首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   498篇
  免费   15篇
各国政治   28篇
工人农民   23篇
世界政治   66篇
外交国际关系   37篇
法律   211篇
中国政治   4篇
政治理论   131篇
综合类   13篇
  2023年   2篇
  2021年   3篇
  2020年   8篇
  2019年   17篇
  2018年   11篇
  2017年   14篇
  2016年   20篇
  2015年   9篇
  2014年   12篇
  2013年   96篇
  2012年   16篇
  2011年   13篇
  2010年   13篇
  2009年   10篇
  2008年   26篇
  2007年   14篇
  2006年   19篇
  2005年   9篇
  2004年   19篇
  2003年   15篇
  2002年   12篇
  2001年   7篇
  2000年   11篇
  1999年   3篇
  1998年   10篇
  1997年   9篇
  1996年   5篇
  1995年   5篇
  1994年   9篇
  1993年   9篇
  1992年   5篇
  1991年   5篇
  1990年   3篇
  1989年   5篇
  1988年   2篇
  1987年   7篇
  1986年   4篇
  1985年   7篇
  1984年   7篇
  1983年   5篇
  1982年   5篇
  1981年   5篇
  1980年   6篇
  1978年   2篇
  1977年   3篇
  1975年   2篇
  1974年   2篇
  1973年   2篇
  1970年   2篇
  1968年   2篇
排序方式: 共有513条查询结果,搜索用时 0 毫秒
381.
382.
This article considers the World Bank as a political thinker. This involves an interpretation of the values, methodologies, and theoretical references contained within the Bank's governance documentation. Generally, the Bank steers away from a serious engagement with the nature of states, or the dynamics of reform execution, even in its more detailed policy documents in reform areas such as administrative reform. But, by looking at the World Bank's involvement in African states, we can understand the ways in which the World Bank works with certain expectations concerning how reforms will work. The article critically analyses the Bank's 'political vision' by comparing it with prominent theories of African politics. The article concludes that the World Bank's governance agenda misses three pivotal aspects of African politics: the unity of political and economic power, the extreme openness of African states to external pressures, and the salience of historically-embedded cultural and political relations. These three points directly raise important questions about the prospects of good governance reforms in Africa, and the involvement of the Bank therein.  相似文献   
383.
The police complaints process is the sole means by which criminal proceedings are initiated against police officers after allegations by members of the public that they were the victim of an offence committed by officers when in the execution or purported execution of their duty. Yet this state of the law has hardly figured in recent debate, which has seen the complaints process examined almost exclusively as the preliminary stage of the disciplinary process. This paper considers police complaints, the criminal liability of the officer and the implications for reform of the process after incorporation of the European Convention on Human Rights.  相似文献   
384.
There is growing interest in the social sciences in the concept of social capital and the role it plays in facilitating collaborative and collective actions. Within political science, it is the work of Robert Putnam which has dominated social capital research. This paper argues that the 'Putnam-school' approach is lacking in two main respects. First, the role played by public authorities in the creation of social capital is neglected. Second, the implications for governance cannot simply be read off from associational activity and 'stocks' of social capital. The concept of the political opportunity structure is offered and adapted to develop a framework for social capital analysis. Original empirical material from Birmingham is drawn upon and compared to earlier studies of the city in order to support and illustrate the arguments of the paper.  相似文献   
385.
Others have investigated the role that DNA profiling could play as a method for identifying the perpetrator of manual strangulation. These studies have demonstrated that it is possible to collect offender DNA from the skin surface of a victim following physical contact. It is not known whether nonself biological material is normally present on the skin surface due to adventitious transfer occurring during innocent everyday interactions. To test the hypothesis that detectable amounts of nonself DNA are normally present on the skin surface of healthy adult individuals due to the adventitious transfer of DNA occurring during normal day-to-day social interactions, we designed an experiment in three phases. Phase 1 was used to deduce which DNA collection, extraction, and amplification methods were suited to investigating this question. During phase 2, the neck surface of 24 healthy adult volunteers was swabbed. DNA was extracted using the QIAamp DNA mini kit and amplified using the SGM Plus PCR amplification kit, using 28 PCR cycles. The work carried out during phase 3 involved a simulated assault to investigate primary and secondary transfer of DNA during physical contact. It was found that 23% of neck areas swabbed during phase 2 of this investigation showed nondonor alleles in the resulting DNA profile, with 5% of areas showing six or more nondonor alleles. The results of phase 3 showed that primary, secondary, and zero transfer of victim and/or offender DNA could be observed after physical contact and that alleles from an unknown source could still be detected in this more controlled experiment. The data presented in this paper demonstrate that DNA profiles generated after swabbing the skin surface of healthy adults can include components of an unknown source, present due to adventitious transfer. These components, if present in large quantities, have the potential to interfere with DNA profile interpretation of swabs taken for the investigation of physical assault by DNA profiling.  相似文献   
386.
