首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   962篇
  免费   52篇
各国政治   37篇
工人农民   60篇
世界政治   70篇
外交国际关系   55篇
法律   490篇
中国政治   15篇
政治理论   277篇
综合类   10篇
  2023年   11篇
  2022年   6篇
  2021年   15篇
  2020年   33篇
  2019年   23篇
  2018年   37篇
  2017年   42篇
  2016年   51篇
  2015年   35篇
  2014年   43篇
  2013年   135篇
  2012年   35篇
  2011年   23篇
  2010年   30篇
  2009年   44篇
  2008年   37篇
  2007年   53篇
  2006年   36篇
  2005年   44篇
  2004年   25篇
  2003年   35篇
  2002年   24篇
  2001年   17篇
  2000年   18篇
  1999年   13篇
  1998年   15篇
  1997年   9篇
  1996年   7篇
  1995年   10篇
  1994年   8篇
  1993年   6篇
  1992年   10篇
  1991年   5篇
  1990年   4篇
  1989年   5篇
  1988年   9篇
  1986年   5篇
  1985年   5篇
  1984年   4篇
  1983年   2篇
  1982年   7篇
  1981年   8篇
  1980年   2篇
  1979年   6篇
  1978年   2篇
  1977年   7篇
  1976年   2篇
  1975年   2篇
  1970年   3篇
  1968年   2篇
排序方式: 共有1014条查询结果,搜索用时 15 毫秒
981.
982.
With deinstitutionalization and community-based treatment of delinquents becoming more common, the need for facilities compatible with re-integration efforts is crucial. In line with the increasing local needs for dealing with juvenile offenders in the community, this paper advocates the use of delinquency theory as the conceptual foundation for the architectural design and placement of community-based alternatives to incarceration. In addition, we present guidelines for the site selection, community acceptance and physical design of a model community-based treatment facility for minor offenders, which are based on a theoretical integration of social control theory and the labeling approach.  相似文献   
983.
The Propaganda of the Deed: Terrorism, Counterterrorism, and Mobilization   总被引:1,自引:0,他引:1  
Many terrorist factions care about the level of popular support they enjoy within a population they claim to represent. Empirically, this level of support can either rise or fall in the aftermath of a campaign of terrorist violence. Under what circumstances is the use of terror an effective tactic for mobilizing political support for an extremist group? This article models a scenario in which an extremist faction considers attacking a government in the hopes of provoking a counterterror response that will radicalize the population, increasing the extremists' support at the expense of a more moderate faction. In our scenario, such radicalization can result either from the economic damage caused by counterterror operations or by the way in which such operations change the population's assessment of the government's motivations. We demonstrate that such attempts at mobilizing public support can be, but need not be, successful, discuss factors that make both the initiation of a terror campaign and successful mobilization more or less likely, and relate our results to several empirical cases.  相似文献   
984.
This article extends the calculus of rational voting (Riker/Ordeshook 1968) by considering the coalition building process and the legislative process (cf. Austen-Smith/Banks 1988) in multi-party systems. Comparing coalition preferences and their resulting legislative outcomes instead of party preferences, I elaborate preference profiles of voters on coalitions and estimate the probability that a coalition forms, given the parties’ coalition signals and an expected electoral result. I show the results of this rational calculus for the German Bundestag elections 2005 as a political map. Further, this calculus allows the identification of coalition signals that increase and those that reduce a party’s vote share.  相似文献   
985.
The aim of this study was to investigate specific pathways in the offending processes of nonserial sexual murderers and to examine possible relationships with different precrime, per-crime, and postcrime factors. Included in this study were 36 offenders who have committed at least one sexual murder against a female victim and they were classified using cluster analysis. Participants using the sadistic pathway planned their offenses and used physical restraints during the offenses. Furthermore, they mutilated and humiliated their victims. Finally, they hid the bodies of the victims. Participants using the anger pathway had not premeditated the homicide. Mutilation, humiliation, and physical restraints were less predominant with these participants than with those using the sadistic pathway. Moreover, these offenders were more likely to leave the bodies at the crime scenes after the killings occurred. These two profiles are compared with empirical studies addressing sexual homicide.  相似文献   
986.
