全文获取类型
收费全文 | 869篇 |
免费 | 5篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 38篇 |
世界政治 | 14篇 |
外交国际关系 | 456篇 |
法律 | 265篇 |
中国政治 | 4篇 |
政治理论 | 86篇 |
综合类 | 2篇 |
出版年
2023年 | 2篇 |
2021年 | 1篇 |
2020年 | 2篇 |
2019年 | 7篇 |
2018年 | 10篇 |
2017年 | 9篇 |
2016年 | 5篇 |
2015年 | 9篇 |
2014年 | 43篇 |
2013年 | 90篇 |
2012年 | 58篇 |
2011年 | 94篇 |
2010年 | 63篇 |
2009年 | 72篇 |
2008年 | 43篇 |
2007年 | 43篇 |
2006年 | 45篇 |
2005年 | 47篇 |
2004年 | 51篇 |
2003年 | 50篇 |
2002年 | 40篇 |
2001年 | 6篇 |
2000年 | 3篇 |
1999年 | 2篇 |
1998年 | 9篇 |
1997年 | 4篇 |
1996年 | 5篇 |
1995年 | 1篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 5篇 |
1987年 | 6篇 |
1986年 | 3篇 |
1985年 | 4篇 |
1984年 | 2篇 |
1983年 | 4篇 |
1982年 | 6篇 |
1981年 | 3篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1978年 | 3篇 |
1977年 | 1篇 |
1973年 | 3篇 |
1970年 | 1篇 |
1967年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有874条查询结果,搜索用时 15 毫秒
781.
Joanna M. Lee Laurence Steinberg Alex R. Piquero George P. Knight 《Journal of youth and adolescence》2011,40(1):23-37
Ethnic identity development can play a role in youths’ perceptions and attitudes concerning police, but this process has not
been explored in delinquent samples. In this article, we examine how youths’ perceptions of police legitimacy and levels of
legal cynicism are related to processes of ethnic identity development. Participants were 561 black youth ages 14–18 (12%
female) who were adjudicated of a felony or serious misdemeanor. Data were taken from semi-annual interviews conducted over
3 years. Increased ethnic identity exploration was related to positive perceptions of police legitimacy and lower legal cynicism.
Higher ethnic identity affirmation predicted higher perceived legitimacy over time, but affirmation was not related to legal
cynicism after accounting for psychosocial maturity. This study provides evidence that ethnic identity development operates
similarly among high risk youth as in non-delinquent samples, and that it is connected to beliefs that can have implications
for juvenile offenders’ future compliance with the law. 相似文献
782.
Jean-Loup Samaan Author Vitae 《Orbis》2011,55(2):314-324
Power distribution in the maritime commons is changing. The inevitable relative decline of U.S. sea power provides an opening not only for China as a rising challenger but also for the European Union as a cooperative security provider. Although such a claim may have seemed farfetched a few years ago, the performance of the European Union in the counter-piracy Operation Atalanta off the coast of Somalia and in the Gulf of Aden, illustrates the possibility that the European Union will prove to be an unexpected player in the maritime commons in the twenty-first century. This possibility suggests a renewed transatlantic dialog over the governance of the maritime commons. 相似文献
783.
Dov S. Zakheim Author Vitae 《Orbis》2011,55(3):351-352
In this appreciative tribute, a vice chairman of FPRI's Board of Trustees assesses Harvey Sicherman's work in government and as President of a leading foreign policy think tank. 相似文献
784.
Harvey Sicherman Author Vitae 《Orbis》2011,55(3):360-376
The post-9/11 threats to American security require a complete revision of American national strategy. For too long, presidents have had to favor quick, cheap solutions to crises, unable to count on support from the “homebody” public for long, drawn-out conflicts. “Cheap hawks” among them have hoped that apocalyptic rhetoric will suffice when resources fall short; “cheap doves” hope that by ignoring the threat, it will go away. But with the war on terror, the revival of geopolitics, and ever-accelerating globalization, the U.S. tradition of bellicose rhetoric backed by underwhelming force is a recipe for failure. To effectively manage its threats, America needs a new catechism and to make sure its economic, energy, and military policies support this. 相似文献
785.
