首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   623篇
  免费   42篇
各国政治   46篇
工人农民   62篇
世界政治   56篇
外交国际关系   59篇
法律   327篇
中国政治   9篇
政治理论   102篇
综合类   4篇
  2023年   11篇
  2022年   3篇
  2021年   9篇
  2020年   30篇
  2019年   21篇
  2018年   43篇
  2017年   47篇
  2016年   47篇
  2015年   30篇
  2014年   25篇
  2013年   75篇
  2012年   28篇
  2011年   22篇
  2010年   20篇
  2009年   26篇
  2008年   18篇
  2007年   28篇
  2006年   30篇
  2005年   24篇
  2004年   18篇
  2003年   13篇
  2002年   21篇
  2001年   6篇
  2000年   8篇
  1999年   2篇
  1998年   7篇
  1997年   4篇
  1996年   2篇
  1995年   3篇
  1994年   5篇
  1993年   2篇
  1992年   1篇
  1991年   5篇
  1990年   2篇
  1988年   3篇
  1986年   3篇
  1985年   6篇
  1984年   3篇
  1983年   6篇
  1982年   3篇
  1978年   2篇
  1977年   1篇
  1975年   1篇
  1969年   1篇
排序方式: 共有665条查询结果,搜索用时 15 毫秒
351.
With governments increasingly contracting private military and security companies (PMSCs) to perform military and police-related tasks, international relations scholars have made attempts to better understand PMSCs and to investigate the reasons for the boom of private security. Rather than focusing on the services these companies offer, which has been a common approach, we offer an identity-based explanation for their surge. We show that PMSCs eclectically assume identities related to the military, business managers and humanitarians, independent of the services they perform, their market segment or their location on the battlefield. This finding points to an important yet little-noted dimension in the private security industry. Although companies are heterogeneous, they also appear increasingly homogeneous because they incorporate a similar set of identities. On the one hand, this enables PMSCs to adapt to any context, client or employee, and, on the other hand, it has constitutive qualities, contributing to an important source of power for the respective companies. These multiple identities contribute to a norm of what a superior security provider should look like.  相似文献   
352.
What explains the adoption of military innovations? In this article, we assess the empirical validity of adoption capacity theory by reconsidering one methodologically important case analyzed by Michael Horowitz: the diffusion of suicide terrorism. We show that, when addressing problems in Horowitz's research design, the case of suicide terrorism fails to support adoption capacity theory. We argue that, in order to account for the diffusion of this innovation, one needs to take into consideration the tactical incentives to overcome technologically superior enemies. The results of our quantitative and qualitative analyses suggest that terrorist groups fighting against very powerful states in terms of conventional capabilities are more likely to employ suicide attacks than those fighting against poorly equipped ones. Our findings are important because they provide systematic evidence in support of Kalyvas and Sànchez-Cuenca's argument that suicide terrorism is driven by tactical considerations and because they provide confidence in the external validity of Berman and Laitin's hardness of targets hypothesis. Our results also question Lyall and Wilson's finding that highly mechanized armies are inherently inadequate to win counterinsurgency operations. The superior conventional capabilities of a counterinsurgency army might in fact make traditional insurgent tactics ineffective and thus give insurgents an incentive to adopt suicide attacks.  相似文献   
353.
Externally-led security sector reform (SSR) in conflict-affected countries may require an array of different and timely interventions to restructure the whole security architecture of a state. Whilst the intent of these efforts is political, their nature is usually technical, operational and targeted at military, police, justice or intelligence actors, or relevant groups in the civilian policy sectors. Because of their urgency, there is seemingly little or no room for research to influence the implementation of these activities. Nevertheless, academic studies on SSR have flourished in recent years, and case studies, ‘lessons learned’ and recommendations for policy-makers now enrich this burgeoning literature. This paper analyses one of the early cases of an externally-led SSR intervention, namely the United Kingdom (UK) assistance programme in conflict-affected Sierra Leone. It seeks to understand whether and how research and knowledge on topics relevant to SSR influenced the development and implementation of the UK's SSR assistance policy in this country. Building on the Sierra Leonean case study, it then examines some general issues and themes, which characterise the use of research in SSR policy in conflict-affected environments.  相似文献   
354.