Thirty physically abused adolescents were compared via the Offer Self-Image Questionnaire to thirty nonabused adolescents who were from a similar background. Another control group was comprised of normal adolescents tested by Offer, Ostrov, and Howard (1981). Results showed that physically abused adolescents feel worse in a number of areas when compared to nonabused adolescents. These areas include family relations, emotional stability, psychopathology, impulse control, coping skills, as well as poorer overall self-image. Implications are drawn for the professional's treatment of abused children and their responsibility to report abuse.This study was completed as part of the first author's doctoral dissertation at California Graduate Institute.Received Ph.D. from California Graduate Institute. Current research interests are psychoanalytic therapy and adolescent development.Received Ph.D. from the University of Chicago.  相似文献   
987.
The 1996 Bermuda Principles launched a new era in data sharing, reflecting a growing belief that the rapid public dissemination of research data was crucial to scientific progress in genetics. A historical review of data sharing policies in the field of genetics and genomics reflects changing scientific norms and evolving views of genomic data, particularly related to human subjects’ protections and privacy concerns. The 2013 NIH Draft Genomic Data Sharing (GDS) Policy incorporates the most significant protections and guidelines to date. The GDS Policy, however, will face difficult challenges ahead as geneticists seek to balance the very real concerns of research participants and the scientific norms that propel research forward. This article provides a novel evaluation of genetic and GDS policies’ treatment of human subjects’ protections. The article examines not only the policies, but also some of the most pertinent scientific, legal, and regulatory developments that occurred alongside data sharing policies. This historical perspective highlights the challenges that future data sharing policies, including the recently disseminated NIH GDS Draft Policy, will encounter.  相似文献   
988.
Wang Yajun, a security guard at the Central Academy of Drama, one of China’s top art institutions, from which many of the country’s renowned actors and actresses have sprung, unveiled a book on people’s outer appearances in April. The book,which sets out criteria for judging looks, points out that good-looking people tend to acquire more social resources and thus looks can help secure job promotions, wealth and increased social status.  相似文献   
989.
Since the 1980s, cremation has become the fastest growing area of the U.S. funeral industry. At the same time, the number of litigations against funeral homes and cremation facilities has increased. Forensic anthropologists are often asked to determine whether the contents of an urn are actually cremated bone, and to address questions regarding the identity of the remains. This study uses both metric and chemical analyses for resolving a case of contested cremains. A cremains weight of 2021.8 g was predicted based on the decedent's reported stature and weight. However, the urn contents weighed 4173.5 g. The urn contents also contained material inconsistent with cremains (e.g., moist sediment, stones, ferrous metal). Analysis using XRD and SEM demonstrated that the urn contained thermally altered bone as well as inorganic material consistent with glass fiber cement. Although forensically challenging, cremains cases such as this one can be resolved using a multidisciplinary approach.  相似文献   
990.
This paper sheds light on previous inconsistencies identified in the literature regarding the relationship between medical marijuana laws (MMLs) and recreational marijuana use by closely examining the importance of policy dimensions (registration requirements, home cultivation, dispensaries) and the timing of when particular policy dimensions are enacted. Using data from our own legal analysis of state MMLs, we evaluate which features are associated with adult and youth recreational and heavy use by linking these policy variables to data from the Treatment Episode Data Set (TEDS) and National Longitudinal Survey of Youth (NLSY97). We employ differences‐in‐differences techniques, controlling for state and year fixed effects, allowing us to exploit within‐state policy changes. We find that while simple dichotomous indicators of MML laws are not positively associated with marijuana use or abuse, such measures hide the positive influence legal dispensaries have on adult and youth use, particularly heavy use. Sensitivity analyses that help address issues of policy endogeneity and actual implementation of dispensaries support our main conclusion that not all MML laws are the same. Dimensions of these policies, in particular legal protection of dispensaries, can lead to greater recreational marijuana use and abuse among adults and those under the legal age of 21 relative to MMLs without this supply source.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号