首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   818篇
  免费   39篇
各国政治   51篇
工人农民   133篇
世界政治   59篇
外交国际关系   37篇
法律   401篇
中国政治   8篇
政治理论   164篇
综合类   4篇
  2023年   4篇
  2022年   9篇
  2021年   16篇
  2020年   29篇
  2019年   40篇
  2018年   48篇
  2017年   52篇
  2016年   53篇
  2015年   26篇
  2014年   31篇
  2013年   146篇
  2012年   41篇
  2011年   35篇
  2010年   18篇
  2009年   28篇
  2008年   33篇
  2007年   36篇
  2006年   18篇
  2005年   27篇
  2004年   17篇
  2003年   21篇
  2002年   32篇
  2001年   11篇
  2000年   8篇
  1999年   9篇
  1998年   5篇
  1997年   5篇
  1996年   9篇
  1995年   10篇
  1994年   1篇
  1993年   7篇
  1992年   6篇
  1991年   1篇
  1990年   5篇
  1989年   1篇
  1988年   4篇
  1987年   2篇
  1986年   4篇
  1985年   2篇
  1984年   1篇
  1982年   2篇
  1981年   1篇
  1979年   1篇
  1978年   1篇
  1977年   1篇
排序方式: 共有857条查询结果,搜索用时 312 毫秒
81.
Gunshot residue (GSR) is commonly analysed in forensic casework using either scanning electron microscopy with energy-dispersive X-ray spectroscopy (SEM-EDX) or gas chromatography-mass spectrometry (GC-MS). Relatively little work has been reported on the post-discharge GSR content of non-metallic inorganic or low molecular weight organic anions to distinguish between different ammunition types. The development of an analytical method using suppressed micro-bore anion exchange chromatography (IC) is presented for the analysis of GSR. A hydroxide gradient was optimised for the separation of 19 forensically relevant organic and inorganic anions in <23min and sensitivities of the order of 0.12-3.52ng of anion detected for all species were achieved. Along with an optimised extraction procedure, this method was applied to the analysis of post-ignition residues from three selected ammunition types. By profiling and comparing the anionic content in each ammunition residue, the possibility to distinguish between each type using their anionic profiles and absolute weight is presented. The potential for interference is also discussed with respect to sample types which are typically problematic in the analysis of GSR using SEM-EDX and GC-MS. To the best of our knowledge this represents the first study on the analysis of inorganic anions in GSR using suppressed ion chromatography.  相似文献   
82.
Spatial and Temporal Patterns of Terrorist Attacks by ETA 1970 to 2007   总被引:3,自引:0,他引:3  
Rational choice perspectives maintain that seemingly irrational behavior on the part of terrorist organizations may nevertheless reflect strategic planning. In this paper we examine spatial and temporal patterns of terrorist attacks by the Spanish group ETA between 1970 and 2007. Our analysis is guided by a public announcement by ETA in 1978 that the group would shift from emphasizing attacks in the Basque territory to instead launch attacks more widely in the hopes of exhausting the Spanish government and forcing it to abandon the Basque territory. This announcement suggests that prior to the end of 1978 ETA attacks were based mostly on controlling territory in the Basque region that they hoped to rule; and after 1978 the organization decided to instead undertake a prolonged war of attrition. Accordingly, we argue that before the end of 1978 ETA was mostly perpetrating control attacks (attacking only within the Basque territories) and that the diffusion of attacks between provinces was mostly contagious (spreading contiguously). After the 1978 proclamation, we argue that the attack strategy shifted toward attrition (attacking in areas outside of the Basque territories) and that the attacks were more likely to diffuse hierarchically (spreading to more distant locations). As predicted, we find that after ETA moved toward a more attrition based attack strategy, subsequent attacks were significantly more likely to occur outside the Basque region and to target non-adjacent regions (consistent with hierarchical diffusion). We also find that hierarchical diffusion was more common when a longer time elapsed between attacks (a likely consequence of the fact that more distant attacks require more resources and planning) and that attacks against Madrid were unlikely to be followed immediately by more attacks on Madrid or surrounding provinces. After ETA announced a shift in policy, they maintained a highly dispersed attack strategy even during their period of decline. Using information about where and when prior attacks occurred could provide useful information for policy makers countering groups like ETA.  相似文献   
83.
