首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9297篇
  免费   311篇
各国政治   619篇
工人农民   377篇
世界政治   714篇
外交国际关系   386篇
法律   5399篇
中国共产党   2篇
中国政治   140篇
政治理论   1882篇
综合类   89篇
  2020年   123篇
  2019年   141篇
  2018年   209篇
  2017年   224篇
  2016年   232篇
  2015年   199篇
  2014年   206篇
  2013年   1125篇
  2012年   240篇
  2011年   326篇
  2010年   235篇
  2009年   252篇
  2008年   263篇
  2007年   256篇
  2006年   234篇
  2005年   204篇
  2004年   230篇
  2003年   242篇
  2002年   171篇
  2001年   358篇
  2000年   335篇
  1999年   296篇
  1998年   150篇
  1997年   104篇
  1996年   113篇
  1995年   102篇
  1994年   111篇
  1993年   107篇
  1992年   165篇
  1991年   161篇
  1990年   149篇
  1989年   142篇
  1988年   161篇
  1987年   160篇
  1986年   163篇
  1985年   147篇
  1984年   147篇
  1983年   155篇
  1982年   95篇
  1981年   68篇
  1980年   80篇
  1979年   99篇
  1978年   78篇
  1977年   66篇
  1976年   70篇
  1975年   59篇
  1973年   49篇
  1972年   53篇
  1971年   54篇
  1969年   54篇
排序方式: 共有9608条查询结果,搜索用时 323 毫秒
1.
2.
ABSTRACT

Since the late 20th century, the federal government has regulated colleges’ and universities’ handling of campus sexual and gender-based violence (CSGBV). Although the arc of history has bent toward establishing greater protections for victims of such violence, new proposed regulation by the U.S. Department of Education under the Trump administration focuses more heavily on ensuring due process rights for students accused of CSGBV. Most recently, in November 2018, U.S. Secretary of Education, Betsy DeVos submitted a proposed rule change to the regulation of Title IX of the Education Amendments of 1972. This article provides the historical context for this most recent proposed federal regulation of CSGBV and discusses the criticism of this proposal that, if it is implemented, students would become less safe in the ivory tower.  相似文献   
3.
Following 9/11, Al-Qaeda-orchestrated plots were considered the greatest threat to Western security and sparked the coalition’s war on terror. Close to a decade later, the post-9/11 threat landscape had shifted significantly, leading then CIA-director Leon Panetta to describe “the lone-wolf strategy” as the main threat to the United States. Subsequent lone-actor attacks across the West, including the cities of London, Nice, Berlin, Stockholm, Ottawa and Charleston, further entrenched perspectives of a transformed security landscape in the “after, after-9/11” world. The unique features of lone-actor terrorism, including the challenges of interdiction and potential of copycat attacks, mean that the media is likely to play a particularly important role in shaping the reactions of the public, affected communities and copycat attackers. This article presents findings from a content analysis of British and Danish newspaper reporting of lone-actor terrorism between January 2010 and February 2015. The study highlights that lone-actor terrorism is framed, with national variations, as a significant and increasing problem in both countries; that Islamist lone-actors are often represented as distinct from far-right lone-actors; and that some reporting, despite relatively limited amplification of specific terrorist messages, potentially aids lone-actors by detailing state vulnerabilities to attacks.  相似文献   
4.
Governments are increasingly implementing smart and digital approaches to promoting citizen participation. However, whether online participation platforms are tools that improve inclusivity in citizen participation remains underexplored. To address this gap, this article focuses on the role of recruitment messages and their effect on participation in an online participation platform by gender and age. A field experiment with a neighborhood census sample (N = 6,066) shows that online participation dips for younger and older citizens and is equal among women and men. For the age groups between 60 and 75, differences in the control and intervention recruitment messages significantly impacted participation. These findings can help public managers tailor recruitment strategies to facilitate inclusive participation and represent a first step toward learning what types of messages are effective for whom.  相似文献   
5.
In response to research demonstrating that irrelevant contextual information can bias forensic science analyses, authorities have increasingly urged laboratories to limit analysts' access to irrelevant and potentially biasing information (Dror and Cole (2010) [3]; National Academy of Sciences (2009) [18]; President's Council of Advisors on Science and Technology (2016) [22]; UK Forensic Science Regulator (2015) [26]). However, a great challenge in implementing this reform is determining which information is task-relevant and which is task-irrelevant. In the current study, we surveyed 183 forensic analysts to examine what they consider relevant versus irrelevant in their forensic analyses. Results revealed that analysts generally do not regard information regarding the suspect or victim as essential to their analytic tasks. However, there was significant variability among analysts within and between disciplines. Findings suggest that forensic science disciplines need to agree on what they regard as task-relevant before context management procedures can be properly implemented. The lack of consensus about what is relevant information not only leaves room for biasing information, but also reveals foundational gaps in what analysts consider crucial in forensic decision making.  相似文献   
6.

Identity and academic motivation are particularly at stake before the major transition to higher education. However, few studies have explored their changes and their longitudinal bidirectional links. To fill this gap, a three-wave study from the end of the 11th grade to the end of the 12th grade was conducted to explore changes in identity processes and academic motivation and to investigate how they might be interconnected over time. 599 adolescents (mean age 17.4; 59% girls) completed questionnaires containing measures about identity processes and three types of academic motivation: autonomous, controlled, and impersonal. Throughout the study span of one year, four identity processes increased: commitment making, identification with commitment, exploration in breadth and exploration in depth, while the process of ruminative exploration decreased. Simultaneously, late adolescents encountered an increase in impersonal motivation, more salient for boys. The results also revealed unidirectional links from motivation to identity processes, with no gender or age moderator effects: exploration in breadth and exploration in depth were positively predicted by autonomous motivation, ruminative exploration was positively predicted by autonomous, controlled, and impersonal motivation. In addition, impersonal motivation negatively predicted commitment making. On the other hand, identification with commitment positively predicted autonomous motivation. Practical implications are discussed.

  相似文献   
7.
8.
ABSTRACT

Many liberals have been immodest in postulating that their own progressive, secular liberalism is the only one that can be justified in public reason. In Liberalism’s Religion, I articulate a more modest theory of liberalism and religion. While I personally endorse progressive secular liberalism, I argue that it is only one of the reasonable conceptions of liberal justice. This liberal modesty has profound, hitherto unnoticed implications for (i) the role of religious arguments in the public sphere, (ii) the legitimacy of religious establishment, and (iii) the justifiability of religious exemptions. In this article, I defend these three claims by providing replies to my critics.  相似文献   
9.
This paper draws on recent research examining feminist and everyday geopolitics to focus on the relatively neglected domestic sphere as a space where geopolitical events like the Falklands/Malvinas war are learnt, (re)produced, remembered and contested by young people. It presents qualitative data drawn from interviews with young people from Argentina (Río Gallegos) and the Falkland Islands (Stanley), locations with intimate connections to the 1982 war. It argues that research in domestic environments that engages the familial relations, objects and practices that embody geopolitical pasts can help make sense of how young people (are able to) express geopolitical agency.  相似文献   
10.
Numerous accounts reveal that congressional leaders often secure “hip‐pocket votes” or “if you need me” pledges from rank‐and‐file legislators. These are essentially options on votes. Leaders exercise sufficient options—pay legislators to convert to favorable votes—when those options will yield victory. Otherwise, they release the options. A model shows that this optimal strategy for leaders produces many small victories, few small losses, and losses that are, on average, larger than victories. We find precisely these patterns, hence strong evidence for vote options, in Congressional Quarterly key votes from 1975 through 2001 and in non‐key votes from the 106th Congress (1999–2000).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号