首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2377篇
  免费   60篇
各国政治   134篇
工人农民   74篇
世界政治   152篇
外交国际关系   560篇
法律   1026篇
中国政治   17篇
政治理论   443篇
综合类   31篇
  2023年   7篇
  2021年   10篇
  2020年   10篇
  2019年   17篇
  2018年   32篇
  2017年   52篇
  2016年   49篇
  2015年   34篇
  2014年   67篇
  2013年   335篇
  2012年   112篇
  2011年   149篇
  2010年   102篇
  2009年   120篇
  2008年   90篇
  2007年   90篇
  2006年   98篇
  2005年   102篇
  2004年   98篇
  2003年   107篇
  2002年   83篇
  2001年   31篇
  2000年   29篇
  1999年   31篇
  1998年   22篇
  1997年   34篇
  1996年   28篇
  1995年   32篇
  1994年   24篇
  1993年   30篇
  1992年   24篇
  1991年   29篇
  1990年   11篇
  1989年   22篇
  1988年   22篇
  1987年   21篇
  1986年   35篇
  1985年   20篇
  1984年   25篇
  1983年   22篇
  1982年   22篇
  1981年   24篇
  1980年   19篇
  1979年   16篇
  1978年   12篇
  1977年   9篇
  1976年   12篇
  1975年   17篇
  1974年   11篇
  1973年   12篇
排序方式: 共有2437条查询结果,搜索用时 15 毫秒
71.
72.
‘Non-traditional security’ (NTS) is prominently featured in the agenda of the Association of Southeast Asian Nations (ASEAN) and other ASEAN-led institutions in the Asia-Pacific. ‘NTS’ brings together a series transnational and non-military security threats that are considered common among regional states, urgent for them to attend to, and non-sensitive all at the same time. This a priori makes it a self-evident focus of attempts to bring regional security cooperation ‘to a higher plane’. However, this paper reveals that the uncontroversial character of NTS is overestimated, by shedding light on the co-existence of divergent – and potentially contradictory – interpretations of its meaning and implications in ASEAN and the wider region. In a context where ASEAN's relevance to the pursuit of regional security is increasingly being measured against its (in)ability to provide a coherent approach to security challenges that affect the region, the contested nature of NTS has important implications for the grouping's resilience in the twenty-first century.  相似文献   
73.
There is little previous research on firearm background check applications and denials despite the potential for such research to significantly benefit policy and practice. The U.S. firearm background check system is complex with federal, state, and local laws creating a patchwork system intended to increase public safety and reduce mortality. State characteristics may play an important role in changes in application and denial rates. We examined the relationship between application and denial rates and state characteristics such as poverty, race, gender, existing firearm ownership, and population density. Multi‐level longitudinal modeling was used in an ecological study design with the state as the unit of analysis spanning a time period between 2005 and 2010, inclusive. Results indicated that application and denial rates significantly increased over time. Population density and poverty level were negatively related to application and denial rates. Firearm ownership, male population size, and percent of residents that were white were positively related to application and denial rates. Percent of African–American residents was negatively related to application rate. The importance of understanding the factors that predict firearm prevalence and the need for additional research on the denial of firearms is discussed. Copyright © 2016 John Wiley & Sons, Ltd.  相似文献   
74.
75.
This article contends that it is time for the armed forces to revisit their schools, day rooms, wardrooms, squadron meeting places, headquarters, bases and posts to increase the level of awareness and the teaching of professional norms.  相似文献   
76.
77.
In this article we rethink the connection between prosecutorial experience and conviction psychology that undergirds much of the academic literature about wrongful convictions. The conviction psychology account of prosecutorial behavior asserts that prosecutorial susceptibility to cognitive biases deepens over time, thereby increasing the risk that prosecutors will become involved in wrongful convictions the longer they stay in the profession. Our interviews with more than 200 state prosecutors call into question the basis for this asserted correlation between prosecutorial experience and risk of misconduct. The prosecutors we met consistently reported that, all else equal, prosecutors tend to become more balanced, rather than more adversarial, over time. Hence, the prosecutors who present the greatest risk of producing a wrongful conviction are those who are either inexperienced or resistant to the normal maturation process. For this reason, we suggest that wrongful conviction researchers and database designers pay closer attention to the variables associated with prosecutorial experience and resistance that might affect the development of prosecutorial maturity and the consequent risk of wrongful convictions.  相似文献   
78.
The article argues that Islamist terror is driven by irrational forces; it analyzes jihadist values and doctrines that animate Islamic revolutionaries; it then contends that jihadist movements go through a cycle of mobilization, extremism, implosion and recreation. Finally, it assesses the prospects for jihadist revitalization, extremism, and decline in Syria and the Sahel. Examples from the Iraqi and Algerian jihadist campaigns are used for illustrative purposes throughout.  相似文献   
79.
For at least a decade, there have been numerous Yemeni, Saudi, and other countries’ assertions that Iran has been involved in supporting northern Yemeni rebels seeking autonomy from the Sana’a government. Iranian diplomatic and political support for this rebellious group (known as the Houthis) is undeniable, but Iranian military assistance for them has not always been easy to prove. This situation appeared to change in 2011 when Iran's increased involvement in Yemen occurred in response to both the chaotic situation there during the final year of the Saleh regime and the danger that the Arab Spring revolutions would leave Iran increasingly isolated. Evidence of Iranian efforts to supply weapons to the Houthis now seems overwhelming in contrast to uncertain reports prior to 2011. In addition, at least some of Yemen's southern secessionists also appear to be receiving at least limited Iranian financial support.  相似文献   
80.
This article builds on our previous introductory article to cloud computing ([2009] 25 CLSR 270-274) and seeks to explain how cloud computing has evolved. We then discuss how this evolution impacts on key contractual and legal considerations and how the treatment of these considerations might differ from their treatment in traditional IT supply agreements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号