ABSTRACT

This article reports the findings of a small-scale qualitative study exploring the experiences of autistic adults who have had experience of the family justice system. While participants related some positive elements to their experiences, in particular with regard to the willingness of professionals to try to learn more about their clients’ needs, the overall picture showed significant concerns. The reports given showed significant misunderstandings about autism, and a system which struggled to make appropriate adjustments which would allow autistic court users to have access to justice on an equivalent basis to non-autistic litigants. This situation stands in contrast to the position regarding other disabilities in the Family Justice System, but also to the relatively greater level of provision for autistic people within the Criminal Justice System. Based on participants’ experiences and existing good practice in other areas, we make recommendations that could be adopted by the Family Court and practitioners.  相似文献   
84.
85.
Discursive Exit     
Some women did not participate in the Women's March, rejecting its claims of unity and solidarity because white women mobilize only in their self‐interest. This is a form of exit with three features: (1) rejecting a political claim; (2) providing reasons to the power wielder and the broader public; and (3) demanding accountability both as sanction and as deliberation, which requires a discussion about the claim—in this case, the meaning of the group and the terms on which it understands itself. This combination of exit, voice, and deliberative accountability might accurately be called “discursive exit.” Discursive exit addresses conceptual and normative limitations of standard accounts of exit, voice, and loyalty, in particular, when exit and voice are imperfect—because exit can be seen as disapproval of an entire cause—and morally problematic—because voice “from within” implies that cause trumps disagreement, leaving people morally complicit in an unwelcome exercise of power.  相似文献   
86.
This article explores the development and evolution of human trafficking policies in Latvia and the measurable outcomes of these policies. An analysis of policy development revealed that Latvia has three different types of human trafficking policy: criminalization statutes, national action programs, and victim service provisions. These policies have produced outcomes such as criminal cases against traffickers, rehabilitation services for victims, and the formation of anti-trafficking institutions. The results revealed direct causal links between human trafficking policies and anti-trafficking institutions are evident with the National Coordinator and social services for victims. Indirect causation is also present with specialized police and prosecutor units and anti-trafficking institutional policy development by the anti-trafficking working group.  相似文献   
87.
88.
Public management is a domain of research that is now roughly three decades old. Researchers in this area have made important advances in understanding about the performance of public organizations. But questions have been raised about the scope and methods of public management research (PMR). Does it neglect important questions about the development of major institutions of the modern state? Has it focused unduly on problems of the advanced democracies? Has it made itself irrelevant to public debates about the role and design of government, and the capacity of public institutions to deal with emerging challenges? This set of eight short essays were prepared for a roundtable held at the research conference of the PMR Association at the University of Aarhus in June 2016. Contributors were asked to consider the question: Is PMR neglecting the state?  相似文献   
89.
This article considers the making of Egypt's post-Mubarak constitution after considering the fact that participatory constitution-making is accepted as a democratic norm allowing citizens to be involved in the creation of their constitution and their future. The author argues that the process by which a constitution is made is crucial for the framing and legitimising of that constitution. Therefore, political elites and state institutions should not wholly control the process. The views of two schools of thought – idealism and realism – are considered. These views, together with the influence of the state and the concept of participation of the citizenry in the constitution-making process, are measured against international law requirements and further applied in a critical evaluation of Egypt's constitution-making process from 2011 to 2014.  相似文献   
90.
The use of the Internet and new technologies now seems to permeate the entire society, affecting every aspect of daily life. Although this change is characterized by undeniable positive aspects, it simultaneously bears a number of risks which are higher especially with respect to the growing number of younger users. In fact, young people, as the most involved in cyber space, are an age group most exposed to the dangers of improper and not aware use of electronic tools. The specific aim of this research was to study unwanted online attentions (UOA) among a sample of Italian students (N?=?585, mean age?=?14.5), identifying UOA as all those behaviors carried out through the Internet and technology to annoy, disturb, offend, humiliate, intimidate, threat, harass, harm or attack others. The online questionnaire investigated the online habits of the students, the presence of UOA and the characteristics of victims and perpetrators, the perception and emotional impact of such conducts, and the victims' possible reactions. The findings offer an estimate of the prevalence of these behaviors in the population of this age group in the area considered. More importantly, the results reveal a very high involvement in technology by the students accompanied by a lack of awareness regarding the risks connected to technology use as well as a low perception of UOA. These results give evidence of the needs in terms of prevention and education instruments in order to improve the system of responses to cybervictimization among young people.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号