首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18558篇
  免费   1437篇
各国政治   749篇
工人农民   862篇
世界政治   1164篇
外交国际关系   560篇
法律   13261篇
中国共产党   2篇
中国政治   325篇
政治理论   2981篇
综合类   91篇
  2021年   86篇
  2020年   464篇
  2019年   494篇
  2018年   599篇
  2017年   625篇
  2016年   711篇
  2015年   583篇
  2014年   599篇
  2013年   1927篇
  2012年   556篇
  2011年   670篇
  2010年   716篇
  2009年   701篇
  2008年   579篇
  2007年   516篇
  2006年   582篇
  2005年   449篇
  2004年   434篇
  2003年   354篇
  2002年   405篇
  2001年   674篇
  2000年   615篇
  1999年   486篇
  1998年   250篇
  1997年   181篇
  1996年   199篇
  1995年   205篇
  1994年   177篇
  1993年   184篇
  1992年   309篇
  1991年   325篇
  1990年   312篇
  1989年   283篇
  1988年   320篇
  1987年   268篇
  1986年   329篇
  1985年   326篇
  1984年   248篇
  1983年   230篇
  1982年   182篇
  1981年   158篇
  1980年   148篇
  1979年   224篇
  1978年   118篇
  1977年   95篇
  1976年   78篇
  1975年   98篇
  1974年   125篇
  1973年   84篇
  1972年   78篇
排序方式: 共有10000条查询结果,搜索用时 31 毫秒
101.
Current research suggests that a husband's substance abuse is correlated with severity of physical abuse and the woman's decision to leave a violent situation. Often, only the battered woman's report of abuse is available. This study compares women's reports of their partners' substance use/abuse with their partners' report using a brief measure of polydrug and alcohol abuse, the Substance Abuse Subtle Screening Inventory (SASSI) and the Conflict Tactics Scale (CTS). Data were analyzed for 25 recovery couples and 25 nonrecovery couples. The correlations for all 50 couples between the male's reported use and the female's report of her partner's use on the SASSI and the CTS were significant on all but one of the CTS scales. They ranged on SASSI from .73 to .33 and from .31 to .06 on the CTS. This suggests that the SASSI and possibly the CTS could be used as valuable tools for assessing women's reports of their partner's substance use/abuse.  相似文献   
102.
The psychological assessment battery is an integral part of the selection process used to select patrol officer applicants. Unlike all other procedures used in the selection process, the psychological assessment has not been adequately validated. The purpose of this study was an attempt to provide validation data for a psychological assessment battery. The battery consisted of the Nelson-Denny, Shipley-Hartford, MMPI, and the Motivational Analysis Test (MAT). Performance measures included various measures of training academy performance and field training performance. A stepwise regression and MANOVA/Discriminant Analysis indicated that the psychological tests did predict performance, although an exact predictive equation could not be developed due to the high intercorrelations between predictor variables. This research was sponsored in part by a grant from the School of Applied Arts and Technology, Southwest Texas State University.  相似文献   
103.
The purpose of this investigation was to identify inmate personal and demographic data that may be used to further define or profile persons with a greater likelihood of being at risk for serving a jail sentence. This study was explorative. The survey administration was similar in format to that conducted by the U.S. Department of Justice. Chaplains were used as survey proctors. Pilot studies were conducted to determine the suitability of survey content. Surveys consisted of 172 items. Subjects included four hundred inmates: males comprised 88.75 percent of the sample, Caucasians 58.25 percent, Blacks 37 percent, Hispanics 3.25 percent and other 1.5 percent of the sample. Respondents ranged in age from 15 to 64 years with an average age of 30.3 years. Less than two percent of the contacted inmates refused participation in the survey. Results are presented for demographic data, select legal/criminal data, select drug and alcohol use data, employment data, health, parent/family data, education data, social data, and “other”.  相似文献   
104.
105.
106.
Conclusion The Regulations appear to have reinforced the protection available to software producers under United Kingdom law. The provisions of the Software Directive and the Regulations are complex and not without significant inconsistencies which are likely to prove to be a source of litigation. The drafters of the Regulations chose, unlike many of its European partners, not to adopt the wording of the Software Directive but to write their own interpretation, adding an element of uncertainty to the law in this area, which is perhaps inevitable bearing in mind the linguistic problems of translating and interpreting any directive coupled with the ambiguity and omission of definitions of several key terms. More important, however, than any academic argument will be the practical impact of the new law and its effectiveness in achieving its aim.  相似文献   
107.
108.
Andrew M. Greeley is a priest, sociologist, novelist, and journalist. His scholarly writings concentrate on religion and ethnicity. His other writings range from critiques of the Catholic church to best-selling novels.  相似文献   
109.
Conclusion We have in this paper tried to set out a framework which can facilitate analysis of the current and future situation of traditional rulership in contemporary African society. Our presentation of a proposed model for such an analysis is no doubt still in its elementary stages of formation. Much more work needs to be done. Nevertheless, our analysis has revealed certain salient elements and uncovered certain unresolved issues. If traditional rulers genuinely care about their own future they will have to devise techniques of legitimation which not only endear them to the government and the non-traditional elites, but also, and more importantly, to the mass of the people. True, the original role of the traditional rulers may be no more; still, it may be possible to salvage what is left.  相似文献   
110.
The authors examine the characteristics of threatening and otherwise inappropriate communications sent to members of the U.S. Congress by a sample of 86 subjects, 20 of whom threatened assassination. We quote excerpts from these letters and provide quantitative data on such variables as the volume, duration, form, and appearance of such communications; the enclosures; the subjects' perceived relationships to the recipients; the thematic content of the communications; and the messages and threats communicated. Comparisons between 43 subjects who pursued encounters with members of Congress and 43 who did not revealed 17 factors associated with such pursuit. In this population, threateners were significantly less likely to pursue an encounter than inappropriate letter writers who did not threaten, regardless of the type of threat or the harm threatened. Inappropriate letters to members of Congress are compared with those directed to Hollywood celebrities. Mentally disordered persons writing to public figures often mention and sometimes threaten public figures other than those to whom the letters are addressed, which raises important issues regarding notification of endangered third parties and the sharing of information among protective agencies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号