首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5849篇
  免费   198篇
各国政治   463篇
工人农民   152篇
世界政治   629篇
外交国际关系   365篇
法律   2450篇
中国政治   34篇
政治理论   1880篇
综合类   74篇
  2023年   27篇
  2020年   74篇
  2019年   100篇
  2018年   134篇
  2017年   152篇
  2016年   165篇
  2015年   113篇
  2014年   151篇
  2013年   945篇
  2012年   150篇
  2011年   173篇
  2010年   145篇
  2009年   142篇
  2008年   191篇
  2007年   254篇
  2006年   190篇
  2005年   178篇
  2004年   194篇
  2003年   190篇
  2002年   183篇
  2001年   105篇
  2000年   114篇
  1999年   91篇
  1998年   124篇
  1997年   99篇
  1996年   107篇
  1995年   81篇
  1994年   73篇
  1993年   87篇
  1992年   73篇
  1991年   91篇
  1990年   77篇
  1989年   69篇
  1988年   77篇
  1987年   86篇
  1986年   86篇
  1985年   51篇
  1984年   70篇
  1983年   70篇
  1982年   66篇
  1981年   50篇
  1980年   47篇
  1979年   43篇
  1978年   44篇
  1977年   46篇
  1976年   26篇
  1975年   26篇
  1974年   27篇
  1973年   34篇
  1972年   23篇
排序方式: 共有6047条查询结果,搜索用时 31 毫秒
891.
Statutes criminalizing behavior that risks transmission of HIV/AIDS exemplify use of the criminal law against individuals who are victims of infectious disease. These statutes, despite their frequency, are misguided in terms of the goals of the criminal law and the public health aim of reducing overall burdens of disease, for at least three important reasons. First, they identify individual offenders for punishment, a paradigm that is misplaced in the most typical contexts of transmission of infectious disease and even for HIV/AIDS, despite claims of AIDS exceptionalism. Second, although there are examples of individuals who transmit infectious disease in a manner that fits the criminal law paradigm of identification of individual offenders for deterrence or retribution, these examples are limited and can be accommodated by existing criminal laws not devoted specifically to infectious disease. Third, and most importantly, the current criminal laws regarding HIV/AIDS, like many other criminal laws applied to infectious disease transmission, have been misguided in focusing on punishment of the diseased individual as a wrongful transmitter. Instead of individual offenders, activities that enhance the scale of disease transmission—behaviors that might be characterized as ‘transmission facilitation’—are a more appropriate target for the criminal law. Examples are trafficking in human beings (including sex trafficking, organ trafficking, and labor trafficking), suppression of information about the emergence of infection in circumstances in which there is a legally established obligation to disclose, and intentional or reckless activities to discourage disease treatment or prevention. Difficulties remain with justifications for criminalizing even these behaviors, however, most importantly the need for trust in reducing overall burdens of disease, problems in identifying individual responsible offenders, and potential misalignment between static criminal law and the changing nature of infectious disease.  相似文献   
892.
台湾历来是中国领土的一部分,由于台湾优越的地理位置,长期受到外来势力的干扰.二战胜利后,台湾问题本来是国共内战遗留的内政问题,但由于美国的多方阻挠,台湾问题成为中美关系中最敏感的问题之一.自中国恢复联合国合法席位以及中美建交以后,包括美国在内的绝大部分国家都承认“台湾是中国的一部分”.中美关系下的台湾问题经历了中美对峙、中美建交、冷战后和9·11后以后,美国民众到底是如何认识中国台湾问题的?本文采用logistic模型,利用美国人对华态度实证调研的数据,全面解读美国民众如何看待中国台湾,并从中了解哪些因素影响美国民众对中国台湾地位的认识.  相似文献   
893.
Using stochastic methods we illustrate that the Provisional Irish Republican Army's (PIRA) network is clustered along three primary dimensions: (a) brigade affiliation, (b) whether the member participated in violent activities, and (c) task/role within PIRA. While most brigades tended to foster connections within the brigade (that is, “closure”), the tendency to do so varied across the organization. Members who engaged with violent activities were far more likely to connect with each other; in later periods there is polarization into those who engage in violent activities and those who do not. Across brigades, those who engage in a particular task and role (improvised explosive device [IED] constructor, IED planter, gunman, robber/kidnapper/drug smuggler/hijacker) are more likely to connect with others who do the same task or play the same role than with other members who fulfill other roles. Standard forms of homophily (that is, the tendency to make connections with people who are similar in terms of demography or status) play a very weak role in explaining which members interact with one another. Finally, our analysis illustrates clear patterns of relational change that correspond to changes in the formal structures that PIRA's leadership promoted.  相似文献   
894.
The turn of the twenty-first century witnessed a surprising reversal of the long-observed trend towards the disappearance of second chambers in unitary states, with 28 countries – all but one of them unitary – adopting the bicameral system. This article explores this development by first setting it in the context of the historical evolution of second chambers and the arguments that support bicameralism, and then exploring the characteristics that distinguish today's second chambers from first chambers. A ‘census’ of second chambers in 2014 is used to provide data on second chambers in federal and unitary states, to facilitate comparison with earlier data, and to distinguish between ‘new’ and longer-established second chambers. The article concludes that newly established second chambers are concentrated predominantly in political systems where liberal democratic principles are not established, suggesting that the debate over their role in democratic states is set to continue.  相似文献   
895.
This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone‐actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone‐actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone‐actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone‐actor terrorists were socially isolated. Lone‐actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone‐actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article.  相似文献   
896.
897.
A nonrandom national U.S. sample of 946 homicide crime scenes--supplied by the FBI Behavioral Science Unit for purposes of research--was studied to delineate the prevalence, types, levels, and motives for staging in domestic, nonserial sexual, serial sexual, and general felony homicides. Stagers were found to be a relatively small group who employ a variety of methods to alter the crime scene in an attempt to redirect the investigation away from themselves as logical suspects. Results also suggest that different types of homicides have different staging rates based primarily on the relationship (or connection) between offender and victim. Implications for investigations and understanding this type of crime scene behavior are discussed.  相似文献   
898.

