首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   682篇
  免费   13篇
各国政治   37篇
工人农民   98篇
世界政治   54篇
外交国际关系   24篇
法律   280篇
中国政治   5篇
政治理论   195篇
综合类   2篇
  2023年   4篇
  2022年   6篇
  2021年   2篇
  2020年   13篇
  2019年   11篇
  2018年   18篇
  2017年   17篇
  2016年   23篇
  2015年   11篇
  2014年   19篇
  2013年   98篇
  2012年   17篇
  2011年   27篇
  2010年   21篇
  2009年   22篇
  2008年   25篇
  2007年   24篇
  2006年   29篇
  2005年   23篇
  2004年   25篇
  2003年   13篇
  2002年   14篇
  2001年   11篇
  2000年   18篇
  1999年   14篇
  1998年   10篇
  1997年   16篇
  1996年   14篇
  1995年   9篇
  1994年   14篇
  1993年   12篇
  1992年   10篇
  1991年   4篇
  1990年   12篇
  1989年   9篇
  1988年   8篇
  1987年   7篇
  1986年   7篇
  1985年   8篇
  1984年   7篇
  1983年   5篇
  1982年   9篇
  1981年   7篇
  1980年   6篇
  1978年   3篇
  1977年   2篇
  1976年   3篇
  1974年   2篇
  1973年   2篇
  1956年   1篇
排序方式: 共有695条查询结果,搜索用时 15 毫秒
61.
This article argues for the importance of more focused scholarly attention on the development of mass‐elite linkages ‐ and in particular those linkages that transcend the electoral connection ‐ for understanding democratic consolidation, drawing on the post‐communist experience of the Czech Republic as a case study. Starting with the government's loss of its majority in the 1996 Czech elections amidst favourable economic conditions, we argue that this electoral result goes beyond the response to policy priorities to point to larger deficits in the development of channels of access and communication in the policy‐making process. Such deficits, characteristic of the post‐communist experience regionally, are not merely legacies of the stunted civil societies of the communist period, but also reflect a post‐communist style of governance that may itself discourage regularized citizen and associational input. As the episodic electoral connection alone cannot bear the weight of democratic consolidation, the risk is a pattern of mass‐elite linkages that creates a punctuated politics of elections and street demonstrations.  相似文献   
62.
Post-9/11, and especially with the dramatic rise of Islamic State in Iraq and the Levant (ISIL), the author advocates a collective right to security. Plotting a course through state absolutism and liberalism, one finds communitarianism as a philosophy to support this right to security. The communitarian right to security is based on an interpretation of European human rights law, particularly positive duties of the state, to protect the rights to life of individuals from violations by non-state actors such as suspected terrorists. But for reasons of practical enforcement, limitations to the exercise of the right are also articulated.  相似文献   
63.
This article considers recent attempts to reform German federalism, the failed 2004 reform, and the reforms agreed in 2006 and 2009. It compares partisan, ideological and territorial factors which contribute to an understanding of reform, finding that all three have a role in explaining actors’ views of reform proposals. Two other claims are developed: that in some aspects of the reforms, a division between ‘generalist’ and ‘subject specialist’ politicians became apparent; and that a decisive change between 2004 and 2006 was the formation of a grand coalition at a federal level, which paved the way for agreement upon reform proposals.  相似文献   
64.
The labor market in Russia has changed significantly during the last decade. This transformation has resulted in notable changes in employment and unemployment patterns, and in labor mobility, flexibility and insecurity. One critical question is whether these changes signal important differences in labor market outcomes by gender. The approach taken here is to focus on the Russian industrial enterprise. In our study, we find that women experience different internal labor market opportunities and external job prospects than men and those differences in experience are reflected in the actual hiring practices at our firms, with men substituting for women, and women finding it particularly difficult to negotiate the increasingly closed labor market in Russia. At the same time important differences persist among women, differences that do not exist for men.  相似文献   
65.
66.
This article examines criminal HIV exposure statues that address undisclosed exposure through consensual sexual activity. Twenty-seven U.S. states have adopted some form of HIV exposure statute. Thirteen of these statutes specifically address exposure through sexual activity, while another eleven statutes could be applied to exposure through sexual activity, while another eleven statutes could be applied to exposure through consensual sexual interactions. Although the penalties for breach of these laws are often severe, the risk of actual harm posed by the many of the behaviors prescribed is minimal and in some cases virtually nonexistent. After an overview of the various types of U.S. criminal HIV exposure statutes and discussion of the risk of HIV transmission through the various sexual activities addressed in the laws, the authors highlight the tenuous relationship between proscribed activities and actual risk of virus transmission. The authors address this limitation in the law by offering a framework for the evaluation and construction of HIV exposure statutes that considers not only the intent of the HIV-positive actor but also the risk that his or her conduct poses to others.  相似文献   
67.
This article introduces psychologists to aspects of the legal process most pertinent to their role as expert witnesses in civil litigation. It summarizes the role of psychological evidence in the adjudication of common law tort claims, the structure of the court system, and the stages of the litigation process. It also explains the various roles a psychological expert may play during litigation and the implications of those roles for expert confidentiality and disclosure. The article then provides an overview of legal policy governing the admissibility of psychological expertise, especially as admissibility is affected by the “Daubert” standard applied in most North American courts.  相似文献   
68.
Assessing law enforcement preparedness to address Internet fraud   总被引:1,自引:0,他引:1  
Recent societal concern regarding computer crime was well documented in the research literature. To date, however, modest research addressed how large, local police and sheriff's departments confront Internet fraud. Using data collected from surveys distributed to the seven hundred largest police- and sheriff's departments, the present article addresses law enforcement: (1) preparedness to enforce Internet fraud crimes; (2) perceptions of Internet fraud; (3) cooperative policing efforts; and (4) Internet fraud information dissemination practices. Among other things, results suggested that individuals within these departments believed Internet fraud was problematic, although they lacked the resources to properly address the problem. These results are discussed as they relate to the organizational design of law enforcement agencies and their potential to adapt to innovative crimes. Suggestions are offered for a more effective approach to confronting Internet fraud.  相似文献   
69.
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号