首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8594篇
  免费   289篇
各国政治   637篇
工人农民   244篇
世界政治   853篇
外交国际关系   547篇
法律   3637篇
中国政治   75篇
政治理论   2766篇
综合类   124篇
  2023年   45篇
  2021年   46篇
  2020年   110篇
  2019年   169篇
  2018年   214篇
  2017年   239篇
  2016年   249篇
  2015年   192篇
  2014年   257篇
  2013年   1334篇
  2012年   255篇
  2011年   246篇
  2010年   222篇
  2009年   228篇
  2008年   276篇
  2007年   358篇
  2006年   283篇
  2005年   253篇
  2004年   277篇
  2003年   275篇
  2002年   262篇
  2001年   158篇
  2000年   164篇
  1999年   139篇
  1998年   165篇
  1997年   134篇
  1996年   143篇
  1995年   120篇
  1994年   115篇
  1993年   130篇
  1992年   111篇
  1991年   122篇
  1990年   100篇
  1989年   104篇
  1988年   97篇
  1987年   115篇
  1986年   112篇
  1985年   84篇
  1984年   106篇
  1983年   100篇
  1982年   98篇
  1981年   78篇
  1980年   69篇
  1979年   57篇
  1978年   60篇
  1977年   59篇
  1976年   36篇
  1975年   41篇
  1974年   39篇
  1973年   51篇
排序方式: 共有8883条查询结果,搜索用时 44 毫秒
61.
62.
63.
64.
In this paper we examine the legal aspects of corporate computer usage policies including their creation, management, and their relevance to corporate computer forensic investigations. Misuse of corporate computing facilities cannot only lead to a reduction in employee productivity and network bandwidth, but can also increase the risk of infection of such facilities by computer viruses and other malicious code. Moreover, it may lead to the risk of liability and legal action.  相似文献   
65.
In this article we explore how much state is necessary to make governance work. We begin by clarifying concepts of governance and the “shadow of hierarchy” and we follow this clarification with a brief overview of empirical findings on governance research in developed countries. We then discuss the dilemmas for governance in areas of limited statehood, where political institutions are too weak to hierarchically adopt and enforce collectively binding rules. While prospects for effective policymaking appear to be rather bleak in these areas, we argue that governance research has consistently overlooked the existence of functional equivalents to the shadow of hierarchy. We assert that governance with(out) government can work even in the absence of a strong shadow of hierarchy, we identify functional equivalents to the shadow of hierarchy, and we discuss to what extent they can help overcome issues of legitimacy and effectiveness in areas of limited statehood.  相似文献   
66.
This paper examines current developments in the social control of youth crime and delinquency in England and Wales. It argues that the usual critical explanations of these developments, in the form of the dispersal of discipline or the social authoritarianism thesis are inadequate. Instead, it is suggested that the punishment has taken on a more effective and efficient format in the management of this problem group than either of the above would have made possible.  相似文献   
67.
68.
Although past research has developed scales for the incidence, prevalence, and fear of student-on-student victimization (SSV), little is known about the scaling of perceived risk (i.e., the cognitive appraisal of the chances of experiencing SSV). Hence, this study examined self-report survey data for the perceived risk of SSV as measured in the Adolescent Index for School Safety (AISS). Children in grades 7 through 10 (n=337) in a single Florida public school completed the AISS. Factor analyses using Maximum Likelihood Estimation with Oblimin Rotation identified nine unique factors for perceived risk. Reliability analyses found standardized Cronbach Alphas that ranged from .64 to .91, and seven out of the nine identified scales were above .80, which suggested good to excellent internal consistency. Future research should examine the content validity, construct validity, and predictive validity for the AISS and other self-report surveys of SSV dynamics. This publication was made possible by a grant [#97-MU-FX-KO12 (S-l)] from the Office of Juvenile Justice and Delinquency Prevention (O.J.J.D.P.), United States Department of Justice (U.S.D.O.J.). This grant is administered through the Hamilton Fish National Institute on School and Community Violence at George Washington University. This specific study was developed and implemented by staff at: 1) East Carolina University’s Department of Criminal Justice; and 2) Florida State University’s Center for Educational Research and Policy Studies. All points of view and opinions in this paper are those of the authors and do not necessarily represent the official position or policies of East Carolina University, Florida State University, the Hamilton Fish National Institute on School and Community Violence, the O.J.J.D.P., or the U.S.D.OJ. The authors would also like to thank Dr. Bill Doerner and Jennifer Jolley for their support, editorial feedback, and insightful comments regarding earlier drafts of this paper.  相似文献   
69.
Thanks go to John Aldrich, Robert Bates, William Bernhard, Richard Burdekin, Henry Chappel, Dudley Wallace and Thomas Willett for suggestions and to Ted Smith for computational assistance.  相似文献   
70.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号