全文获取类型
收费全文 | 376篇 |
免费 | 18篇 |
专业分类
各国政治 | 14篇 |
工人农民 | 27篇 |
世界政治 | 19篇 |
外交国际关系 | 29篇 |
法律 | 181篇 |
中国政治 | 1篇 |
政治理论 | 119篇 |
综合类 | 4篇 |
出版年
2023年 | 2篇 |
2021年 | 6篇 |
2020年 | 4篇 |
2019年 | 7篇 |
2018年 | 16篇 |
2017年 | 18篇 |
2016年 | 11篇 |
2015年 | 11篇 |
2014年 | 16篇 |
2013年 | 47篇 |
2012年 | 7篇 |
2011年 | 8篇 |
2010年 | 7篇 |
2009年 | 7篇 |
2008年 | 11篇 |
2007年 | 15篇 |
2006年 | 17篇 |
2005年 | 9篇 |
2004年 | 9篇 |
2003年 | 8篇 |
2002年 | 13篇 |
2001年 | 11篇 |
2000年 | 12篇 |
1999年 | 12篇 |
1998年 | 10篇 |
1997年 | 7篇 |
1996年 | 3篇 |
1995年 | 5篇 |
1994年 | 8篇 |
1993年 | 9篇 |
1992年 | 6篇 |
1991年 | 8篇 |
1990年 | 3篇 |
1989年 | 1篇 |
1988年 | 6篇 |
1987年 | 3篇 |
1986年 | 3篇 |
1985年 | 6篇 |
1984年 | 7篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1976年 | 5篇 |
1975年 | 1篇 |
1972年 | 1篇 |
1971年 | 3篇 |
1970年 | 1篇 |
1966年 | 3篇 |
排序方式: 共有394条查询结果,搜索用时 15 毫秒
101.
102.
Brian A. Jackson 《冲突和恐怖主义研究》2013,36(3):183-213
Because of the importance of technology to the operations of modern terrorist groups, the factors that affect the technological sophistication of extreme organizations are of great interest. In this article, the process through which terrorist groups seek out and deploy new technology is examined by bringing to bear the deep literature that exists on technology adoption by commercial organizations. A framework is described that delineates not only the factors that influence a group's decision-making processes surrounding new technology but also the obstacles that stand in the way of the successful absorption and use of unfamiliar technologies by a terrorist organization. This framework, by taking a holistic view of the entire technology adoption process, sets out a methodology to both more reasonably predict the outcome of a group's technology-seeking efforts and to speculate about its future innovation efforts. Such a technology focused viewpoint provides a route to more fully inform risk assessment, especially with regard to the low probabilityhigh consequence technologies that have served as the focus of much recent counterterrorist deliberation. The lessons provided by the framework with respect to weapons of mass destruction terrorism and to novel counterterrorist routes are discussed. 相似文献
103.
104.
Many communities are developing civic computer networks to provide citizens with free access to local information resources and the Internet. However, most networks restrict both commercial speech and any language deemed “objectionable.”; Whether such broad discretionary power violates the First Amendment depends on whether the networks are state actors. An examination of one such network, Alachua Free‐Net, reveals a close symbiotic relationship between the network and several local government entities. Symbiotic relationships between the state and a private party in other contexts have been held by the courts to constitute state action. Thus, Alachua Free‐Net appears to be a state actor and must conform its speech restrictions to the requirements of the First Amendment. Moreover, whether state actors or not, civic computer networks such as Alachua Free‐Net should commit themselves to providing full First Amendment freedoms to their users. 相似文献
105.
106.
In terrorist operations, weapons technologies are the tools groups use to pursue their violent ends. Because of differences in what they can do, different weapons are useful for different types of operations. Using a random sample of terrorist incidents from the RAND-MIPT Terrorism Incident Database, this article explores (1) how terrorists in general used particular weapons technologies and (2) the variation in the technology choices of individual terrorist groups. The results demonstrate significant differences in the ways different weapons are used, in the versatility of individual technologies, and among the technology strategies of different terrorist organizations. 相似文献
107.
A combined analysis of microcrystalline tests followed by LC-MS or GC-MS analysis is described. Microcrystalline tests are shown to be non-destructive as addition products formed were easily dissociated after the application of an appropriate solvent. Subsequent analysis of the sample was done to quantify the recovery of the drug. Examples were performed using the date rape drug γ-hydroxybutyrate (GHB) and the synthetic opioid methadone. 相似文献
108.
We argue that personal belief exemptions to the mandate for childhood immunizations should not be allowed. Parents who choose not to immunize their children put both their own children and other children at risk. Other children are at risk because unimmunized children go to school or day care when they are contagious but asymptomatic, exposing many more children to potentially dangerous infections. The risks to children from disease are much higher than the risks of vaccines. There are, of course, some bona fide reasons why children should not be immunized. Some children have known allergies or other medical contraindications to certain immunizations. Immunization refusals based on parental beliefs, however, do not fall into this category. In those cases, children are denied the protection of immunizations without any medical or scientific justification. By eliminating personal belief exemptions to those childhood vaccines associated with contagious diseases that have high rates of childhood mortality, we would better protect children and would more fairly spread the burdens of this important public health program. 相似文献
109.
110.
Bernard S. Jackson 《International Journal for the Semiotics of Law》2014,27(3):421-423