首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   836篇
  免费   43篇
各国政治   114篇
工人农民   27篇
世界政治   69篇
外交国际关系   49篇
法律   388篇
中国共产党   1篇
中国政治   6篇
政治理论   220篇
综合类   5篇
  2023年   4篇
  2022年   4篇
  2021年   6篇
  2020年   18篇
  2019年   21篇
  2018年   23篇
  2017年   33篇
  2016年   32篇
  2015年   29篇
  2014年   29篇
  2013年   141篇
  2012年   22篇
  2011年   21篇
  2010年   25篇
  2009年   16篇
  2008年   24篇
  2007年   21篇
  2006年   31篇
  2005年   31篇
  2004年   31篇
  2003年   32篇
  2002年   36篇
  2001年   10篇
  2000年   15篇
  1999年   13篇
  1998年   20篇
  1997年   20篇
  1996年   10篇
  1995年   5篇
  1994年   12篇
  1993年   17篇
  1992年   9篇
  1991年   8篇
  1990年   8篇
  1989年   12篇
  1988年   17篇
  1987年   4篇
  1986年   5篇
  1985年   3篇
  1984年   7篇
  1983年   4篇
  1982年   6篇
  1981年   6篇
  1979年   8篇
  1978年   6篇
  1977年   3篇
  1975年   3篇
  1973年   3篇
  1972年   3篇
  1968年   2篇
排序方式: 共有879条查询结果,搜索用时 15 毫秒
691.
692.
Abstract

Connectivity infrastructure is constantly expanding, increasing internet access across countries, regions and socio-political contexts. Given the fast-changing geography of the internet, there is a growing demand to strengthen cyber capacity beyond national frameworks, in order to develop a transnationally coherent and coordinated governance approach to cybersecurity. In this context, cyber capacity building initiatives are increasingly central in international debates, with the ambition to support countries in the Global South in fostering their cybersecurity strategy from technical and policy perspectives. This article discusses the key factors explaining states’ efforts to enhance their cyber capacity. Based on a cross-national quantitative research approach, the findings contradict international relations (IR)-derived approaches to cybersecurity, which assume that countries develop their cyber capacity according to external security threats, domestic politics or norms. In line with existing research on the role that science plays in policymaking processes more broadly, our results suggest instead that a country’s science and technical knowledge is the most robust explanation for that state’s cyber capacity level. These findings emphasise the need for policymakers to support countries in the Global South in developing their cyber capacity beyond national security paradigms by strengthening education and technical skills in contexts lacking in this resource.  相似文献   
693.
Empirical evidence highlights the utility of examining attachment styles in exploring the etiology of intimate partner violence perpetration, with insecure attachment styles regularly identified as underscoring domestically violent men. This study applied the 18-item self-report Adult Attachment Scale (Collins & Read, Journal of Personality and Social Psychology, 58(4), 644–663 1990) to 176 men entering a domestic violence perpetration counseling program. Factor analyses failed to result in the three factor model of the AAS. Subsequent item analyses indicated participants’ random and contradictory response style negated the possibility of any coherent factor structure. The results of this study caution investigators on the validity of self-report data with domestically violent men and offers both research and clinical/conceptual implications.  相似文献   
694.
Government agencies service interest groups, advocate policies, provide advice to elected officials, and create and implement public policy. Scholars have advanced theories to explain the role of agencies in American politics, but efforts to test these theories are hampered by the inability to systematically measure agency preferences. We present a method for measuring agency ideology that yields ideal point estimates of individual bureaucrats and agencies that are directly comparable with those of other political actors. These estimates produce insights into the nature of the bureaucratic state and provide traction on a host of questions about American politics. We discuss what these estimates reveal about the political environment of bureaucracy and their potential for testing theories of political institutions. We demonstrate their utility by testing key propositions from Gailmard and Patty's (2007) influential model of political control and endogenous expertise development.  相似文献   
695.
Population frequencies for the 9 Y-STR loci included in the "minimal haplotype" from Y-STR Haplotype Reference Database (YHRD), plus other 6 Y-STRs (DYS437, DYS438, DYS439, GATA A7.2, GATA H4 and GATA A10) were obtained for a sample of 120 males from Quito (Ecuador). One hundred and sixteen unique haplotypes were identified within the sample. Haplotype diversity (0.9994) was among the highest in comparison to other populations from Iberia and South-America. Genetic distances were calculated and our sample presented significative differences with all other samples, the lowest values being with a Guinean sample.  相似文献   
696.
OBJECTIVES: This study assessed the relationship between Eyewitness Accuracy regarding a person met under conditions of high stress and performance on a standardized, neutral test of memory for human faces. METHOD: Fifty-three U.S. Army personnel were exposed to interrogation stress. Forty-eight hours later, participants were administered the Weschler Face Test and then asked to identify the one interrogator who they had encountered 48 h earlier. RESULTS: A significant positive relationship was observed between performance on the Weschler Face Test and performance on the Eyewitness task. Inaccurate eyewitnesses exhibited more False Negative errors when performing the Weschler Face Test. DISCUSSION: Trait ability to remember human faces may be related to how accurately people recall faces that are associated with highly emotional circumstances. Detection probability methods, such as ROC curve analyses, may be of assistance to forensic examiners, the police, and the courts, when assessing the probability that eyewitness evidence is accurate.  相似文献   
697.
698.
699.
700.
Chinese analysts view the US military not only as a model for emulation but also as a serious threat given its strengths in high tech weapons and equipment, power projection, and unparalleled ability to conduct information-intensive joint combat operations. Yet they also see many of the capabilities the US military relies upon to execute these operations – most notably forward bases, space capabilities, and computer networks and information technology systems – as potentially vulnerable to disruption. Accordingly, China has developed capabilities designed to deter or counter US military intervention in areas close to China. This poses two interrelated challenges for the United States: maintaining its military advantage in an era of rapid technological change and preserving deterrence against growing Chinese ambitions in Asia.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号