首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1319篇
  免费   59篇
各国政治   55篇
工人农民   76篇
世界政治   153篇
外交国际关系   74篇
法律   622篇
中国政治   5篇
政治理论   388篇
综合类   5篇
  2023年   7篇
  2022年   6篇
  2021年   9篇
  2020年   26篇
  2019年   38篇
  2018年   46篇
  2017年   44篇
  2016年   57篇
  2015年   32篇
  2014年   34篇
  2013年   188篇
  2012年   30篇
  2011年   50篇
  2010年   28篇
  2009年   41篇
  2008年   44篇
  2007年   67篇
  2006年   46篇
  2005年   40篇
  2004年   45篇
  2003年   40篇
  2002年   38篇
  2001年   36篇
  2000年   23篇
  1999年   18篇
  1998年   20篇
  1997年   21篇
  1996年   20篇
  1995年   15篇
  1994年   21篇
  1993年   20篇
  1992年   17篇
  1991年   21篇
  1990年   12篇
  1989年   18篇
  1988年   18篇
  1987年   11篇
  1986年   17篇
  1985年   12篇
  1984年   23篇
  1983年   7篇
  1982年   12篇
  1981年   11篇
  1980年   5篇
  1979年   6篇
  1978年   4篇
  1977年   7篇
  1976年   4篇
  1975年   5篇
  1974年   4篇
排序方式: 共有1378条查询结果,搜索用时 15 毫秒
261.
Product counterfeiting has received increased attention due to its economic and public health impact. Media framing of product counterfeiting shapes how the public and policymakers understand the problem. While there is a large body of literature examining crime and the media generally, empirical studies have yet to focus on the media construction of product counterfeiting. This study presents the results of a content analysis using a random sample of newspaper articles referencing product counterfeiting in the New York Times and the Wall Street Journal from 2000 to 2009. Articles were coded for common patterns in sources of information. While the results indicate the presence of a wide variety of themes, product types, and industries, government and business sources are overrepresented among the sources cited, leading to some level of consistency in the presentation of the impact of and appropriate responses to product counterfeiting. Implications for understanding how the public and policymakers understand product counterfeiting are discussed.  相似文献   
262.
Throughout the 1990s, corruption cases, policy failure and scandals tarnished Belgium's international reputation. In this article, we analyse the effect of federalism and political culture on corruption and policy failures and their impact on the likelihood of such occurrences becoming scandals. Survey material suggests that there are few differences between French- and Dutch-speakers in the perception and tolerance of corruption. We then list a number of variables that can explain corruption in Belgium and argue that the independent effect of federalism is very limited. Next we demonstrate that federalism has played a much more significant role in lowering the risk of policy failure, while at the same time creating a few new vulnerabilities. Finally, we argue that the regional political elites do not often engage in policy learning and frequently put forward federalism as the main solution to the avoidance of policy failure and scandal. In this sense, regional political elites do not seize the opportunity for policy experimentation and transfer that is generally seen as one of the main virtues of a federal system of government.  相似文献   
263.
At the limits of spatial governmentality: A message from the tip of Africa   总被引:1,自引:0,他引:1  
Urban studies scholars drawing on Foucault's analysis of governmentality have investigated how urban social orders are increasingly more concerned with the management of space rather than on the discipline of offenders or the punishment of offences (Merry, 2001). This paper examines the 'rationality' and efficacy of spatial governmentality in post-apartheid Cape Town, and shows how the city has increasingly become a 'fortress city' (Davis, 1990), much like cities such as Los Angeles, Sao Paolo and Rio de Janeiro. These 'global cities' are increasingly characterised by privatised security systems in middle class suburbs, shopping malls and gated communities (Caldeira, 1999). These spatial forms of governmentality draw on sophisticated security systems comprising razor wire and electrified walls, burglar alarms and safe rooms, as well as vicious guard dogs, neighbourhood watches, private security companies, and automated surveillance cameras. On the other side of the race and class divide are urban ghettoes characterised by growing poverty and everyday violence. These socio-spatial inequalities continue to be reproduced despite urban planning initiatives aimed at desegregating the apartheid city. Although the media and the middle classes highlight the dangers of crime and violence, they tend to ignore the structures of inequality that fuel the growth of crime syndicates and violent drug economies that are reproducing these urban governance crises. Given the diminished resources of the neo-liberal state, the policing of middle class residential and business districts is increasingly being 'outsourced' to private security companies. In working class neighbourhoods of Cape Town such as Manenberg, the state has attempted to re-establish governance by resorting to new forms of spatial