首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1308篇
  免费   77篇
各国政治   67篇
工人农民   63篇
世界政治   124篇
外交国际关系   147篇
法律   592篇
中国政治   5篇
政治理论   376篇
综合类   11篇
  2023年   10篇
  2021年   10篇
  2020年   37篇
  2019年   41篇
  2018年   48篇
  2017年   66篇
  2016年   68篇
  2015年   45篇
  2014年   43篇
  2013年   186篇
  2012年   41篇
  2011年   66篇
  2010年   44篇
  2009年   46篇
  2008年   41篇
  2007年   34篇
  2006年   40篇
  2005年   42篇
  2004年   49篇
  2003年   47篇
  2002年   35篇
  2001年   20篇
  2000年   32篇
  1999年   21篇
  1998年   21篇
  1997年   22篇
  1996年   15篇
  1995年   12篇
  1994年   14篇
  1993年   20篇
  1992年   12篇
  1991年   18篇
  1990年   15篇
  1989年   11篇
  1988年   8篇
  1987年   12篇
  1986年   4篇
  1985年   13篇
  1984年   6篇
  1983年   12篇
  1982年   9篇
  1981年   3篇
  1980年   6篇
  1979年   3篇
  1978年   6篇
  1977年   5篇
  1975年   6篇
  1974年   4篇
  1973年   3篇
  1972年   3篇
排序方式: 共有1385条查询结果,搜索用时 15 毫秒
981.
The current study examines the utility of self-trauma theory for explaining the long-term impact of childhood psychological abuse on aggression. Specifically, the self-capacities of interpersonal relatedness, identity, and affect regulation are tested as mediators of the impact of psychological abuse on various types of aggression in adulthood. Hierarchical regression analyses are used to examine data collected from 268 university students who completed the Personality Assessment Inventory, Comprehensive Child Maltreatment Scale, and the Inventory of Altered Self-Capacities. Results show that self-capacities were predicted by maltreatment, particularly psychological abuse. Altered self-capacities fully mediate the impact of child maltreatment on various forms of aggression. Problems with interpersonal relationships play the most significant role in mediating the relationship between child maltreatment and aggression. Results suggest more frequent maltreating experiences predict more dysfunctional self-capacities, which increases the probability of displaying various forms of aggression.  相似文献   
982.
The negotiator's dilemma is a vexing problem (structurally similar to the prisoner's dilemma), but it is made more complicated by the fact that many negotiations involve teams of negotiators. Although it is widely recognized that the behavior of groups of people can deviate in important ways from the behavior of individuals, the implications of this for the negotiator's dilemma are unclear. For this article, I have used a computer simulation to explore the impact of different decision rules (majority rule, consensus, and weakest link) on how the approach of groups to negotiations might differ. The results suggest that the use of different decision rules can greatly complicate negotiations. While the majority rule is quite versatile in multiple contexts, a pairing of weakest link and consensus decision rules is highly problematic for finding a negotiated settlement.  相似文献   
983.
This case study of Lee v. Macon County Board of Education demonstrates that a federal district court in Alabama, enforcing Brown v. Board of Education, brought about significant social change despite constraints on the courts. The court's application of Brown played a decisive role in ending the racial caste system in this Alabama Black Belt county. The court, by adding the U.S. Department of Justice as a party, overcame constraints that had precluded the executive branch from pursuing school desegregation. Change came through the courts before Congress legislated against school segregation. Seekers of social change must evaluate the constraints on the courts relative to the constraints on the other branches and levels of government.  相似文献   
984.

Purpose

Many criminological scholars explore the social causes of crime while giving little consideration to the possibility that genetic factors underlie the observed associations. Indeed, the standard social science method (SSSM) assumes genetic influences do not confound the association between X and Y. Yet, a nascent stream of evidence has questioned the validity of this approach by revealing many criminological variables are at least partially affected by genetic influences. As a result, a substantial proportion of the literature may be misspecified due to uncontrolled genetic factors. No effort has been made to directly estimate the extent to which genetic confounding has biased the associations presented in criminological studies.

Methods

The present study seeks to address this issue by drawing on simulated datasets.

