全文获取类型
收费全文 | 874篇 |
免费 | 11篇 |
专业分类
各国政治 | 8篇 |
工人农民 | 43篇 |
世界政治 | 21篇 |
外交国际关系 | 476篇 |
法律 | 272篇 |
中国政治 | 2篇 |
政治理论 | 62篇 |
综合类 | 1篇 |
出版年
2022年 | 3篇 |
2021年 | 3篇 |
2020年 | 5篇 |
2019年 | 7篇 |
2018年 | 16篇 |
2017年 | 9篇 |
2016年 | 14篇 |
2015年 | 6篇 |
2014年 | 42篇 |
2013年 | 93篇 |
2012年 | 62篇 |
2011年 | 96篇 |
2010年 | 60篇 |
2009年 | 73篇 |
2008年 | 43篇 |
2007年 | 44篇 |
2006年 | 47篇 |
2005年 | 41篇 |
2004年 | 46篇 |
2003年 | 46篇 |
2002年 | 46篇 |
2001年 | 6篇 |
2000年 | 6篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1994年 | 4篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1988年 | 5篇 |
1987年 | 1篇 |
1986年 | 6篇 |
1983年 | 2篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 4篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 4篇 |
1976年 | 1篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1971年 | 1篇 |
1970年 | 1篇 |
1969年 | 1篇 |
1968年 | 1篇 |
排序方式: 共有885条查询结果,搜索用时 15 毫秒
731.
The robots.txt protocol allows website owners to specify whether and if so, what bots may access their sites. On the one hand, websites owners may have good reason to fend off bots. The bots may consume too much capacity, they may harvest data that are not suitable for presentation elsewhere on the web, or the owner may have reasons for disallowing bots that lie in the relation with user of the bot. On the other hand, search engines, aggregators and other users of bots may provide social beneficial services based on the data collected by bots, i.e. data that are freely available to anybody visiting the site manually. How should the law regulate disputes that arise in this context? Two legal regimes (trespass to chattels and unauthorised access) have been examined. Based on the characteristics of the disputes at hand, a number of desirable characteristics for an ideal form of regulation are identified. When testing the two regimes they are found to be lacking. A structure for a form of regulation is presented that allows the law to develop in a way that does more justice to the disputes at hand. 相似文献
732.
Seth Cantey 《冲突和恐怖主义研究》2013,36(10):757-775
ABSTRACTThis article argues that prospects for negotiations with Al Qaeda and the Islamic State have been undertheorized. Drawing on nearly two thousand pages of primary source material— all issues of Inspire and Dabiq magazines published at the time of writing—it examines these groups' statements about their motivations for violence, their objectives, and their views about the possibility of dialogue with the West. It finds stark differences in all three areas and suggests that assumptions that have prevented theorizing about negotiations with these groups should be revisited. 相似文献
733.
This article focuses on the interplay of energy, climate change, and national security issues in Southwest Asia, using the newer definition of “national security” to include energy security, economic development, and climate change, as well as traditional security focusing on the military aspects. 相似文献
734.
Susanna Dilliplane Seth K. Goldman Diana C. Mutz 《American journal of political science》2013,57(1):236-248
For many research purposes, scholars need reliable and valid survey measures of the extent to which people have been exposed to various kinds of political content in mass media. Nonetheless, good measures of media exposure, and of exposure to political television in particular, have proven elusive. Increasingly fragmented audiences for political television have only made this problem more severe. To address these concerns, we propose a new way of measuring exposure to political television and evaluate its reliability and predictive validity using three waves of nationally representative panel data collected during the 2008 presidential campaign. We find that people can reliably report the specific television programs they watch regularly, and that these measures predict change over time in knowledge of candidate issue positions, a much higher standard of predictive validity than any other measure has met to date. 相似文献
735.
Alan S. Gerber Gregory A. Huber David Doherty Conor M. Dowling Seth J. Hill 《American journal of political science》2013,57(3):537-551
Although the secret ballot has been secured as a legal matter in the United States, formal secrecy protections are not equivalent to convincing citizens that they may vote privately and without fear of reprisal. We present survey evidence that those who have not previously voted are particularly likely to voice doubts about the secrecy of the voting process. We then report results from a field experiment where we mailed information about protections of ballot secrecy to registered voters prior to the 2010 general election. Consistent with our survey data, we find that these letters increased turnout for registered citizens without records of previous turnout, but they did not appear to influence the behavior of citizens who had previously voted. The increase in turnout of more than three percentage points (20%) for those without previous records of voting is notably larger than the effect of a standard get‐out‐the‐vote mailing for this group. Overall, these results suggest that although the secret ballot is a long‐standing institution in the United States, beliefs about this institution may not match the legal reality. 相似文献
736.
Seth Loertscher 《Democracy and Security》2018,14(1):1-23
Hostage taking of Westerners by militant groups has increased since 9/11. Despite this rising problem, there has been little academic research on how a hostage’s individual characteristics influence the outcome of the incident. Using a newly collected dataset of over 1,000 individuals taken hostage in incidents involving terrorist groups since 2001, this article evaluates how individual, national, and group characteristics influence the likelihood that hostage incidents end with the release or execution of the hostage. The findings show that a hostage’s nationality and occupation are significant individual-level drivers of outcomes, while the nature of the militant group itself also matters. 相似文献
737.
738.
739.
740.