全文获取类型
收费全文 | 874篇 |
免费 | 11篇 |
专业分类
各国政治 | 8篇 |
工人农民 | 43篇 |
世界政治 | 21篇 |
外交国际关系 | 476篇 |
法律 | 272篇 |
中国政治 | 2篇 |
政治理论 | 62篇 |
综合类 | 1篇 |
出版年
2022年 | 3篇 |
2021年 | 3篇 |
2020年 | 5篇 |
2019年 | 7篇 |
2018年 | 16篇 |
2017年 | 9篇 |
2016年 | 14篇 |
2015年 | 6篇 |
2014年 | 42篇 |
2013年 | 93篇 |
2012年 | 62篇 |
2011年 | 96篇 |
2010年 | 60篇 |
2009年 | 73篇 |
2008年 | 43篇 |
2007年 | 44篇 |
2006年 | 47篇 |
2005年 | 41篇 |
2004年 | 46篇 |
2003年 | 46篇 |
2002年 | 46篇 |
2001年 | 6篇 |
2000年 | 6篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1994年 | 4篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1988年 | 5篇 |
1987年 | 1篇 |
1986年 | 6篇 |
1983年 | 2篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 4篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1971年 | 1篇 |
1970年 | 1篇 |
1969年 | 1篇 |
1968年 | 1篇 |
排序方式: 共有885条查询结果,搜索用时 15 毫秒
151.
Abstract Informed by Kaplan's general theory of deviant behavior it was hypothesized that adolescents characterized by deviant identities who developed negative self-feelings would decrease deviant behavior over time if the youths were bonded to the conventional social order but not if the youths were not bonded to the conventional social order. For adolescents not characterized by deviant identities, the development of negative self-feelings would increase deviant behavior over time regardless of the level of conventional social bonding. The hypotheses were explored using data from youth (n=1019) tested during early adolescence and re-tested 3 years later. Ordinary least square regression models estimated the effects of negative self-feelings on later deviant behaviors controlling for earlier deviant behavior, gender, race/ethnicity, and father's education. The model was estimated separately for each of four subgroups: deviant identity/high social bonding; deviant identity/low social bonding; non-deviant identity/high social bonding; and non-deviant identity/low social bonding. As hypothesized, negative self-feelings anticipated significant decreases in deviant behavior for the deviant identity/high social bonding group, but were unrelated to deviant behavior in the deviant identity/low social bonding group; and negative self-feelings anticipated increased deviant behavior in the two non-deviant identity groups regardless of the level of social bonding. 相似文献
152.
Seth R. Gitter Jeremy G. Weber Bradford L. Barham Mercedez Callenes Jessa Lewis Valentine 《发展研究杂志》2013,49(3):445-463
We explore three trends in rural southern Mexico (Fair Trade coffee, migration, and conditional cash transfers) that could explain the rapid rise in education from 1995–2005 using survey data from 845 coffee farming households in Oaxaca and Chiapas, Mexico. Results from a household fixed-effects model show that household participation in a Fair Trade-organic cooperative contributed to about a 0.7 year increase in schooling for girls. US migration opportunities appear to have even stronger positive impacts on schooling for females. Although participation in Fair Trade-organic cooperatives appears also to have increased male schooling, increased migration opportunities have had an indeterminate effect for males. 相似文献
153.
This article focuses on the apocalyptic zeitgeist of the Islamic State through the lens of what we call the New Tribalism. It finds that IS emerged from the Al Qaeda (AQ) milieu, but soon split with AQ as the messianic excitement surrounding Al-Baghdadi and his teachings grew. In common with previous millennial/messianic movements in all three “Peoples of the Book”—Judaism, Christianity, and Islam—IS soon evolved beyond the laws of the normative faith (antinomianism). We hold that for this reason, despite its claims of faith and fealty, IS has left the Islamic Umah behind, becoming a malign sectarian group of its own whose dynamism and successes are attracting a global audience and support from Muslims in almost every country. This helps to explain such abhorrent practices as forced conversion, sexual servitude, the destruction of historic artifacts, and mass executions. We find that the American invasion of Iraq was the vital first step in a series of events, which gave birth to IS. A thorough review of IS history and political culture traces these historic moments in time. 相似文献
154.
