首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   874篇
  免费   11篇
各国政治   8篇
工人农民   43篇
世界政治   21篇
外交国际关系   476篇
法律   272篇
中国政治   2篇
政治理论   62篇
综合类   1篇
  2022年   3篇
  2021年   3篇
  2020年   5篇
  2019年   7篇
  2018年   16篇
  2017年   9篇
  2016年   14篇
  2015年   6篇
  2014年   42篇
  2013年   93篇
  2012年   62篇
  2011年   96篇
  2010年   60篇
  2009年   73篇
  2008年   43篇
  2007年   44篇
  2006年   47篇
  2005年   41篇
  2004年   46篇
  2003年   46篇
  2002年   46篇
  2001年   6篇
  2000年   6篇
  1999年   2篇
  1998年   3篇
  1996年   3篇
  1995年   1篇
  1994年   4篇
  1993年   3篇
  1992年   3篇
  1991年   3篇
  1990年   4篇
  1988年   5篇
  1987年   1篇
  1986年   6篇
  1983年   2篇
  1982年   3篇
  1981年   1篇
  1980年   4篇
  1979年   4篇
  1978年   4篇
  1977年   4篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1973年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
排序方式: 共有885条查询结果,搜索用时 15 毫秒
731.
The robots.txt protocol allows website owners to specify whether and if so, what bots may access their sites. On the one hand, websites owners may have good reason to fend off bots. The bots may consume too much capacity, they may harvest data that are not suitable for presentation elsewhere on the web, or the owner may have reasons for disallowing bots that lie in the relation with user of the bot. On the other hand, search engines, aggregators and other users of bots may provide social beneficial services based on the data collected by bots, i.e. data that are freely available to anybody visiting the site manually. How should the law regulate disputes that arise in this context? Two legal regimes (trespass to chattels and unauthorised access) have been examined. Based on the characteristics of the disputes at hand, a number of desirable characteristics for an ideal form of regulation are identified. When testing the two regimes they are found to be lacking. A structure for a form of regulation is presented that allows the law to develop in a way that does more justice to the disputes at hand.  相似文献   
732.
ABSTRACT

This article argues that prospects for negotiations with Al Qaeda and the Islamic State have been undertheorized. Drawing on nearly two thousand pages of primary source material— all issues of Inspire and Dabiq magazines published at the time of writing—it examines these groups' statements about their motivations for violence, their objectives, and their views about the possibility of dialogue with the West. It finds stark differences in all three areas and suggests that assumptions that have prevented theorizing about negotiations with these groups should be revisited.  相似文献   
733.
This article focuses on the interplay of energy, climate change, and national security issues in Southwest Asia, using the newer definition of “national security” to include energy security, economic development, and climate change, as well as traditional security focusing on the military aspects.  相似文献   
734.
For many research purposes, scholars need reliable and valid survey measures of the extent to which people have been exposed to various kinds of political content in mass media. Nonetheless, good measures of media exposure, and of exposure to political television in particular, have proven elusive. Increasingly fragmented audiences for political television have only made this problem more severe. To address these concerns, we propose a new way of measuring exposure to political television and evaluate its reliability and predictive validity using three waves of nationally representative panel data collected during the 2008 presidential campaign. We find that people can reliably report the specific television programs they watch regularly, and that these measures predict change over time in knowledge of candidate issue positions, a much higher standard of predictive validity than any other measure has met to date.  相似文献   
735.
Although the secret ballot has been secured as a legal matter in the United States, formal secrecy protections are not equivalent to convincing citizens that they may vote privately and without fear of reprisal. We present survey evidence that those who have not previously voted are particularly likely to voice doubts about the secrecy of the voting process. We then report results from a field experiment where we mailed information about protections of ballot secrecy to registered voters prior to the 2010 general election. Consistent with our survey data, we find that these letters increased turnout for registered citizens without records of previous turnout, but they did not appear to influence the behavior of citizens who had previously voted. The increase in turnout of more than three percentage points (20%) for those without previous records of voting is notably larger than the effect of a standard get‐out‐the‐vote mailing for this group. Overall, these results suggest that although the secret ballot is a long‐standing institution in the United States, beliefs about this institution may not match the legal reality.  相似文献   
736.
Hostage taking of Westerners by militant groups has increased since 9/11. Despite this rising problem, there has been little academic research on how a hostage’s individual characteristics influence the outcome of the incident. Using a newly collected dataset of over 1,000 individuals taken hostage in incidents involving terrorist groups since 2001, this article evaluates how individual, national, and group characteristics influence the likelihood that hostage incidents end with the release or execution of the hostage. The findings show that a hostage’s nationality and occupation are significant individual-level drivers of outcomes, while the nature of the militant group itself also matters.  相似文献   
737.
738.
739.
740.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号