首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2554篇
  免费   45篇
各国政治   74篇
工人农民   224篇
世界政治   128篇
外交国际关系   108篇
法律   1635篇
中国共产党   1篇
中国政治   14篇
政治理论   404篇
综合类   11篇
  2022年   11篇
  2021年   18篇
  2020年   47篇
  2019年   38篇
  2018年   125篇
  2017年   56篇
  2016年   129篇
  2015年   69篇
  2014年   44篇
  2013年   181篇
  2012年   162篇
  2011年   122篇
  2010年   47篇
  2009年   61篇
  2008年   44篇
  2007年   53篇
  2006年   47篇
  2005年   417篇
  2004年   129篇
  2003年   48篇
  2002年   29篇
  2001年   40篇
  2000年   37篇
  1999年   31篇
  1998年   21篇
  1997年   16篇
  1996年   11篇
  1995年   12篇
  1994年   11篇
  1992年   29篇
  1991年   29篇
  1990年   37篇
  1989年   53篇
  1988年   39篇
  1987年   37篇
  1986年   36篇
  1985年   24篇
  1984年   23篇
  1983年   19篇
  1979年   15篇
  1978年   14篇
  1975年   16篇
  1974年   26篇
  1973年   14篇
  1972年   16篇
  1971年   20篇
  1970年   14篇
  1969年   9篇
  1968年   12篇
  1967年   9篇
排序方式: 共有2599条查询结果,搜索用时 15 毫秒
141.
Spamming is a major threat to the formation of public trust in the Internet and discourages broader civil participation in the emerging information society. To the individual, spams are usually little more than a nuisance, but collectively they expose Internet users to a panoply of new risks while threatening the communications and commercial infrastructure. Spamming also raises important questions of criminological interest. On the one hand it is an example of a pure cybercrime – a harmful behaviour mediated by the Internet that is the subject of criminal law, while on the other hand, it is a behaviour that has in practice been most effectively contained technologically by the manipulation of ‘code’ – but at what cost? Because there is not an agreed meaning as to what constitutes ‘online order’ that renders it simply and uncritically reducible to a set of formulae and algorithms that can be subsequently imposed (surreptitiously) by technological processes. The imposition of order online, as it is offline, needs to be subject to critical discussion and also checks and balances that have their origins in the authority of law. This article deconstructs and analyses spamming behaviour, before exploring the boundaries between law and code (technology) as governance in order to inform and stimulate the debate over the embedding of cybercrime prevention policy within the code itself.  相似文献   
142.
This study investigated to what extent abuse-related symptoms and family functioning are related to intra- or extrafamilial sexual abuse. One hundred adolescents (12 to 18 years old) were recruited shortly after disclosure of the abuse. Information from the participants was obtained through self-report questionnaires and a semistructured interview. Fifty-three percent of the adolescents reported clinically significant symptoms. Data did not support the idea that intrafamilial sexually abused adolescents report more symptoms than extrafamilial sexually abused adolescents. Type of abuse did not account for the differences and variety of reported symptoms or for differences in family functioning. Family functioning-in particular, lack of cohesion- was an independent contributor to internalizing trauma-related problems.  相似文献   
143.
A curious ownership structure is found in Northern Europe—foundations that own and operate business companies. The foundations are non-profit entities, they have no members and no owners, and they cannot be dissolved. In many cases, these entities control more than 50% of the votes in successful international companies. Obviously, this structure completely blocks the market for corporate control, but it also violates other basic principles of agency theory and corporate finance. Nevertheless, we present evidence that a sample of foundation-owned companies listed on the Copenhagen Stock Exchange are at least as efficient as other listed companies in terms of risk adjusted stock returns, accounting returns and Tobins Q. Thus, they question whether profit-seeking ownership is a necessary condition for competitive enterprise.JEL Classification: D23, G34, L31  相似文献   
144.
145.
146.
The author explores materialities as pre-established and co-producing features of criminal proceedings. This is done by discussing courtrooms, files and stories in relation to English Crown Court hearings. The three materialities gain significance in the course of the court hearing, but do not derive from it. They exceed the course of talk-in-court. Once the hearing started, the pre-established materialities can be referred to but not simply modified. Materialities, in this line, provide stability and guidance for the hearing. They facilitate, purify and condense it. However, their temporal separation causes problems for those who run the show. Materialities can be employed but not fully integrated. Unwelcome parts do, at times, disturb, disrupt and complicate the current dealings.  相似文献   
147.
The criminal justice system is supposed to protect and serve all members of the community equally; therefore, any prejudicial attitudes harbored by criminal justice students may negatively impact their job performance as future justice professionals. Four hundred and eighty-four students at a large Midwestern university were surveyed on their views toward gay and lesbian persons and issues. The responses of criminal justice majors were compared to the responses of students majoring in other fields. Criminal justice majors tended to have more negative views of gays and lesbians than students in other majors. However, there was not a significant difference between the two groups of students in their willingness to extend rights to and socialize with gay and lesbian individuals.  相似文献   
148.
This study examines the importance of victims’ expectations of the police, the decision to arrest, and voluntary contact on satisfaction ratings of the police in domestic violence cases. Based on results from past research and modern police policy, several hypotheses are tested including: fulfilled expectations, offender arrests, and voluntary contacts resulting in positive satisfaction ratings of the police. To investigate these predictions further, the present study utilizes data from a national study on violence against women in the United States. Logistic regression analyses indicate that fulfilled expectations and the arrest decision are important to positive satisfaction ratings. Findings also indicate that involuntary, not voluntary, contact with the police leads to higher satisfaction ratings.  相似文献   
149.
150.
There is a limited, but growing body of literature on the academic integrity of criminal justice majors. This study adds to the research by surveying 850 students at a Midwestern university and comparing criminal justice majors to students majoring in other disciplines. The survey consisted of various academic dishonesty behaviors, rationales for being academically dishonest, and whether or not the behaviors were ethical. The results indicated that there were some differences between criminal justice and non-criminal justice majors; however, for most measures, the two groups of students were similar. Unfortunately, the overall level of cheating was high for both criminal justice and non-criminal justice students.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号