David Seth Jones 《Asian Journal of Political Science》2013,21(2):75-102
The article explains the features and evolution of the Central Provident Fund (CPF) scheme in Singapore and the reforms it has undergone in the face of recent challenges. At its inception, it was designed as an exclusively state managed savings scheme to meet the retirement needs of its members. Over the years, it has been gradually liberalised, allowing account holders to use their savings for additional purposes. In recent years two key challenges have arisen. One has been the problems arising out of liberalisation itself, which has left too many CPF members with insufficient savings for their retirement as a result of mistaken or imprudent choices in committing their savings to the additional options available. In response, the Singapore government has tempered or reversed the process of liberalisation, imposing or maintaining constraints on the use of CPF savings so as to ensure sufficient savings to meet retirement needs. The second challenge is the need to restructure the Singapore economy in the face of regional and global competition so as to sustain the profitability of the business sector and enhance employability of the older workers. The response of the government has been to allow the CPF contribution rates of employers to be adjusted and the CPF salary ceiling to be lowered so as to reduce business costs and increase the chances of employment of older workers. However, using the CPF scheme as a macroeconomic tool by reducing employers’ contribution rates may lead to less scope for CPF members to accumulate sufficient savings for their retirement. This would mean that the response to the second challenge would be at odds with the response to the first challenge. 相似文献
155.
The present article outlines the role of personal, social, and cultural identity in religiously and ethnically motivated terrorism. It is proposed that terrorism represents the confluence of a cultural identity strongly based in collectivism and in fundamentalist adherence to religious or cultural principles, a social identity based in sharp contrasts between one's own group and groups perceived as threats, and a foreclosed and authoritarian sense of personal identity or, less often, a diffused and aimless personal identity. Examples from religious-extremist and ethnic conflicts in which terrorism has been employed are used to illustrate the tenets advanced here. Recommendations for addressing and preventing the threat of terrorism are discussed. 相似文献
156.
Counterinsurgency as an operational method employed by the American military to achieve policy aims at a reasonable cost in blood and treasure has failed miserably. The idea that it has worked should be buried in the ground with a requiem stating that counterinsurgency is dead. Unfortunately, a large group of writers over many years have constructed a deeply flawed narrative that suggests that it is alive and well and continues to shape and influence American foreign policy toward and activist use of American military force in the world's troubled spots. 相似文献
157.
The Obama Administration's desire to push forward with strategic nuclear arms reductions during the President's second term requires the navigation of numerous shoals and reefs. U.S. and Russian negotiators will have to overcome both political and military obstacles to accomplish post-New START reductions in long-range nuclear weapons. For example, efforts to reduce offensive nuclear weapons are complicated by U.S. and NATO plans for missile defenses deployed in Europe and by exigencies in U.S. and Russian domestic politics. In addition, the military-technical aspects of cyber war and nuclear deterrence can no longer be treated, analytically or practically, as isolated compartments. This article considers several aspects of the relationships among possible post-START offensive force reductions, advanced conventional weapons including missile defenses, and emerging cyber capabilities. 相似文献
158.
159.
Despite the maturity of the software industry, empirical research demonstrates that average software quality, when measured through the presence of software defects, is low. Such defects cause a wide array of issues, not least in the form of vulnerabilities, which support a multi-billion pound a year industry of fraud in cyber crime. This paper suggests that this is the result of market failure stemming from two factors: the first is that information asymmetry prevents the establishment of software quality prior to purchase; whilst the second is that the legal provisions available under private law are unable in their current form to adequately address software liability issues. On that basis this paper proposes the use of standardisation as a tool to address both of these shortcomings by providing an industry benchmark against which software quality can be ascertained, as well as forming a legal tool for determining causation for the purposes of establishing legal liability. 相似文献
160.
The Internet of Things (IoT) as an emerging global Internet-based information architecture facilitating the exchange of goods and services is gradually developing. While the technical aspects are being discussed in detail a legal framework does not exist so far. The first supranational organization trying to work out an IoT governance framework has been the European Commission by appointing a large group of experts to examine the relevant aspects of a possible IoT governance regime. In the meantime, however, the activities have been degraded. Nevertheless, even if the differences between the IoT and the Internet have been overestimated at the beginning, many elements of the IoT differ in part from the corresponding problems in the Internet. Therefore, an analysis of the major IoT governance issues (legitimacy, transparency, accountability, anticompetitive behavior) seems to be worthwhile to conduct. 相似文献