全文获取类型
收费全文 | 836篇 |
免费 | 43篇 |
专业分类
各国政治 | 114篇 |
工人农民 | 27篇 |
世界政治 | 69篇 |
外交国际关系 | 49篇 |
法律 | 388篇 |
中国共产党 | 1篇 |
中国政治 | 6篇 |
政治理论 | 220篇 |
综合类 | 5篇 |
出版年
2023年 | 4篇 |
2022年 | 4篇 |
2021年 | 6篇 |
2020年 | 18篇 |
2019年 | 21篇 |
2018年 | 23篇 |
2017年 | 33篇 |
2016年 | 32篇 |
2015年 | 29篇 |
2014年 | 29篇 |
2013年 | 141篇 |
2012年 | 22篇 |
2011年 | 21篇 |
2010年 | 25篇 |
2009年 | 16篇 |
2008年 | 24篇 |
2007年 | 21篇 |
2006年 | 31篇 |
2005年 | 31篇 |
2004年 | 31篇 |
2003年 | 32篇 |
2002年 | 36篇 |
2001年 | 10篇 |
2000年 | 15篇 |
1999年 | 13篇 |
1998年 | 20篇 |
1997年 | 20篇 |
1996年 | 10篇 |
1995年 | 5篇 |
1994年 | 12篇 |
1993年 | 17篇 |
1992年 | 9篇 |
1991年 | 8篇 |
1990年 | 8篇 |
1989年 | 12篇 |
1988年 | 17篇 |
1987年 | 4篇 |
1986年 | 5篇 |
1985年 | 3篇 |
1984年 | 7篇 |
1983年 | 4篇 |
1982年 | 6篇 |
1981年 | 6篇 |
1979年 | 8篇 |
1978年 | 6篇 |
1977年 | 3篇 |
1975年 | 3篇 |
1973年 | 3篇 |
1972年 | 3篇 |
1968年 | 2篇 |
排序方式: 共有879条查询结果,搜索用时 15 毫秒
691.
692.
AbstractConnectivity infrastructure is constantly expanding, increasing internet access across countries, regions and socio-political contexts. Given the fast-changing geography of the internet, there is a growing demand to strengthen cyber capacity beyond national frameworks, in order to develop a transnationally coherent and coordinated governance approach to cybersecurity. In this context, cyber capacity building initiatives are increasingly central in international debates, with the ambition to support countries in the Global South in fostering their cybersecurity strategy from technical and policy perspectives. This article discusses the key factors explaining states’ efforts to enhance their cyber capacity. Based on a cross-national quantitative research approach, the findings contradict international relations (IR)-derived approaches to cybersecurity, which assume that countries develop their cyber capacity according to external security threats, domestic politics or norms. In line with existing research on the role that science plays in policymaking processes more broadly, our results suggest instead that a country’s science and technical knowledge is the most robust explanation for that state’s cyber capacity level. These findings emphasise the need for policymakers to support countries in the Global South in developing their cyber capacity beyond national security paradigms by strengthening education and technical skills in contexts lacking in this resource. 相似文献
693.
Anthony F. Tasso Donalee Brown Robert Griffo Ketrin Saud Maxwell 《Journal of family violence》2012,27(8):731-739
Empirical evidence highlights the utility of examining attachment styles in exploring the etiology of intimate partner violence perpetration, with insecure attachment styles regularly identified as underscoring domestically violent men. This study applied the 18-item self-report Adult Attachment Scale (Collins & Read, Journal of Personality and Social Psychology, 58(4), 644–663 1990) to 176 men entering a domestic violence perpetration counseling program. Factor analyses failed to result in the three factor model of the AAS. Subsequent item analyses indicated participants’ random and contradictory response style negated the possibility of any coherent factor structure. The results of this study caution investigators on the validity of self-report data with domestically violent men and offers both research and clinical/conceptual implications. 相似文献
694.
Joshua D. Clinton Anthony Bertelli Christian R. Grose David E. Lewis David C. Nixon 《American journal of political science》2012,56(2):341-354
Government agencies service interest groups, advocate policies, provide advice to elected officials, and create and implement public policy. Scholars have advanced theories to explain the role of agencies in American politics, but efforts to test these theories are hampered by the inability to systematically measure agency preferences. We present a method for measuring agency ideology that yields ideal point estimates of individual bureaucrats and agencies that are directly comparable with those of other political actors. These estimates produce insights into the nature of the bureaucratic state and provide traction on a host of questions about American politics. We discuss what these estimates reveal about the political environment of bureaucracy and their potential for testing theories of political institutions. We demonstrate their utility by testing key propositions from Gailmard and Patty's (2007) influential model of political control and endogenous expertise development. 相似文献
695.
Baeza C Guzmán R Tirado M López-Parra AM Rodríguez T Mesa MS Fernández E Arroyo-Pardo E 《Forensic science international》2007,173(2-3):214-219
Population frequencies for the 9 Y-STR loci included in the "minimal haplotype" from Y-STR Haplotype Reference Database (YHRD), plus other 6 Y-STRs (DYS437, DYS438, DYS439, GATA A7.2, GATA H4 and GATA A10) were obtained for a sample of 120 males from Quito (Ecuador). One hundred and sixteen unique haplotypes were identified within the sample. Haplotype diversity (0.9994) was among the highest in comparison to other populations from Iberia and South-America. Genetic distances were calculated and our sample presented significative differences with all other samples, the lowest values being with a Guinean sample. 相似文献
696.
Morgan CA Hazlett G Baranoski M Doran A Southwick S Loftus E 《International journal of law and psychiatry》2007,30(3):213-223
OBJECTIVES: This study assessed the relationship between Eyewitness Accuracy regarding a person met under conditions of high stress and performance on a standardized, neutral test of memory for human faces. METHOD: Fifty-three U.S. Army personnel were exposed to interrogation stress. Forty-eight hours later, participants were administered the Weschler Face Test and then asked to identify the one interrogator who they had encountered 48 h earlier. RESULTS: A significant positive relationship was observed between performance on the Weschler Face Test and performance on the Eyewitness task. Inaccurate eyewitnesses exhibited more False Negative errors when performing the Weschler Face Test. DISCUSSION: Trait ability to remember human faces may be related to how accurately people recall faces that are associated with highly emotional circumstances. Detection probability methods, such as ROC curve analyses, may be of assistance to forensic examiners, the police, and the courts, when assessing the probability that eyewitness evidence is accurate. 相似文献
697.
698.
699.
700.
Chinese analysts view the US military not only as a model for emulation but also as a serious threat given its strengths in high tech weapons and equipment, power projection, and unparalleled ability to conduct information-intensive joint combat operations. Yet they also see many of the capabilities the US military relies upon to execute these operations – most notably forward bases, space capabilities, and computer networks and information technology systems – as potentially vulnerable to disruption. Accordingly, China has developed capabilities designed to deter or counter US military intervention in areas close to China. This poses two interrelated challenges for the United States: maintaining its military advantage in an era of rapid technological change and preserving deterrence against growing Chinese ambitions in Asia. 相似文献