首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   873篇
  免费   32篇
各国政治   16篇
工人农民   29篇
世界政治   23篇
外交国际关系   467篇
法律   270篇
中国政治   3篇
政治理论   94篇
综合类   3篇
  2024年   1篇
  2023年   4篇
  2022年   3篇
  2021年   7篇
  2020年   11篇
  2019年   16篇
  2018年   19篇
  2017年   19篇
  2016年   29篇
  2015年   22篇
  2014年   52篇
  2013年   87篇
  2012年   64篇
  2011年   87篇
  2010年   66篇
  2009年   83篇
  2008年   42篇
  2007年   42篇
  2006年   44篇
  2005年   46篇
  2004年   45篇
  2003年   52篇
  2002年   41篇
  2001年   5篇
  2000年   1篇
  1999年   3篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1988年   3篇
  1987年   1篇
  1984年   1篇
  1980年   1篇
排序方式: 共有905条查询结果,搜索用时 15 毫秒
21.
22.
23.
Replication studies relate to the scientific principle of replicability and serve the significant purpose of providing supporting (or contradicting) evidence regarding the existence of a phenomenon. However, replication has never been an integral part of public administration and management research. Recently, scholars have called for more replication, but academic reflections on when replication adds substantive value to public administration and management research are needed. This article presents the RNICE conceptual model, for assessing when and how a replication study contributes knowledge about a social phenomenon and advances knowledge in the public administration and management literatures. The RNICE model provides a vehicle for researchers who seek to evaluate or demonstrate the value of a replication study systematically. The practical application of the model is illustrated using two published replication studies.  相似文献   
24.
In theory, terrorism is a political communication strategy for groups to convey their grievances and the costs of ignoring them. In practice, though, terrorist groups take responsibility for just a small portion of their attacks. Rather than getting credit for the violence, terrorist leaders generally deny their operatives committed it. This theoretical and empirical disconnect may explain why scholars have ignored the subject of unclaimed attacks despite these being the norm. With a mixed-methods research design, our study helps to fill this lacuna by proposing and testing a new theory to help account for variation in which attacks are claimed.  相似文献   
25.
26.
This article contends that it is time for the armed forces to revisit their schools, day rooms, wardrooms, squadron meeting places, headquarters, bases and posts to increase the level of awareness and the teaching of professional norms.  相似文献   
27.
The article argues that Islamist terror is driven by irrational forces; it analyzes jihadist values and doctrines that animate Islamic revolutionaries; it then contends that jihadist movements go through a cycle of mobilization, extremism, implosion and recreation. Finally, it assesses the prospects for jihadist revitalization, extremism, and decline in Syria and the Sahel. Examples from the Iraqi and Algerian jihadist campaigns are used for illustrative purposes throughout.  相似文献   
28.
For at least a decade, there have been numerous Yemeni, Saudi, and other countries’ assertions that Iran has been involved in supporting northern Yemeni rebels seeking autonomy from the Sana’a government. Iranian diplomatic and political support for this rebellious group (known as the Houthis) is undeniable, but Iranian military assistance for them has not always been easy to prove. This situation appeared to change in 2011 when Iran's increased involvement in Yemen occurred in response to both the chaotic situation there during the final year of the Saleh regime and the danger that the Arab Spring revolutions would leave Iran increasingly isolated. Evidence of Iranian efforts to supply weapons to the Houthis now seems overwhelming in contrast to uncertain reports prior to 2011. In addition, at least some of Yemen's southern secessionists also appear to be receiving at least limited Iranian financial support.  相似文献   
29.
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements.  相似文献   
30.
The adage that “it is always easier to fight the last war” is one that readily can be applied to the United States and its armed forces for not predicting the scale and type of operations encountered in the occupations of Iraq and Afghanistan. This article argues that the lack of preparation in the post-invasion phases arose from an institutional attachment to a preferred paradigm of warfare, as exemplified by the Persian Gulf War of 1991. This paradigm, though, has been substantially resurrected and re-configured to suit the fighting preferences of the American armed forces in its protracted encounters in Iraq and Afghanistan. Far from re-orienting its organization and mindset to meet the challenges of so-called counterinsurgency campaigns, as much current advocacy maintains, the military has reverted to the form of warfare it knows best.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号