首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8782篇
  免费   34篇
各国政治   284篇
工人农民   1112篇
世界政治   230篇
外交国际关系   316篇
法律   4879篇
中国政治   22篇
政治理论   1968篇
综合类   5篇
  2023年   5篇
  2022年   5篇
  2021年   9篇
  2020年   6篇
  2019年   28篇
  2018年   1295篇
  2017年   1227篇
  2016年   1045篇
  2015年   75篇
  2014年   30篇
  2013年   157篇
  2012年   197篇
  2011年   932篇
  2010年   1016篇
  2009年   590篇
  2008年   747篇
  2007年   700篇
  2006年   18篇
  2005年   67篇
  2004年   179篇
  2003年   147篇
  2002年   48篇
  2001年   12篇
  2000年   17篇
  1999年   12篇
  1998年   17篇
  1997年   15篇
  1996年   22篇
  1995年   30篇
  1994年   31篇
  1993年   3篇
  1992年   9篇
  1991年   5篇
  1990年   7篇
  1989年   5篇
  1987年   8篇
  1985年   3篇
  1984年   13篇
  1983年   13篇
  1982年   8篇
  1981年   4篇
  1979年   10篇
  1978年   9篇
  1977年   11篇
  1975年   3篇
  1972年   4篇
  1971年   2篇
  1970年   2篇
  1967年   2篇
  1966年   3篇
排序方式: 共有8816条查询结果,搜索用时 15 毫秒
941.
Cyberbullying, the harassment of others via new technologies, is a growing phenomenon with important consequences for its victims. Despite the growing interest in this new form of violence, only a few longitudinal studies have analyzed the relationship between cyberbullying victimization and psychological problems, such as depression, in adolescents. Furthermore, the mechanisms through which cyberbullying victimization contributes to the development of depressive symptoms remain almost unexplored. The current study assesses whether cyberbullying victimization predicts the increase in depressive symptoms over time and the role of body image and cognitive schemas in the association between cyberbullying victimization and depression. We hypothesized that victims of cyberbullying would develop a negative body image, the belief that others would hurt them and that they were defective to some degree, and that, as a consequence of these cognitions, they would increase their symptoms of depression. A sample of 1015 adolescents (mean age?=?15.43, SD?=?1.09) completed measures of depressive symptoms at three waves (T1, T2, and T3) spaced 6 months apart, measures of body image and cognitive schemas at T1 and T2, and measures of CB victimization at T1. Findings indicated that CB victimization at T1 predicted a worsening of body image and cognitive schemas of mistrust and defectiveness at T2, and those changes in cognitions predicted in turn an increase in depressive symptoms from T2 to T3. Gender differences were also examined. The model was very similar for boys and girls. However, changes in body image acted as a mediator between CB victimization and depression only in girls. Therefore, this study contributes to clarifying the cognitive mechanisms involved in the development of depression among victims of CB. These findings suggest that intervention programs with victims of CB should address the cognitions that are relevant for the development of depression.  相似文献   
942.
The use of the Internet and new technologies now seems to permeate the entire society, affecting every aspect of daily life. Although this change is characterized by undeniable positive aspects, it simultaneously bears a number of risks which are higher especially with respect to the growing number of younger users. In fact, young people, as the most involved in cyber space, are an age group most exposed to the dangers of improper and not aware use of electronic tools. The specific aim of this research was to study unwanted online attentions (UOA) among a sample of Italian students (N?=?585, mean age?=?14.5), identifying UOA as all those behaviors carried out through the Internet and technology to annoy, disturb, offend, humiliate, intimidate, threat, harass, harm or attack others. The online questionnaire investigated the online habits of the students, the presence of UOA and the characteristics of victims and perpetrators, the perception and emotional impact of such conducts, and the victims' possible reactions. The findings offer an estimate of the prevalence of these behaviors in the population of this age group in the area considered. More importantly, the results reveal a very high involvement in technology by the students accompanied by a lack of awareness regarding the risks connected to technology use as well as a low perception of UOA. These results give evidence of the needs in terms of prevention and education instruments in order to improve the system of responses to cybervictimization among young people.  相似文献   
943.
944.
The difference in official crime statistics between women and men is a constant fact in criminology, but has yet to be explained in a satisfactory way. There are few studies addressing the issue of why this gender gap is larger in registered crime than it is in self-report studies. The study at hand comprises a survey among Greek and German students to examine whether this gap could be attributed to a gender-specific reporting of crime. Participants’ self-reported experiences of victimisation and their rating of the seriousness of offences depicted in case vignettes were used to gain insight into varying tendencies to report a crime depending on the offender’s gender. The act of reporting a crime did not vary gender-specifically.  相似文献   
945.
