全文获取类型
收费全文 | 1016篇 |
免费 | 49篇 |
专业分类
各国政治 | 124篇 |
工人农民 | 55篇 |
世界政治 | 150篇 |
外交国际关系 | 83篇 |
法律 | 458篇 |
中国政治 | 64篇 |
政治理论 | 127篇 |
综合类 | 4篇 |
出版年
2024年 | 1篇 |
2023年 | 11篇 |
2022年 | 5篇 |
2021年 | 20篇 |
2020年 | 39篇 |
2019年 | 54篇 |
2018年 | 63篇 |
2017年 | 70篇 |
2016年 | 57篇 |
2015年 | 41篇 |
2014年 | 49篇 |
2013年 | 129篇 |
2012年 | 68篇 |
2011年 | 87篇 |
2010年 | 30篇 |
2009年 | 23篇 |
2008年 | 43篇 |
2007年 | 33篇 |
2006年 | 31篇 |
2005年 | 35篇 |
2004年 | 45篇 |
2003年 | 36篇 |
2002年 | 25篇 |
2001年 | 10篇 |
2000年 | 6篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 10篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 7篇 |
1993年 | 5篇 |
1992年 | 1篇 |
1991年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1978年 | 1篇 |
1967年 | 2篇 |
1959年 | 1篇 |
1943年 | 1篇 |
排序方式: 共有1065条查询结果,搜索用时 15 毫秒
11.
12.
13.
ABSTRACTThis article explores how societal actors in Somalia take part in a transnational politics of countering/preventing violent extremism (CVE/PVE) through a political sociological approach to militarisation. We argue that the transnational politics of CVE represents an extension of global militarism by some states, institutions, donors and brokers. CVE works to adapt global militarism and to reconfigure the global-local relationships that sustain it. We explore the roles and influence of local ‘CVE brokers’ in deradicalisation efforts in South-central Somalia. They inadvertently merge the counter-terrorism approach to Somali people, values and territory with non-military means. We show that their key practices – co-ordination, translation and alignment – advance, but also disrupt, alter and transform CVE policy objectives. 相似文献
14.
María Jos Martínez Iglesias 《European Law Journal》2020,26(1-2):108-113
This work argues that there is no univocal interpretation of what regulatory policy is and pursues. Taking the strategy of the European Commission as a starting point only, it addresses more specifically the Union legislature's perspective, which, in a democratic decision‐making process, cannot compromise its autonomy. In the unique constitutional universe of the European Union, the “Better Law‐Making” agenda pursues an important additional objective: facilitating the very process of adopting legislation by means of interinstitutional conflict prevention mechanisms and through a common approach to interpretation and implementation of primary law. That is the main purpose of the Interinstitutional Agreements on the quality of legislation, which place them in the position of a sort of soft constitutional law. 相似文献
15.
Emina Borjanić Bolić 《Journal of public child welfare》2019,13(2):214-233
Child welfare professionals in diverse positions are exposed to a variety of traumatic events including family violence and child abuse and neglect. This secondary exposure puts child welfare workers at the risk of experiencing Secondary Traumatic Stress (STS) and Vicarious Traumatization (VT). For the first time in Serbia, this study quantitatively investigates whether STS and VT are present in child welfare professionals employed in the social welfare centers, foster care and adoption agencies, residential care programs, and shelters for children and youth. It attempts to identify whether the type of service, time exposure to clients, and supervision function as risk or protective factors for negative outcomes. A convenience sample comprised of 135 child welfare professionals completed a series of self-reported measures. Findings indicate that VT and STS are present in this population. Differences in the presence of STS and VT were found according to the types of services offered and length of exposure. Contrary to expectations, supervision was not a protective factor with regards to STS and VT in this population. 相似文献
16.
In the wake of the 2010 Belgrade Pride Parade, right-wing extremists portrayed the event as a threat to public morals, while liberals framed homophobia as a threat to democracy. While these moves managed to polarize and mobilize the public, the government didn’t heed their calls to adopt extraordinary measures. The Parade took place on 10 October and the extremists organized unchecked violent counter-demonstrations. By drawing on Securitization Theory, we triangulate content and discourse analysis to understand why these securitizing moves had a low success. Our analysis shows that although both moves followed the grammar of security, they were only partially embedded into the wider discursive context and were not enunciated by securitizing actors with strong positional power. 相似文献
17.
Ritual Demonstrations versus Reactive Protests: Participation Across Mobilizing Contexts in Mexico City 总被引:1,自引:0,他引:1
下载免费PDF全文
![点击此处可从《拉美政治与社会》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Using an innovative survey of protest participants and nonparticipants from five major street demonstrations in Mexico City in 2011 and 2012, this study tests the assumption that influences on protest participation vary across different types of events; namely, ritual demonstrations and reactive protests. The comparison is based on two assumptions: that these are two of the dominant forms of protest in contemporary Latin America, and that specifying the context for different types of social movement participation provides a better understanding of the individual mobilization process for groups seeking to defend their rights or gain new benefits. The comparative analyses reveal some crucial differences. Political interest and previous political experience are more influential in the decision to take part in reactive demonstrations. For ritual demonstrations, the decision to participate tends to be driven more by personal and organizational connections. 相似文献
18.
Mária Kondeková Radoslav Beňuš Ph.D. Soňa Masnicová Ph.D. Petra Švábová Ph.D. 《Journal of forensic sciences》2020,65(4):1303-1309
Minutiae are small distinguishing features found along every ridge flow, which make each friction ridge print unique. The most common friction ridge prints found at the crime scene are fingerprints; therefore, the most of the minutiae studies are focused exactly on this kind of prints. The authors believe that further examination and enlargement of the palm print database could result in better use of the palm prints for personal identification. We analyzed a total of 160 palm prints from 40 females and 40 males aged between 18 and 70 years from Slovakia. For the evaluation of the minutiae, the area of the hypothenar had to be marked out. The classification of the minutiae used for this study was based on a modified version of the classification system using the total of 13 types of minutiae. The frequency of every minutiae type was calculated and, using the chi-square test with Yates's correction, bilateral and sex differences were assessed. The relationship between the different types of minutiae was examined with Pearson's correlation test. During the initial phases of the identification process, the focus should be on the least common types of minutiae (Y or M and return), which were found not to correlate; thus, their mutual occurrence is random (e.g., overlap—Y or M, crossbar—return, or Y or M—dock). The results of the present study show which specific minutiae types are the most suitable for personal identification. These findings may be beneficial in more effective outcome of the identification process. 相似文献
19.
20.