Anti-theft designs relating to mobile phones are reviewed. The physical and electronic design of handsets includes visual deterrents, owner-identification, and handset tracking options. The systems design of phone networks includes the blacklisting of stolen phones. Other measures include biometric-locking of handsets, and designs that encourage ‘safe’ phone use and transportation. Characteristics that promote anti-theft designs are proposed and form the acronym ‘IN SAFE HANDS’: identifiable, neutral, seen, attached, findable, executable, hidden, automatic, necessary, detectable, and secure. The set of characteristics is presented as a heuristic device to aid designing-out crime from frequently stolen electronic goods.
Graham FarrellEmail:
  相似文献   
387.
This article considers the role that securities litigation can play in forcing public companies to disclose climate change risks to their investors and potential shareholders. Such disclosure can prove to be a strong incentive for companies to manage their greenhouse gas emissions and climate change exposure better. Securities regulators in North America have, for the most part, resisted efforts effectively to enforce obligations by companies to disclose climate change risks. This led to a recent action by the Office of the Attorney-General in New York, which exemplifies the role that litigation can play in this area. Investors themselves may soon bring their own actions against companies over their carbon disclosure, the basis for which is already provided in securities legislation.  相似文献   
388.
The APEC Privacy Framework was developed from 2003, adopted by APEC in 2004 and finalised in 2005. It was intended as a means of improving the standard of information privacy protection throughout the APEC countries of the Asia–Pacific, and of facilitating the trans-border flow of personal information between those countries. In 2007 a number of ‘Pathfinder’ projects for cross-border data transfers were launched under the Framework. In the five years since the process commenced, what has it achieved, and what is it likely to achieve? This paper argues that the APEC Privacy Framework has had many flaws from its inception, including Privacy Principles that are unnecessarily weak, and no meaningful enforcement requirements. Since its adoption in 2004, little attempt has been made to encourage its use as a minimal standard for privacy legislation in developing countries (which might have been useful), and it is having little impact on the significant number of legislative developments now taking place.  相似文献   
389.
Although a number of methods have been proposed to control for word-count differences between truthful and deceptive accounts, there is no uniformity amongst researchers using the Reality Monitoring (RM) criteria as to when, why or how to standardise for word-count differences. Another factor that also has received little attention in the literature is whether the number of others present when a person is providing an account alters the lexical profile of accounts such that RM scores are affected. To investigate these issues, 62 autobiographical statements, 31 truthful and 31 deceptive, were generated under 3 conditions, no person present, 1 and 2 persons present, and were analysed before and after standardisation for word-count and duration. Results showed that the criteria successfully discriminated between truthful and deceptive accounts when no attempt to control for word-count was made and, to a lesser extent, when accounts were standardised for duration; however, they failed to discriminate after accounts had been standardised for length. The presence of others did not affect the ability to distinguish between truthful and deceptive accounts. The results highlight the difficulties involved in developing normative standardisation criteria which could be used in the field to classify individual or small numbers of cases.  相似文献   
390.
The final stage of third molar development is used to assign a subject to above the 18‐year threshold. Some subjects exhibiting this final stage are less than 18 years. Radiographs from 1000 females and 1000 males age 16.00–25.99 years were examined. Each half‐year age band comprised 50 females and 50 males. Three categories of root canal widths (RCW) of the LL6, LL7, and LL8 [FDI 36, 37, and 38] were defined. Reproducibility was achieved by re‐assessing the same subjects 12 months apart. For females, the minimum value for RCW‐A was 16.33 years, RCW‐B 17.23 years, and RCW‐C 18.45 years. For males, the minimum values were RCW‐A 17.16 years, RCW‐B 18.29 years, and RCW‐C 18.16 years. The presence of RCW‐C in a female, and the presence of RCW‐B or RCW‐C in a male is compelling evidence that the subject is above the 18‐year threshold.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号