首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9424篇
  免费   297篇
各国政治   634篇
工人农民   414篇
世界政治   719篇
外交国际关系   393篇
法律   5407篇
中国共产党   2篇
中国政治   147篇
政治理论   1911篇
综合类   94篇
  2020年   132篇
  2019年   155篇
  2018年   210篇
  2017年   242篇
  2016年   246篇
  2015年   211篇
  2014年   216篇
  2013年   1156篇
  2012年   256篇
  2011年   330篇
  2010年   241篇
  2009年   265篇
  2008年   267篇
  2007年   237篇
  2006年   239篇
  2005年   209篇
  2004年   233篇
  2003年   249篇
  2002年   173篇
  2001年   360篇
  2000年   329篇
  1999年   292篇
  1998年   146篇
  1997年   104篇
  1996年   112篇
  1995年   102篇
  1994年   107篇
  1993年   102篇
  1992年   160篇
  1991年   156篇
  1990年   146篇
  1989年   140篇
  1988年   159篇
  1987年   157篇
  1986年   160篇
  1985年   148篇
  1984年   145篇
  1983年   154篇
  1982年   93篇
  1981年   67篇
  1980年   80篇
  1979年   98篇
  1978年   78篇
  1977年   66篇
  1976年   68篇
  1975年   59篇
  1974年   49篇
  1972年   53篇
  1971年   54篇
  1969年   54篇
排序方式: 共有9721条查询结果,搜索用时 0 毫秒
941.
Purpose: in the literature, the term ‘Internet crime’ has been coined to indicate the scenario in which a victim of homicide or other crimes is met through a chat room, and lured to death at the hands of the murderer. Various criticisms have been made of this new concept, on the grounds that the outcome is no different from that of other crimes committed without the use of Web resources, and so the method used has no particular influence. Indeed, it has been claimed that informatic crime just reflects a technological change in the nature of crime rather than a new form of criminal behavior attributable to the use of the Internet for criminal purposes. Method: our reflections were prompted by our experience as expert forensic psychiatry witnesses in three cases in which the aggressors had confessed to having had an exclusively virtual relationship with the victims, in which they spent a lot of time daily in a chat room. Conclusion: this scenario offers points for reflection on the nature of Web-mediated victim–aggressor interactions, to assess the effects on the planning and commission of the crime. Discussion. it’s our opinion that there really is such a thing as Internet-correlated crime, because in this case the quality and quantity of the Internet interactions progressively altered the men’s perception of the real relationship between themself and their victims.  相似文献   
942.
943.
944.
945.
The literature on social justice, and social justice movements themselves, routinely ignore nonhuman animals as legitimate subjects of social justice. Yet, as with other social justice movements, the contemporary animal liberation movement has as its focus the elimination of institutional and systemic domination and oppression. In this paper, I explicate the philosophical and theoretical foundations of the contemporary animal rights movement, and situate it within the framework of social justice. I argue that those committed to social justice – to minimizing violence, exploitation, domination, objectification, and oppression – are equally obligated to consider the interests of all sentient beings, not only those of human beings.  相似文献   
946.
Evidence suggests that consideration of personality disorder (PD) severity, incorporating both externalising and internalising features of PD, might help to clarify the PD – violence relationship; moreover, that separate developmental pathways might link externalising and internalising personality pathology with criminal violence. This study of 96 forensic patients with confirmed PD and a history of violent offending addressed the question of whether delusional ideation, measured by the Peters Delusions Inventory, might play a significant role in the link between severe PD and criminal violence. Severe PD, defined by summing scores across DSM-IV PD criteria, was significantly associated with delusional thinking, with violence, and with high levels of both externalising and internalising personality features. Delusional thinking was associated with violence via internalising but not externalising PD features, suggesting that the link between severe PD and violence may be partly mediated by delusional thinking.  相似文献   
947.
948.
Stephanie Lawson 《圆桌》2015,104(2):209-220
Abstract

Of all the island states of the Southwest Pacific, Fiji’s foreign relations have been the most fraught since the advent of independence in the region, due largely to a succession of coups d'état. These have invariably precipitated adverse responses from major partners and aid donors, notably Australia, New Zealand, the United States and the European Union. The last coup in 2006 also unsettled relations in Fiji’s more immediate region, especially among some of its smaller Polynesian neighbours, contributing to Fiji’s unprecedented suspension from the Pacific Islands Forum. This article reviews Fiji’s foreign relations from the time of independence in 1970 through the period of successive coups to the 2014 elections. It also examines Bainimarama’s strategies in extending foreign relations in the broader international sphere as well as issues surrounding the ‘normalisation’ of relations with its traditional partners.  相似文献   
949.
950.
The anti-corruption norm in both scholarship and the policy world has too narrowly focused on the domestic and institutional context of bribe-taking and public corruption. Instead, we argue that corruption in the contemporary global economy requires a multiple set of connected transactions, processes, and relationships that take place within informal transnational networks that blur the line between illegal and legal activities. These networks include multinational companies, elites in host countries, offshore financial vehicles and conduits, middlemen and brokers, and destination financial institutions. We examine how these actors operate in Central Asia, a region that is widely identified as corrupt, yet is rarely understood as embedded in the types of global processes, offshore connections and transnational links specified in our analysis. Examples of offshore centers in tax planning from Central Asia, and partial results from a field experiment based on impersonating high corruption risks from four Central Asian states, provide evidence for how the various actors in transnational financial networks structure their dealings. We then present two brief illustrative cases of how these transnational networks have operated in energy explorations services in Kazakhstan and telecommunications contracts in Uzbekistan. Our findings have theoretical, practical, and normative implications for scholars and practitioners of Central Asian international political economy and other ‘high risk' regions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号