首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1148篇
  免费   50篇
各国政治   48篇
工人农民   59篇
世界政治   140篇
外交国际关系   68篇
法律   520篇
中国政治   5篇
政治理论   353篇
综合类   5篇
  2023年   6篇
  2022年   3篇
  2021年   9篇
  2020年   23篇
  2019年   31篇
  2018年   40篇
  2017年   39篇
  2016年   51篇
  2015年   30篇
  2014年   35篇
  2013年   169篇
  2012年   27篇
  2011年   41篇
  2010年   23篇
  2009年   33篇
  2008年   36篇
  2007年   58篇
  2006年   41篇
  2005年   36篇
  2004年   38篇
  2003年   35篇
  2002年   35篇
  2001年   31篇
  2000年   19篇
  1999年   14篇
  1998年   17篇
  1997年   19篇
  1996年   19篇
  1995年   14篇
  1994年   20篇
  1993年   17篇
  1992年   13篇
  1991年   17篇
  1990年   12篇
  1989年   15篇
  1988年   17篇
  1987年   11篇
  1986年   15篇
  1985年   9篇
  1984年   21篇
  1983年   6篇
  1982年   12篇
  1981年   8篇
  1980年   3篇
  1979年   5篇
  1978年   4篇
  1977年   6篇
  1975年   5篇
  1974年   4篇
  1973年   2篇
排序方式: 共有1198条查询结果,搜索用时 15 毫秒
161.
162.
In this short piece, I set out briefly what we know about the challenge of diversity in the legal academy from existing scholarship. That field, in the UK at least, is sparse. I then go on to present a snapshot of the legal academy using data from the Higher Education Statistics Agency (HESA). I do this as the start of a much larger project on diversity and the legal academy that I plan to undertake over the next year. My argument is rather simple. The diversity of the legal academy reflects neither the diversity of our law student bodies nor the diversity of the wider population. Such diversity is vital for a number of reasons. My hope is that this piece can be the start of a dialogue on an important and largely ignored topic, and that further research will be done in this area.  相似文献   
163.
There is a lack of research on honor crimes within the United States. We used an open source search methodology to identify the victim-offender relationship and motivations for this crime within the United States. Using data collected based on the protocol for the United States Extremist Crime Database (ECDB), we identified a total of 16 honor crimes with 40 victims that occurred between January 1st 1990 and December 31st 2014 in the United States. Based on our findings, the overarching motivations for honor crimes in the United States were the perpetrator’s former partner beginning the process of separation and the westernized behavior of the victim, typically the offender’s daughter or step-daughter. Honor crimes were not limited to current/former intimate partners or daughters, as they also included the death of extended family members (e.g. in-laws, nieces, and cousins). Policy implications and directions for future research on honor crimes are discussed.  相似文献   
164.
The present research adopts a multiple informant approach to identify victims and perpetrators of cyberbullying. Similar approaches have been successfully applied in the field of traditional bullying, and they are highly relevant for studying cyberbullying as well. Three informants can provide key perspectives on cyberbullying incidents: victims, perpetrators, and bystanders. To collect data on these actors, all eighth-grade students in 11 secondary schools were invited to participate in a survey. In total 1458 respondents completed peer-nomination questions on cyberbullying involvement. The results indicated that the prevalence of cyberbullying varied depending on the type of informants that was consulted. In addition, limited overlap was observed between the reports of different informants, resulting in different profiles of victims and perpetrators, depending on the informants that identified them. In sum, different informants tended to have divergent views on cyberbullying, which has important implications. It warrants accurate reporting and critical reflection on the sources of data in cyberbullying research. Moreover, it demonstrates the need to study a more diverse set of informants to advance the understanding of cyberbullying and to enhance prevention efforts.  相似文献   
165.
166.
167.
168.
The Japanese government has embarked on a series of reforms aimed at stimulating technology transfer from universities to industry. As a result, technology licensing offices are springing up at many national universities. Advocates hope that these reforms will increase the level of university patenting and licensing, which historically has not been a common mode of technology transfer in Japan. Their model is the technology licensing process in the United States, which acquired its present form after passage of the Bayh-Dole Technology Transfer Act of 1980. Such changes face serious historical and institutional barriers. Academic researchers, especially in engineering and physical science, have a long record of collaborative research with industry. Decisions about patenting, however, were usually left to the corporate partner; universities rarely filed for patents under their own name, nor have they, until recently, encouraged or assisted faculty researchers in doing so. Consequently, we believe that current reforms, by going against the grain of past practices, will take time to achieve the hoped for results.  相似文献   
169.
This study investigated the association of several dimensions of relationship to perpetrator of childhood sexual abuse to posttraumatic symptomatology in adulthood. A structured clinical interview, the Impact of Event Scale, and the TSC-40 were administered to 67 women survivors seeking psychotherapy. The t-tests for significant differences indicated that subjects whose perpetrators were not caretakers experienced higher levels of posttraumatic symptomatology (PTS) in adulthood than those abused by caretakers. No significant differences were found in traumatic symptomatology between those whose perpetrators were family members and those whose perpetrators were not or between those abused by someone in the home and those abused by someone outside the household. Implications for future research and clinical practice are explored.  相似文献   
170.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号