Jeremy Rabkin Author Vitae 《Orbis》2011,55(4):700-716
After months of bombing, NATO achieved only a stalemate in Libya. That disappointing result may reflect NATO's commitment to respect “international humanitarian law,” now understood to impose severe limits on military operations that might harm civilians. This body of rules is a departure from traditional understandings of the law of war. The embrace of these inhibiting rules raises serious questions about whether western nations are now prepared to fight and win actual wars. 相似文献
786.
787.
788.
Erin A. OrrickAuthor Vitae John L. WorrallAuthor VitaeRobert G. MorrisAuthor Vitae Alex R. PiqueroAuthor VitaeWilliam D. BalesAuthor Vitae Xia WangAuthor Vitae 《Journal of criminal justice》2011,39(6):499
Purpose
Tests of social support theory have relied on aggregate crime rates as the outcome of interest, but such a focus ignores the potentially important macro-level processes and effects on individual-level behavior We thus perform the first multi-level investigation of social support theory.Methods
Multilevel modeling is used to explore whether the two varieties of county-level social support - the presence of charitable organizations and AFDC expenditures - are associated with recidivism in a sample of Florida prison releasees.Results
Results show that while social support explains little variation in individual-level recidivism, a combination of private and public social support may reduce the likelihood of reconviction for drug offenses.Conclusion
Findings provide mixed evidence for the prospect that social support—whether governmental or nongovernmental—is associated with recidivism among recently-released inmates. 相似文献789.
Jeremy Prichard Paul A. Watters Caroline SpiranovicAuthor vitae 《Computer Law & Security Report》2011,27(6):585-600
With continual advances in Internet capability the child pornography market is experiencing a boom in demand and supply. Attempts to reduce the market challenge legislators, law enforcement agencies, practitioners and researchers alike – due in large part to the decentralised and global nature of the Internet. Much research has focused on frequent users of child pornography and whether such behaviour is interrelated with child sexual assaults. This article instead draws attention to onset, the first deliberate viewing of child pornography. It presents the results of a three-month study of a global Peer-to-Peer network, isoHunt. Analysis of the site’s Top 300 search terms indicated that child pornography is consistently shared. Risk factors for onset are discussed, including the potential normalisation of child pornography among Internet subcultures. Strategies are discussed to encourage subcultures to inhibit child pornography use and to increase understanding of the harms associated with such material. Implications for legal systems, policy and research are explored. 相似文献
790.
Clive SeddonAuthor vitae 《Computer Law & Security Report》2011,27(6):641-646
“The task of a leader is to get his people from where they are to where they have not been” Henry A. KissingerWith stuttering growth in the Western economies where major sourcing and TMT (Technology, Media & Telecoms) contracts are pervasive, it is perhaps not surprising that internal and external legal counsel are increasingly being called upon to advise clients on termination options and strategies to effect or oppose a threatened termination for breach of contract. This short paper considers why this has happened and the other factors which are in play which have meant that advice on termination and the renegotiation of contracts in this context has become more common. Expertise in this area is part of an IT lawyer’s tool kit and we consider that this is an area where internal and external legal counsel can make a substantial difference in delivering solutions to their clients.In this paper I talk about termination and renegotiation interchangeably. The reason for this as will become clear is that all forms of termination, whether they are consensual or contested, will involve some form of renegotiation of the terms of the contract between the parties. This is because it is almost impossible except perhaps in the simplest of installations to predict the nature in which a supplier or a customer may wish to change the services provided, and consequently even the most carefully crafted of exit and transition clauses, schedules and plans will require some form of post-contract negotiation between the customer, the outgoing supplier and potentially a new supplier or suppliers. This will necessarily involve some form of renegotiation of the terms of the contract between the parties.This paper looks at renegotiation in the context of a termination scenario rather than dealing with renegotiation during the normal course of operation of the contract. 相似文献