全文获取类型
收费全文 | 873篇 |
免费 | 32篇 |
专业分类
各国政治 | 16篇 |
工人农民 | 29篇 |
世界政治 | 23篇 |
外交国际关系 | 467篇 |
法律 | 270篇 |
中国政治 | 3篇 |
政治理论 | 94篇 |
综合类 | 3篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 3篇 |
2021年 | 7篇 |
2020年 | 11篇 |
2019年 | 16篇 |
2018年 | 19篇 |
2017年 | 19篇 |
2016年 | 29篇 |
2015年 | 22篇 |
2014年 | 52篇 |
2013年 | 87篇 |
2012年 | 64篇 |
2011年 | 87篇 |
2010年 | 66篇 |
2009年 | 83篇 |
2008年 | 42篇 |
2007年 | 42篇 |
2006年 | 44篇 |
2005年 | 46篇 |
2004年 | 45篇 |
2003年 | 52篇 |
2002年 | 41篇 |
2001年 | 5篇 |
2000年 | 1篇 |
1999年 | 3篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1988年 | 3篇 |
1987年 | 1篇 |
1984年 | 1篇 |
1980年 | 1篇 |
排序方式: 共有905条查询结果,搜索用时 15 毫秒
21.
22.
23.
RNICE Model: Evaluating the Contribution of Replication Studies in Public Administration and Management Research 下载免费PDF全文
Replication studies relate to the scientific principle of replicability and serve the significant purpose of providing supporting (or contradicting) evidence regarding the existence of a phenomenon. However, replication has never been an integral part of public administration and management research. Recently, scholars have called for more replication, but academic reflections on when replication adds substantive value to public administration and management research are needed. This article presents the RNICE conceptual model, for assessing when and how a replication study contributes knowledge about a social phenomenon and advances knowledge in the public administration and management literatures. The RNICE model provides a vehicle for researchers who seek to evaluate or demonstrate the value of a replication study systematically. The practical application of the model is illustrated using two published replication studies. 相似文献
24.
In theory, terrorism is a political communication strategy for groups to convey their grievances and the costs of ignoring them. In practice, though, terrorist groups take responsibility for just a small portion of their attacks. Rather than getting credit for the violence, terrorist leaders generally deny their operatives committed it. This theoretical and empirical disconnect may explain why scholars have ignored the subject of unclaimed attacks despite these being the norm. With a mixed-methods research design, our study helps to fill this lacuna by proposing and testing a new theory to help account for variation in which attacks are claimed. 相似文献
25.
26.
This article contends that it is time for the armed forces to revisit their schools, day rooms, wardrooms, squadron meeting places, headquarters, bases and posts to increase the level of awareness and the teaching of professional norms. 相似文献
27.
Anthony N. CelsoAuthor Vitae 《Orbis》2014,58(2):229-247
The article argues that Islamist terror is driven by irrational forces; it analyzes jihadist values and doctrines that animate Islamic revolutionaries; it then contends that jihadist movements go through a cycle of mobilization, extremism, implosion and recreation. Finally, it assesses the prospects for jihadist revitalization, extremism, and decline in Syria and the Sahel. Examples from the Iraqi and Algerian jihadist campaigns are used for illustrative purposes throughout. 相似文献
28.
W. Andrew TerrillAuthor Vitae 《Orbis》2014,58(3):429-440
For at least a decade, there have been numerous Yemeni, Saudi, and other countries’ assertions that Iran has been involved in supporting northern Yemeni rebels seeking autonomy from the Sana’a government. Iranian diplomatic and political support for this rebellious group (known as the Houthis) is undeniable, but Iranian military assistance for them has not always been easy to prove. This situation appeared to change in 2011 when Iran's increased involvement in Yemen occurred in response to both the chaotic situation there during the final year of the Saleh regime and the danger that the Arab Spring revolutions would leave Iran increasingly isolated. Evidence of Iranian efforts to supply weapons to the Houthis now seems overwhelming in contrast to uncertain reports prior to 2011. In addition, at least some of Yemen's southern secessionists also appear to be receiving at least limited Iranian financial support. 相似文献
29.
Andrew JointAuthor Vitae Edwin Baker Author Vitae 《Computer Law & Security Report》2011,27(4):407-415
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements. 相似文献
30.
The adage that “it is always easier to fight the last war” is one that readily can be applied to the United States and its armed forces for not predicting the scale and type of operations encountered in the occupations of Iraq and Afghanistan. This article argues that the lack of preparation in the post-invasion phases arose from an institutional attachment to a preferred paradigm of warfare, as exemplified by the Persian Gulf War of 1991. This paradigm, though, has been substantially resurrected and re-configured to suit the fighting preferences of the American armed forces in its protracted encounters in Iraq and Afghanistan. Far from re-orienting its organization and mindset to meet the challenges of so-called counterinsurgency campaigns, as much current advocacy maintains, the military has reverted to the form of warfare it knows best. 相似文献