全文获取类型
收费全文 | 2377篇 |
免费 | 60篇 |
专业分类
各国政治 | 134篇 |
工人农民 | 74篇 |
世界政治 | 152篇 |
外交国际关系 | 560篇 |
法律 | 1026篇 |
中国政治 | 17篇 |
政治理论 | 443篇 |
综合类 | 31篇 |
出版年
2023年 | 7篇 |
2021年 | 10篇 |
2020年 | 10篇 |
2019年 | 17篇 |
2018年 | 32篇 |
2017年 | 52篇 |
2016年 | 49篇 |
2015年 | 34篇 |
2014年 | 67篇 |
2013年 | 335篇 |
2012年 | 112篇 |
2011年 | 149篇 |
2010年 | 102篇 |
2009年 | 120篇 |
2008年 | 90篇 |
2007年 | 90篇 |
2006年 | 98篇 |
2005年 | 102篇 |
2004年 | 98篇 |
2003年 | 107篇 |
2002年 | 83篇 |
2001年 | 31篇 |
2000年 | 29篇 |
1999年 | 31篇 |
1998年 | 22篇 |
1997年 | 34篇 |
1996年 | 28篇 |
1995年 | 32篇 |
1994年 | 24篇 |
1993年 | 30篇 |
1992年 | 24篇 |
1991年 | 29篇 |
1990年 | 11篇 |
1989年 | 22篇 |
1988年 | 22篇 |
1987年 | 21篇 |
1986年 | 35篇 |
1985年 | 20篇 |
1984年 | 25篇 |
1983年 | 22篇 |
1982年 | 22篇 |
1981年 | 24篇 |
1980年 | 19篇 |
1979年 | 16篇 |
1978年 | 12篇 |
1977年 | 9篇 |
1976年 | 12篇 |
1975年 | 17篇 |
1974年 | 11篇 |
1973年 | 12篇 |
排序方式: 共有2437条查询结果,搜索用时 15 毫秒
71.
72.
Stéphanie Martel 《The Pacific Review》2017,30(4):549-565
‘Non-traditional security’ (NTS) is prominently featured in the agenda of the Association of Southeast Asian Nations (ASEAN) and other ASEAN-led institutions in the Asia-Pacific. ‘NTS’ brings together a series transnational and non-military security threats that are considered common among regional states, urgent for them to attend to, and non-sensitive all at the same time. This a priori makes it a self-evident focus of attempts to bring regional security cooperation ‘to a higher plane’. However, this paper reveals that the uncontroversial character of NTS is overestimated, by shedding light on the co-existence of divergent – and potentially contradictory – interpretations of its meaning and implications in ASEAN and the wider region. In a context where ASEAN's relevance to the pursuit of regional security is increasingly being measured against its (in)ability to provide a coherent approach to security challenges that affect the region, the contested nature of NTS has important implications for the grouping's resilience in the twenty-first century. 相似文献
73.
There is little previous research on firearm background check applications and denials despite the potential for such research to significantly benefit policy and practice. The U.S. firearm background check system is complex with federal, state, and local laws creating a patchwork system intended to increase public safety and reduce mortality. State characteristics may play an important role in changes in application and denial rates. We examined the relationship between application and denial rates and state characteristics such as poverty, race, gender, existing firearm ownership, and population density. Multi‐level longitudinal modeling was used in an ecological study design with the state as the unit of analysis spanning a time period between 2005 and 2010, inclusive. Results indicated that application and denial rates significantly increased over time. Population density and poverty level were negatively related to application and denial rates. Firearm ownership, male population size, and percent of residents that were white were positively related to application and denial rates. Percent of African–American residents was negatively related to application rate. The importance of understanding the factors that predict firearm prevalence and the need for additional research on the denial of firearms is discussed. Copyright © 2016 John Wiley & Sons, Ltd. 相似文献
74.
75.
This article contends that it is time for the armed forces to revisit their schools, day rooms, wardrooms, squadron meeting places, headquarters, bases and posts to increase the level of awareness and the teaching of professional norms. 相似文献
76.
77.
Ronald F. Wright 《Law & social inquiry》2017,42(3):648-676
In this article we rethink the connection between prosecutorial experience and conviction psychology that undergirds much of the academic literature about wrongful convictions. The conviction psychology account of prosecutorial behavior asserts that prosecutorial susceptibility to cognitive biases deepens over time, thereby increasing the risk that prosecutors will become involved in wrongful convictions the longer they stay in the profession. Our interviews with more than 200 state prosecutors call into question the basis for this asserted correlation between prosecutorial experience and risk of misconduct. The prosecutors we met consistently reported that, all else equal, prosecutors tend to become more balanced, rather than more adversarial, over time. Hence, the prosecutors who present the greatest risk of producing a wrongful conviction are those who are either inexperienced or resistant to the normal maturation process. For this reason, we suggest that wrongful conviction researchers and database designers pay closer attention to the variables associated with prosecutorial experience and resistance that might affect the development of prosecutorial maturity and the consequent risk of wrongful convictions. 相似文献
78.
Anthony N. CelsoAuthor Vitae 《Orbis》2014,58(2):229-247
The article argues that Islamist terror is driven by irrational forces; it analyzes jihadist values and doctrines that animate Islamic revolutionaries; it then contends that jihadist movements go through a cycle of mobilization, extremism, implosion and recreation. Finally, it assesses the prospects for jihadist revitalization, extremism, and decline in Syria and the Sahel. Examples from the Iraqi and Algerian jihadist campaigns are used for illustrative purposes throughout. 相似文献
79.
W. Andrew TerrillAuthor Vitae 《Orbis》2014,58(3):429-440
For at least a decade, there have been numerous Yemeni, Saudi, and other countries’ assertions that Iran has been involved in supporting northern Yemeni rebels seeking autonomy from the Sana’a government. Iranian diplomatic and political support for this rebellious group (known as the Houthis) is undeniable, but Iranian military assistance for them has not always been easy to prove. This situation appeared to change in 2011 when Iran's increased involvement in Yemen occurred in response to both the chaotic situation there during the final year of the Saleh regime and the danger that the Arab Spring revolutions would leave Iran increasingly isolated. Evidence of Iranian efforts to supply weapons to the Houthis now seems overwhelming in contrast to uncertain reports prior to 2011. In addition, at least some of Yemen's southern secessionists also appear to be receiving at least limited Iranian financial support. 相似文献
80.
Andrew JointAuthor Vitae Edwin Baker Author Vitae 《Computer Law & Security Report》2011,27(4):407-415
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements. 相似文献