Objectives

To present and test an opportunity perspective on prison inmate victimization.

Methods

Stratified random samples of inmates (n 1 = 5,640) were selected from Ohio and Kentucky prisons (n 2 = 46). Bi-level models of the prevalence of assaults and thefts were estimated. Predictors included indicators of inmate routines/guardianship, target antagonism, and target vulnerability at the individual level, and several indicators of guardianship at the facility level.

Results

Assaults were more common among inmates with certain routines and characteristics that might have increased their odds of being victimized (e.g., less time spent in recreation; committed violence themselves during incarceration), and higher levels of assaults characterized environments with lower levels of guardianship (e.g., architectural designs with more “blind spots”, larger populations, and less rigorous rule enforcement as perceived by correctional officers). Similar findings emerged for thefts in addition to stronger individual level effects in prisons with weaker guardianship (e.g., ethnic group differences in the risk of theft were greater in facilities with larger populations and less rigorous rule enforcement).

Conclusions

The study produced evidence favoring a bi-level opportunity perspective of inmate victimization, with some unique differences in the relevance of particular concepts between prison and non-prison contexts.  相似文献   
899.
900.
The authors present a cogent and detailed case for altering the Medical Devices Directive to allow regulation of cognitive enhancement devices (CEDs). Protection against significant risk of harm, especially for the vulnerable, and promotion of benefit through informed use of CEDs are all good features of the proposal. However, the pre-market approval process has limitations, which we explore. We raise the possibility of ‘risk compensation’ in response to the introduction of safety measures, which could alter its effectiveness. The proposal alludes to use of ‘formally trained practitioners,’ which provide a further tier of regulation for CEDs within the proposal. We consider some positive and negative implications of this aspect of the proposal that might warrant further consideration.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号