Government favouritism in the allocation of public funds raises costs for any society in which corruption prevails. Particularistic transactions can be identified in three different situations: uncompetitive awards of public contracts when there is only one “competitive” tender, when public money is spent on contracts supplied by politically connected firms, and a situation of capture in which one private contractor obtains a disproportionate share of contracts issued by some public agency. This present research has tested for the relevance of those three types of particularistic transactions that signal government favouritism as they apply to the Romanian construction sector for the period from 2007-2013, and to do so has made use of original public procurement databases. Furthermore, it will be proposed here that the “kickback”—a percentage of particularistic awarded values—can be used as a measurement of corruption. Even conservatively estimated, kickbacks account for much of the cost borne by any society that fails to eradicate corruption. For our purposes here, amounts of kickbacks at county level have been controlled against criminal convictions for corruption at county level. As a result, data analysis provides strong evidence that kickbacks based on particularistic allocation of public funds are indeed relevant in the measurement of corruption, and the steps used to evaluate kickbacks can be used just as well for other countries.  相似文献   
946.
Disclosure of income, assets and conflicts of interest can serve as powerful public accountability tools to draw attention to the abuse of public office, help prosecute corrupt offenders and create a culture of scrutiny in the public sector that deters corruption. Based on data of the World Bank’s Public Accountability Mechanisms initiative, we present the first indicator that captures a country’s financial disclosure in-law effort. By employing different panel data model specifications, we use this indicator to measure how the introduction of comprehensive financial disclosure systems impacted national corruption levels for 91 countries between 1996 and 2012. We present robust results that provide tentative evidence for a positive and significant relationship between a country’s capacity to control for corruption and the expansion of financial disclosure legislation for the years following the enactment.  相似文献   
947.
We develop a political history of Wards Cove v. Atonio (1989) to show how Robert Cover's concepts of jurisgenesis and jurispathy can enrich the legal mobilization framework for understanding law and social change. We illustrate the value of the hybrid theory by recovering the Wards Cove workers’ own understanding of the role of litigation in their struggle for workplace rights. The cannery worker plaintiffs exemplified Cover's dual logic by articulating aspirational narratives of social justice and by critically rebuking the Supreme Court's ruling as the “death throe” for progressive minority workers’ rights advocacy. The cannery workers’ story also highlights the importance of integrating legal mobilization scholars’ focus on extrajudicial political engagement into Cover's judge‐centered analysis. Our aim is to forge a theoretical bridge between Cover's provocative arguments about law and the analytical tradition of social science scholarship on the politics of legal mobilization.  相似文献   
948.
Social network theory suggests that firms bridging structural holes by connecting disconnected partners in a network benefit from timely access to diverse knowledge. However, the existing literature reports mixed evidence with regard to the performance implications of this view. Our study examines how a firm’s diverse knowledge base and knowledge-processing capabilities affect knowledge creation when a firm bridges multiple structural holes in an inter-firm network. The model is tested on a sample of 191 firms in high-technology industries. The dependent variable, knowledge creation, was measured by the number of patents generated. Results show that when a firm spans multiple structural holes, its diverse technological knowledge facilitates knowledge creation. However, when a firm already possesses well-developed knowledge acquisition capabilities, spanning structural holes reduces knowledge creation. This paper suggests that internal knowledge base and knowledge-processing capabilities determine the impacts of external network positions on firm knowledge creation. It provides implications on how a firm best capitalizes on external network positions.  相似文献   
949.
We study how the scientific reputations and technology transfer policies of universities affect patenting by university researchers, with particular regard to whether they assign patent ownership to their university or to an outside firm. Using data on the career output of over 33,000 researchers in nanosciences, we find a strongly positive relationship of university reputation in nanosciences with the number of university-assigned patents, but almost a negligible association with firm-assignment of patents. University technology transfer office resources are related positively to both types of patents, but with diminishing returns. In contrast, the share of license revenue offered upfront to researchers is positively associated with university-assigned patents, but negatively related to firm-assigned patents. Taken together, our results suggest that universities that streamline their technology transfer efforts and improve their research reputation through support for basic research will see long-term success in technology commercialization.  相似文献   
950.
In the thirty-five years after passage of the Bayh–Dole Act of 1980, a robust literature has documented the emergence of university technology transfer as a critical mechanism for the dissemination and commercialization of new technology stemming from federally-funded research. Missing from these investigations, however, is what this paper terms the legal perspective, an understanding of how the law and its attendant mechanisms impact university technology transfer. Specifically, the paper reviews the extant legal scholarship and provides examples of how case law, legal structures, and the unique nature of intellectual property law affects technology transfer, as well as higher education policy and management. Throughout, we propose critical questions for future investigation, which serve to form a cross-disciplinary research agenda that can contribute fresh insights to scholarly and policy discussions related to the role of universities in economic and social development.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号