首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1612篇
  免费   48篇
各国政治   75篇
工人农民   114篇
世界政治   209篇
外交国际关系   114篇
法律   755篇
中国政治   10篇
政治理论   372篇
综合类   11篇
  2023年   6篇
  2022年   10篇
  2021年   16篇
  2020年   49篇
  2019年   52篇
  2018年   64篇
  2017年   74篇
  2016年   63篇
  2015年   58篇
  2014年   44篇
  2013年   256篇
  2012年   50篇
  2011年   53篇
  2010年   48篇
  2009年   45篇
  2008年   50篇
  2007年   45篇
  2006年   56篇
  2005年   55篇
  2004年   37篇
  2003年   44篇
  2002年   40篇
  2001年   34篇
  2000年   40篇
  1999年   26篇
  1998年   33篇
  1997年   28篇
  1996年   17篇
  1995年   20篇
  1994年   20篇
  1993年   21篇
  1992年   19篇
  1991年   9篇
  1990年   13篇
  1989年   18篇
  1988年   13篇
  1987年   12篇
  1986年   10篇
  1985年   8篇
  1984年   13篇
  1983年   8篇
  1982年   19篇
  1981年   7篇
  1980年   7篇
  1979年   8篇
  1978年   8篇
  1977年   8篇
  1976年   5篇
  1969年   5篇
  1967年   3篇
排序方式: 共有1660条查询结果,搜索用时 31 毫秒
991.
The article focuses on Central and Eastern European (CEE) countries' experiences related to Afghanistan, Iraq and Libya, three non-European theatres of Western military operations, in predominantly Muslim lands, in the decade between 2001 and 2011. CEE countries readily became involved in two of these foreign missions (Afghanistan and Iraq) because of their deep ties to Western politico-economic structures, without direct security interests compelling them to do so, but not without normative convictions regarding what were seen by them as virtues of the two missions. In Libya, however, they were reluctant to join the Western intervention. In light of this, the article is interested in examining how political elites within the region relate to the generally constrained security policy agency that they have. A key argument advanced is that such agency may be located in how external hegemony is mediated in elite discourses of threat and legitimacy construction. This as well as the three case studies outlined in the article show that the seeming changes in CEE countries' behaviour in fact boil down to a simple set of rules guiding their behaviour. Having identified this “algorithm” as an implicit pattern of CEE foreign policy behaviour, originating in the intra-alliance security dilemma within the North Atlantic Treaty Organisation (NATO), the article formulates its conclusions about the alliance policy of these countries largely within a neorealist framework.  相似文献   
992.
Cultural property may be under serious threat in the event of armed conflict. In the twentieth century, there were clear developments in international law aimed at preventing and punishing war crimes against cultural property. Despite this, the destruction of cultural property during armed conflict has continued. This article questions whether the existing international law standards with regard to the protection of cultural property during armed conflict are satisfactory, and whether or not a new instrument could be valuable. Although considerable shortcomings remain, instead of pleading for a new instrument, this article advocates raising ratification rates, the enhancement of the implementation of existing instruments, and monitoring and sanctioning mechanisms.  相似文献   
993.
Abstract

This study examined the relationship between psychopathic traits and moral development (moral judgement and empathy) in 85 Dutch male sex offenders between 13 and 23 years of age. Questions were asked about general life situations, sexual situations with morally relevant features, and questions about the offender's own abuse victim. A weak negative association was found between psychopathy and mature moral judgement, but only when questions involved the offender's own abuse victim. Weak to moderate negative associations were found between psychopathy and cognitive and affective empathy in general and sexual situations, but not in the own abuse victim situations. Further analysis revealed moderate negative associations between psychopathy and affective empathy in the own abuse victim situations, but only when an unfamiliar victim was involved. This is the first study, to our knowledge, showing that juvenile sex offenders with high levels of psychopathy have context-specific moral deficits, and that in this group both cognitive and affective empathy are related to psychopathy.  相似文献   
994.
995.
Abstract

