篇
  2003年   6篇
  2002年   7篇
  2001年   1篇
  2000年   1篇
  1999年   3篇
  1998年   1篇
  1995年   5篇
  1994年   1篇
  1992年   3篇
  1991年   1篇
  1990年   1篇
  1989年   2篇
  1988年   4篇
  1987年   6篇
  1986年   2篇
  1984年   1篇
  1982年   1篇
  1980年   1篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1966年   1篇
  1964年   1篇
排序方式: 共有192条查询结果,搜索用时 15 毫秒
1.
Criminologists have long debated the issue of how to define crime, and hence, the scope of criminological inquiry. For years, some critical criminologists have argued for expanded definitions of crime that include harmful behaviors of the state that may not be officially defined as criminal. Other critical criminologists have argued that existing legal frameworks may be used to study varieties of state crime, and that defining the harmful actions of the state as criminal is important to help mobilize public support for their control. In this paper, we first trace the historical development of these two perspectives, and then offer a tentative solution to the seeming tension between these two perspectives.  相似文献   
2.
The authors examine the characteristics of threatening and otherwise inappropriate communications sent to members of the U.S. Congress by a sample of 86 subjects, 20 of whom threatened assassination. We quote excerpts from these letters and provide quantitative data on such variables as the volume, duration, form, and appearance of such communications; the enclosures; the subjects' perceived relationships to the recipients; the thematic content of the communications; and the messages and threats communicated. Comparisons between 43 subjects who pursued encounters with members of Congress and 43 who did not revealed 17 factors associated with such pursuit. In this population, threateners were significantly less likely to pursue an encounter than inappropriate letter writers who did not threaten, regardless of the type of threat or the harm threatened. Inappropriate letters to members of Congress are compared with those directed to Hollywood celebrities. Mentally disordered persons writing to public figures often mention and sometimes threaten public figures other than those to whom the letters are addressed, which raises important issues regarding notification of endangered third parties and the sharing of information among protective agencies.  相似文献   
3.
The purpose of this article is to determine how the rate of unemployment will impact on unemployment benefits in Barbados using annual data from 1982 to 2009 with the use of an impulse response function. The results show that when a shock is applied to the rate of unemployment, which causes it to rise, unemployment benefits will contract marginally and this reaction will not stabilize until the 14th period when a new equilibrium will be attained. Since this new equilibrium will lie below the original equilibrium, rising unemployment will impact negatively on unemployment benefits although this decline will only be marginal.  相似文献   
4.
5.
This article looks to answer the question of why the James Bond novels and films should matter to scholars of intelligence and national security. We argue that Bond is important because, rightly or wrongly, and not without inaccuracy, it has filled a public knowledge vacuum about intelligence agencies and security threats. On another level, this article explores the unexpected yet important interactions between Bond and the actual world of intelligence. We contend that the orthodoxy dictating that Bond and spying are diametric opposites—one is the stuff of fantasy, the other is reality—is problematic, for the worlds of Bond and real intelligence collide, overlap and intermesh in fascinating and significant ways. In short, Bond is important for scholars because he is an international cultural icon that continues to operate at the borders of fiction and reality, framing and constructing not only public perceptions but also to some degree intelligence practices. Core narratives of intelligence among not only the public but also policymakers and intelligence officers are imagined, sustained, deepened, produced and reproduced through and by Bond. We conclude that Bond and intelligence should be thought of as co-constitutive; the series shapes representations and perceptions of intelligence, but it also performs a productive role, influencing the behaviours of intelligence agencies themselves.  相似文献   
6.
7.
Governments at all levels buy mission‐critical goods and services whose attributes and performance requirements are hard to define and produce. Many governments—and the public managers who lead them—lack experience and knowledge about how to contract for complex products. The contract management counsel provided to public managers is thin. Missing is a conceptual managerial framework to guide purchasing the complex products that are often so critical to public organizations' core missions. Drawing on perspectives from across the social sciences, the framework presented in this article provides guidance on how managers can harness the upsides of complex contracting while avoiding its pitfalls. The framework helps identify conditions that increase the likelihood of positive outcomes for the purchasing government and the vendor—the win‐win. To illustrate the framework, the article provides examples of successful and failed acquisitions for complex products such as transportation projects, social service systems, and information technology systems.  相似文献   
8.
This paper will examine some of the ways in which development has been influenced by the body of ideas known as techne, or technics. This body of ideas focuses on a central theme that envisages technology broadly defined as developing its own impetus that removes it from the control of human agency and that begins to circumscribe and even control human agency. This can be seen as having various impacts on development, notably a subsumption of any concern for human development to issues concerning process and production of outputs. The paper focuses on the approach of Heidegger as he provides an account that places technology at the centre of human being, whilst helping to distinguish both the negative (enframing) tendencies and the emancipatory (or, as Heidegger might have it, poietic) possibilities of technics. The paper concludes by identifying some of these negative and emancipatory influences in the development context.  相似文献   
9.
Abstract: The effects of the Electronic Lodgment Service on relations between tax agents and the Australian Taxation Office provide evidence for both the value and limitations of integrating information technology innovation with regulatory reform strategy. IT innovations such as ELS can promote cooperative regulation. The limitations of this achievement are largely limitations of regulatory context and strategy.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号