Results/Conclusions

Results suggest genetic confounding may account for a negligible portion of the relationship between X and Y when their correlation (ryx) is larger than the correlation between genetic factors and Y (i.e., ryx > ryg). Genetic confounding appears to be much more problematic when the correlation between X and Y is in the moderate-to-small range (e.g., ryx = .20) and the genetic effect is in the moderate-to-large range (e.g., ryg ≥ .30).  相似文献   
985.
Information warfare represents a threat to American national security and defense. There are two general methods in which a terrorist might employ an information terrorist attack: (1) when information technology (IT) is a target, and/or (2) when IT is the tool of a larger operation. The first method would target an information system for sabotage, either electronic or physical, thus destroying or disrupting the information system itself and any information infrastructure (e.g., power, communications, etc.) dependent upon it. The second would manipulate and exploit an information system, altering or stealing data, or forcing the system to perform a function for which it was not meant (such as spoofing air traffic control). A perennial dilemma of combating terrorism in a democratic society is finding the right balance between civil liberties and civil security. The special problems associated with IT are examined. The US national security establishment needs to use a flexible, integrated response to counter information terrorists ‐ one which employs information warfare tactics tailored to counter gray‐area phenomena, but which also pools resources from ‘conventional’ counter‐terrorism and law enforcement authorities.  相似文献   
986.
This article provides the first overview of the CIA's secret drone campaign against Al Qaeda and the Taliban in Pakistan's tribal areas from its origins in 2001's Operation Enduring Freedom to the end of 2010. In the process it addresses the spatial dimensions of the campaign (where are the strikes being directed and where do the drones fly from), Pakistani reactions to this threat to both their sovereignty and an internal Taliban enemy, technological developments and Taliban and Al Qaeda responses to this unprecedented airborne assassination campaign. While the debate on this issue has often been driven by the extremes which either support the campaign as the most effective tool in killing terrorists or condemn it for driving Pakistanis to new levels of anti-Americanism, this article points out a third path. Namely, that many Pakistani Pashtun tribesmen living in the targeted areas support the strikes against the Taliban who have terrorized them in recent years.  相似文献   
987.
ABSTRACT

Terrorist group rivalries and alliances have important consequences, but the sources of these relationships are debated. This article offers a side-by-side examination of correlates of terrorist rivalries and alliances. Global analyses of hundreds of terrorist groups find violent rivalry is associated with drug trafficking, state sponsorship, ethnic motivation, and operating in a civil conflict country. Alliances are associated with territorial control, intermediate membership size, and religious motivation. The idea that alliances are an indicator of weakness does not find much support. When relationships are disaggregated into theoretically relevant categories (inter-field and intra-field rivalries, and domestic and international alliances), further distinctions appear.  相似文献   
988.
Do formal deliberative events influence larger patterns of political discussion and public opinion? Critics argue that only a tiny number of people can participate in any given gathering and that deliberation may not remedy—and may in fact exacerbate—inequalities. We assess these criticisms with an experimental design merging a formal deliberative session with data on participants’ social networks. We conducted a field experiment in which randomly selected constituents attended an online deliberative session with their U.S. Senator. We find that attending the deliberative session dramatically increased interpersonal political discussion on topics relating to the event. Importantly, after an extensive series of moderation checks, we find that no participant/nodal characteristics, or dyadic/network characteristics, conditioned these effects; this provides reassurance that observed, positive spillovers are not limited to certain portions of the citizenry. The results of our study suggest that even relatively small-scale deliberative encounters can have a broader effect in the mass public, and that these events are equal-opportunity multipliers.  相似文献   
989.
990.
Brian Arbour 《政治交往》2013,30(4):604-627
Campaigns can shape vote choice decisions by effectively framing issues for voters. I examine how campaigns do this by studying the content of issues appeals in television advertisements from U.S. House and Senate candidates. The use of issue frames is partisan. The two parties develop their own distinct rhetorical strategies on particular issues, showing that each party owns particular issue frames. In addition, campaign messages are sensitive to the partisanship of voters. Campaigns are more likely to use conservative frames in Republican-leaning districts and liberal frames in Democratic-leaning districts. Models of campaign strategy should incorporate not just what issues are discussed, but also the rhetorical choices campaigns make to address these issues.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号