Despite numerous reviews, reports and commissions of inquiry, the investigation and prosecution of rape cases remains fraught. Victims are still ambivalent about reporting incidents of sexual violence, while those who do often struggle to be believed and have their cases progress through justice systems. This paper explores some of the reasons why promised reforms materialise so rarely into tangible benefits for the majority of rape complainants, and focuses on six areas: reporting, attrition, adversarial justice systems, victim support, specialisation and attitudes. These are canvassed with particular reference to examples from England and New Zealand demonstrating the barriers to substantive reform and the ways in which gender inequalities and patriarchal beliefs continue to impact upon both the prevalence of sexual violence as well as state responses to its occurrence. The paper contains a cautionary message regarding the potential dangers involved in accepting the rhetoric of reform while the underlying realities remain little changed.  相似文献   
996.
Abstract

The aim of this process evaluation was to identify consumer perspectives of strengths and weaknesses of programme delivery at three New Zealand community treatment programmes for sexually abusive youth. Qualitative methods were employed, with data being obtained from in-depth interviews with 24 sexually abusive youth and 23 caregivers across three sites. Results indicated that clients value good pre-entry information to reduce barriers to participation; engagement in treatment is facilitated by the quality of the client–therapist relationship, family involvement, culturally appropriate communication and creative and physical activities; and post-treatment support is important. Findings highlight the importance of engaging adolescents and their families actively during the intake period, the treatment phase and post-treatment transition. They also support the use of flexible and integrated approaches to treatment that attend to the cultural context for ethnic minorities. This suggests that programmes should aim to provide wraparound services that promote engagement during the referral phase and offer transitional programmes and aftercare follow-up. Recognition should also be given to issues of cultural difference by ensuring that cultural services for ethnic minorities are integrated into all levels of programme delivery.  相似文献   
997.
The Swedish National Council for Crime Prevention (Brottsförebyggande rådet, BRÅ) is a centre for research and development work within the justice system and is to provide assistance to the agencies of the criminal justice system in improving their knowledge and developing their methods to combat and to prevent crime.

In this article a summary of the operations of the Council – with a focus on the year 2004 – is presented. It is shown that a great number of evaluation projects have been conducted (e.g. of electronic monitoring of offenders). Another way in which the Council can contribute is working to develop various instruments that can be used to measure the effects of different parts of the criminal justice system. As an example, a routine measure of repeat victimization at the regional and local level for different crime types, is being developed.

In order to maintain a national centre of expertise in the broad area of economic and organized crime, a special secretariat has been established. Its focus is directed at the area of prevention, ranging from strategies to methods. Finally, the Council has the responsibility to support local crime prevention work and mediation at the local level.

The article also points out some challenges for the future.  相似文献   
998.
ABSTRACT

In the last few years Africa has seen an enormous activity in the field of information and communication technologies (ICT) related conferences and initiatives on behalf of international and donor institutions. These initiatives became increasingly coloured by the rhetoric of an emerging global information society and the need for an African answer to these developments. With regard to this information society two documents hold particular relevance: the United Nations Economic Commission for Africa's, (ECA's) Africa's Information Society Initiative (AISI): An Action Framework to Build Africa's Information and Communication Infrastructure and the ITUs African Green Paper. This article sets out to question these policies and implementation initiatives, and their rhetoric and practice.  相似文献   
999.
The EU's Common Security and Defence Policy (CSDP) requires parliamentary accountability. At present, as CSDP-related decisions are increasingly taken in the framework of the UN or the EU, neither the European Parliament (EP) nor national parliaments are able to hold decision-makers accountable. Interparliamentary cooperation can provide added value in bringing about parliamentary scrutiny of CSDP. Nevertheless, despite an official agreement, the EP and national parliaments have different views on what such interparliamentary cooperation entails. There are five conditions – cooperation and complementarity among parliaments, conferential dialogues, coordinated agendas, and comprehensive and comparative scrutiny – that have to be fulfilled to create added value for interparliamentary cooperation on CSDP matters.  相似文献   
1000.
This paper investigates the evidential potential of the IconCache database file when tracking activity from USB connectable devices on Windows systems. It focuses on the artifacts which are created and retained on a Windows host when executable files are either present on or run from a USB connectable device. Artifacts left in the IconCache database as a result of running executables from a DVD drive or the host itself, are also examined.It is shown that the IconCache.db stores numerous artifacts of investigative interest. These are created on system boot and added to, both when using host-based executables and when installing or using executables from other media. Executables present on USB devices, whether invoked or not, will create artifacts in the IconCache.db. file. Findings should therefore be interpreted carefully and corroborated against other evidence.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号