首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1076篇
  免费   57篇
各国政治   54篇
工人农民   124篇
世界政治   101篇
外交国际关系   74篇
法律   533篇
中国共产党   1篇
中国政治   18篇
政治理论   218篇
综合类   10篇
  2023年   14篇
  2022年   13篇
  2021年   15篇
  2020年   44篇
  2019年   65篇
  2018年   59篇
  2017年   63篇
  2016年   50篇
  2015年   39篇
  2014年   47篇
  2013年   152篇
  2012年   48篇
  2011年   52篇
  2010年   33篇
  2009年   40篇
  2008年   41篇
  2007年   54篇
  2006年   46篇
  2005年   42篇
  2004年   38篇
  2003年   29篇
  2002年   30篇
  2001年   15篇
  2000年   12篇
  1999年   10篇
  1998年   8篇
  1997年   10篇
  1996年   5篇
  1995年   5篇
  1994年   6篇
  1993年   5篇
  1992年   6篇
  1991年   3篇
  1990年   2篇
  1988年   2篇
  1987年   5篇
  1986年   5篇
  1984年   3篇
  1983年   5篇
  1982年   4篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1976年   1篇
  1972年   1篇
  1971年   1篇
  1963年   1篇
排序方式: 共有1133条查询结果,搜索用时 15 毫秒
241.
ABSTRACT

The post-liberal IR debate on peacebuilding has made considerable efforts to reintroduce ‘the local’. In principle, critical peace studies follow the argument that communal capacities for peace formation exist in every society. However, few take the further conceptual step of taking emic perspectives on ordering and peacebuilding more seriously. This article aims at exploring and understanding customary concepts and practices of ordering with examples from Kyrgyzstan. It asks how and why communal actors and institutions contribute to ordering in the context of limited local tensions and how these actors navigate at national and international levels.  相似文献   
242.
243.
ABSTRACT

In this study, we contributed on research of policing cyberspace by analysing how different stakeholder groups (nodal clusters) participate in the formal security network during detecting and handling of data system break-ins in practice. The goal of this article was to study whether citizens have roles within the security network. The analysis was based on data system break-ins (n = 220) reported to the Finnish national computer emergency response team, CERT-FI, in 2012. We detected five types of nodal clusters: computer emergency response teams (CERTs), companies, public organisations, private persons and associations. The roles of nodal clusters were described by using cultural, social, political, economic and symbolic capital. However, the results show that there are differences not only between the nodal clusters but also inside them regarding their positioning within the network. We argue that instead of a type of nodal cluster, division based on the roles and individual needs could be more relevant. Recognition of roles could encourage netizens to co-produce cybersecurity from their respective premises.  相似文献   
244.
245.
246.
German feminist scholars have recently come to argue that female involvement in right‐extremist causes is grounded in gender‐specific motives. They have also begun to uncover a troubling link between new patterns of female political engagement (ranging from electoral mobilisation to violent streetfighting) and their own efforts to promote an independent women's consciousness since the 1960s. This article develops a typology of New Right women, characterised here as Femi‐Nazis, evincing different levels of sympathy for, identification with, and participation in radical and extremist movements. It then explores five issue orientations distinguishing New Right women of the 1990s from the Old and New Right men of the 1940s and 1990s, suggesting that these women have developed an independent, self‐assertive political consciousness without internalising feminism's broader aims of diversity and inclusion. The article concludes with reflections on the interplay of ‘feminist’ consciousness and ultra‐nationalist qua xenophobic attitudes, and on the dilemmas Femi‐Nazi thinking poses for feminist identity in united Germany.  相似文献   
247.
248.
This article was inspired by the Body Image Summit on 21 June 2000 in London at which a panel, headed by Tessa Jowell, Minister for Women, led a discussion among representatives of the media and British fashion industry. The aims of the Summit were to consider the effects of advertising images on teenage girls and women and to develop a consensus from within these industries to incorporate a social and ethical awareness in their promotional activities. A negative reaction to this forum was the main result. In this article I offer both a sociological and psychoanalytically based discussion of the problem of body image for women. I also consider how society and women themselves could begin to counteract the pernicious effects of being sold unrealistically thin, ideal images of womanhood continually perpetrated by consumerism.  相似文献   
249.
More than twenty‐five years after its adoption, the Access to Information Act has become increasingly a cause for concern among public servants, experts, scientists and the media. This article reviews the evolution of the access‐to‐information regime since the 1980s, the issues that have arisen, the political significance of information in democracy, and the enduring tension between its democratic purpose and strategic value. The article also examines the issues of centralization, control and secrecy within the state apparatus despite continuing calls for transparency. Under Conservative governments since 2006, there has been increased control and conflict over disclosure of information, which have spread to a larger part of the state apparatus. Among those involved in conflicts over information with the Prime Minister's Office are members and officers of Parliament and parliamentary committees.  相似文献   
250.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号