governmentality. The paper draws attention to the limits of these attempts to assert state control through the management of space. Spatial governance in places like Manenberg will continue to be relatively ineffectual given existing levels of social inequality and racial polarization. Such processes are reproduced by massive unemployment and racialised poverty resulting from socio-spatial legacies of apartheid and Cape Town's shift from a manufacturing to a tourist, IT and financial services economy. Although this paper focuses on attempts at re-establishing governance in a crime and gangster-ridden working class neighbourhood of Cape Town, it addresses these issues in relation to city-wide shifts to new forms of spatial governmentality after apartheid.  相似文献   
264.
265.
A methodology for converting terrorist networks from undirected graphs to simplified directed graphs (or digraphs), and mapping the flow of influence in them, is described. It is based on an “influence assumption”—that important persons with more links influence less important persons with fewer links. This methodology, which was previously used to analyze the structure of influence relationships in Communist-bloc countries and the international system, is illustrated by its application to two terrorist networks constructed after 9/11. In the second more complex network, the hierarchy sheds light on the leadership and likely terrorist cells embedded in the network. Refined data and alternative assumptions about influence could provide additional insights into the structure of terrorist networks.  相似文献   
266.
The harvesting of financial intelligence by law enforcement and intelligence services through various forms of surveillance is now so prevalent that it has become a core feature of contemporary security practice. Not surprisingly, concerns have been raised regarding the intrusive nature of financial intelligence collection and the emerging challenges posed to liberty. This article, whilst written primarily from a UK perspective, considers the trade-offs that inevitably emerge when liberty and security collide. Above all it argues that such measures are a necessary consequence of a changing security environment and that effective counter measures inevitably come at a price. The value added from data surveillance by the state, when lawfully sanctioned, audited and regulated are in the interests of public safety and national security, deemed a price worth paying.  相似文献   
267.
268.
In this article, the author examines the rise in court fees which has been decided in Malawi. The author argues that this increase is excessive and contravenes the constitutional right of access to justice, as poor litigants cannot afford the fees and thereby cannot access the justice system. In his analysis, the author suggests that the decision-makers in Malawi should adopt a policy-oriented approach in reviewing court fees in order to protect citizens’ rights and achieve equality.  相似文献   
269.
While the metaphor of House parties as cartels is widely accepted, its application to the Senate is difficult as the majority party lacks the power to unilaterally manipulate rules and pass legislation. Nevertheless, several scholars have argued that the Senate majority party is able to employ nondebatable motions to table to exclude unwanted amendments with procedural rather than substantive votes. Does the motion to table yield negative agenda control or special party influence? Using an analysis of individual Senators' behavior on thousands of votes and an assessment of interest group scores, we find that motions to table do not elicit higher party influence or provide much political cover. A desire to speed up the legislative process, rather than to insulate members from electoral scrutiny, seems to motivate the use of motions to table.  相似文献   
270.

Objectives

Evaluate the use of various time series methods to measure the deterrence effect of capital punishment.

Methods

The analysis of the time series approach to deterrence is conducted at two levels. First, the mathematical foundations of time series methods are described and the link between the time series properties of aggregate homicide and execution series and individual decision making is developed. Second, individual studies are examined for logical consistency.

Results

The analysis concludes that time series methods used to study the deterrence effects of capital punishment suffer from fundamental limitations and fail to provide credible evidence. The common limitation of these studies is their lack of attention to identification problems. Suggestions are made as to directions for future work that may be able to mitigate the weaknesses of the current literature.

Conclusions

Time series studies of capital punishment suffer from sufficiently serious identification problems that existing empirical findings are compatible with either the presence or the absence of a deterrent effect.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号