This paper investigates the impact of participation in European scientific networks on the stock of knowledge and on economic growth. We use scientific links in FP programmes to weight foreign R&D in order to construct two different measures of foreign R&D spillovers and we assess their impact on the production of knowledge (patents) and on economic growth in a panel of countries participating in FP over the period 1994–2005. We find that participation in EU funded projects is an important channel of knowledge transfer. However, while for countries with high levels of R&D expenditure R&D spillovers contribute to the generation of new knowledge, for low R&D spenders knowledge spillovers facilitate technological imitation and catching up.  相似文献   
355.
What factors do police officers point to in explaining offending and victimization? A limited amount of prior research has addressed this question, despite the possibility that such theories impact police practice. Moreover, the findings that do exist are based solely on municipal police; yet a different socio-environmental context could lead officers to adopt different explanations. In the present paper, we draw on qualitative data obtained in interviews with campus police officers to explore how they explain common crimes on campus. They theorized petty larceny, underage drinking, and drug possession to result from a variety of factors, including opportunity, social learning, supervision, culture, peer pressure, the psychopharmacological effect of alcohol on crime, and deterrence; as a collective, these ideas form officers’ rational choice theories. After presenting our findings, we suggest how officers’ explanations of crime may be shaped by working in particular contexts and also affect how they police; implications for future research and police practice are discussed.  相似文献   
356.
Notwithstanding cogent reasons for the continued existence of small local authorities in the sparsely populated Australian hinterland, compulsory council consolidation has been a recurring theme throughout the history of Australian local government. Despite its ubiquity, especially in rural, regional and remote Australian communities, its local consequences have not yet been fully examined by scholars or policy makers. The present paper seeks to remedy this neglect with an exploratory study of the social and economic consequences of forced local government amalgamations through the lens of the ‘lived experience’ of the small rural community of Manilla, which was forced in merge with the much larger Tamworth in 2004.  相似文献   
357.
358.
ABSTRACT

Despite increasing interest in child sexual abuse occurring in organisations, the perpetration of such abuse by females is largely ignored. This study examined situational factors in 136 cases of sexual abuse perpetrated by women working with children in the UK, Canada and the USA between 2000 and 2016. Qualitative and quantitative content analysis of court reports, professional regulator decisions, media reports and an online sentencing database was used, findings indicating that situational and contextual factors are highly relevant in perpetration. Much abuse occurs away from the organisational environment, particularly in perpetrators’ homes and cars, and in virtual environments. However, it also occurs within organisations, generally in unsupervised areas, outside of operating hours and often during mentoring/tutoring or extra-curricular activities. Organisational and local culture can be a facilitator in this abuse and allow it to continue even when concerns are raised. Practical prevention measures are suggested to assist in reducing future abuse.  相似文献   
359.
This article examines German national parties' use of the Internet in the 2002 federal election. Its main goals are to determine what the parties were doing in their online campaigns and how far their use of the Internet can be understood in terms of two party-specific variables – organisational size and primary goal. These questions are of significance given the relatively limited study of parties' use of the net in Germany in the comparative literature on this topic. Also, research on parties' use of the Web across countries has suggested that while context does produce differences in approach, partyspecific factors also play a major role in determining online strategy. The article attempts to investigate these questions systematically by examining nine German parties' use of the Internet (specifically websites, e-mail, and intra-nets) using questionnaire data from national party personnel and content analysis of web pages. Our findings show that while the divide between major and minor parties can be seen quite clearly in the German context in terms of website quality and visibility, evidence to support the impact of party outlook in shaping parties' online strategy can also be found. In addition, the study reveals that major parties are now beginning to take the Internet very seriously as a communication tool, particularly in terms of election campaigning.  相似文献   
360.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号