首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1016篇
  免费   49篇
各国政治   124篇
工人农民   55篇
世界政治   150篇
外交国际关系   83篇
法律   458篇
中国政治   64篇
政治理论   127篇
综合类   4篇
  2024年   1篇
  2023年   11篇
  2022年   5篇
  2021年   20篇
  2020年   39篇
  2019年   54篇
  2018年   63篇
  2017年   70篇
  2016年   57篇
  2015年   41篇
  2014年   49篇
  2013年   129篇
  2012年   68篇
  2011年   87篇
  2010年   30篇
  2009年   23篇
  2008年   43篇
  2007年   33篇
  2006年   31篇
  2005年   35篇
  2004年   45篇
  2003年   36篇
  2002年   25篇
  2001年   10篇
  2000年   6篇
  1999年   2篇
  1998年   3篇
  1997年   10篇
  1996年   3篇
  1995年   3篇
  1994年   7篇
  1993年   5篇
  1992年   1篇
  1991年   4篇
  1990年   1篇
  1989年   1篇
  1988年   3篇
  1987年   2篇
  1986年   1篇
  1984年   1篇
  1983年   2篇
  1978年   1篇
  1967年   2篇
  1959年   1篇
  1943年   1篇
排序方式: 共有1065条查询结果,搜索用时 15 毫秒
11.
12.
13.
ABSTRACT

This article explores how societal actors in Somalia take part in a transnational politics of countering/preventing violent extremism (CVE/PVE) through a political sociological approach to militarisation. We argue that the transnational politics of CVE represents an extension of global militarism by some states, institutions, donors and brokers. CVE works to adapt global militarism and to reconfigure the global-local relationships that sustain it. We explore the roles and influence of local ‘CVE brokers’ in deradicalisation efforts in South-central Somalia. They inadvertently merge the counter-terrorism approach to Somali people, values and territory with non-military means. We show that their key practices – co-ordination, translation and alignment – advance, but also disrupt, alter and transform CVE policy objectives.  相似文献   
14.
This work argues that there is no univocal interpretation of what regulatory policy is and pursues. Taking the strategy of the European Commission as a starting point only, it addresses more specifically the Union legislature's perspective, which, in a democratic decision‐making process, cannot compromise its autonomy. In the unique constitutional universe of the European Union, the “Better Law‐Making” agenda pursues an important additional objective: facilitating the very process of adopting legislation by means of interinstitutional conflict prevention mechanisms and through a common approach to interpretation and implementation of primary law. That is the main purpose of the Interinstitutional Agreements on the quality of legislation, which place them in the position of a sort of soft constitutional law.  相似文献   
15.
Child welfare professionals in diverse positions are exposed to a variety of traumatic events including family violence and child abuse and neglect. This secondary exposure puts child welfare workers at the risk of experiencing Secondary Traumatic Stress (STS) and Vicarious Traumatization (VT). For the first time in Serbia, this study quantitatively investigates whether STS and VT are present in child welfare professionals employed in the social welfare centers, foster care and adoption agencies, residential care programs, and shelters for children and youth. It attempts to identify whether the type of service, time exposure to clients, and supervision function as risk or protective factors for negative outcomes. A convenience sample comprised of 135 child welfare professionals completed a series of self-reported measures. Findings indicate that VT and STS are present in this population. Differences in the presence of STS and VT were found according to the types of services offered and length of exposure. Contrary to expectations, supervision was not a protective factor with regards to STS and VT in this population.  相似文献   
16.
In the wake of the 2010 Belgrade Pride Parade, right-wing extremists portrayed the event as a threat to public morals, while liberals framed homophobia as a threat to democracy. While these moves managed to polarize and mobilize the public, the government didn’t heed their calls to adopt extraordinary measures. The Parade took place on 10 October and the extremists organized unchecked violent counter-demonstrations. By drawing on Securitization Theory, we triangulate content and discourse analysis to understand why these securitizing moves had a low success. Our analysis shows that although both moves followed the grammar of security, they were only partially embedded into the wider discursive context and were not enunciated by securitizing actors with strong positional power.  相似文献   
17.
Using an innovative survey of protest participants and nonparticipants from five major street demonstrations in Mexico City in 2011 and 2012, this study tests the assumption that influences on protest participation vary across different types of events; namely, ritual demonstrations and reactive protests. The comparison is based on two assumptions: that these are two of the dominant forms of protest in contemporary Latin America, and that specifying the context for different types of social movement participation provides a better understanding of the individual mobilization process for groups seeking to defend their rights or gain new benefits. The comparative analyses reveal some crucial differences. Political interest and previous political experience are more influential in the decision to take part in reactive demonstrations. For ritual demonstrations, the decision to participate tends to be driven more by personal and organizational connections.  相似文献   
18.
Minutiae are small distinguishing features found along every ridge flow, which make each friction ridge print unique. The most common friction ridge prints found at the crime scene are fingerprints; therefore, the most of the minutiae studies are focused exactly on this kind of prints. The authors believe that further examination and enlargement of the palm print database could result in better use of the palm prints for personal identification. We analyzed a total of 160 palm prints from 40 females and 40 males aged between 18 and 70 years from Slovakia. For the evaluation of the minutiae, the area of the hypothenar had to be marked out. The classification of the minutiae used for this study was based on a modified version of the classification system using the total of 13 types of minutiae. The frequency of every minutiae type was calculated and, using the chi-square test with Yates's correction, bilateral and sex differences were assessed. The relationship between the different types of minutiae was examined with Pearson's correlation test. During the initial phases of the identification process, the focus should be on the least common types of minutiae (Y or M and return), which were found not to correlate; thus, their mutual occurrence is random (e.g., overlap—Y or M, crossbar—return, or Y or M—dock). The results of the present study show which specific minutiae types are the most suitable for personal identification. These findings may be beneficial in more effective outcome of the identification process.  相似文献   
19.
20.
Samir Forić 《欧亚研究》2018,70(8):1330-1331
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号