首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1220篇
  免费   25篇
各国政治   85篇
工人农民   32篇
世界政治   111篇
外交国际关系   111篇
法律   541篇
中国共产党   1篇
中国政治   10篇
政治理论   330篇
综合类   24篇
  2023年   5篇
  2021年   4篇
  2020年   8篇
  2019年   10篇
  2018年   25篇
  2017年   33篇
  2016年   38篇
  2015年   28篇
  2014年   25篇
  2013年   220篇
  2012年   30篇
  2011年   42篇
  2010年   31篇
  2009年   31篇
  2008年   39篇
  2007年   41篇
  2006年   45篇
  2005年   56篇
  2004年   54篇
  2003年   49篇
  2002年   42篇
  2001年   19篇
  2000年   27篇
  1999年   24篇
  1998年   22篇
  1997年   25篇
  1996年   18篇
  1995年   17篇
  1994年   17篇
  1993年   15篇
  1992年   17篇
  1991年   12篇
  1990年   9篇
  1989年   13篇
  1988年   13篇
  1987年   11篇
  1986年   17篇
  1985年   11篇
  1984年   10篇
  1983年   13篇
  1982年   9篇
  1981年   7篇
  1980年   7篇
  1979年   7篇
  1978年   7篇
  1977年   5篇
  1975年   7篇
  1974年   5篇
  1970年   4篇
  1969年   3篇
排序方式: 共有1245条查询结果,搜索用时 0 毫秒
291.
Finding brief effective treatments for criminal justice populations is a major public need. The CJ-DATS Targeted Intervention for Corrections (TIC), which consists of six brief interventions (Communication, Anger, Motivation, Criminal Thinking, Social Networks, and HIV/Sexual Health), were tested in separate federally-funded randomized control studies. In total, 1,573 criminal justice-involved individuals from 20 correction facilities participated (78% males; 54% white). Multi-level repeated measures analyses found significant gains in knowledge, attitudes, and psychosocial functioning (criteria basic to Knowledge, Attitude, and Practices (KAP) and TCU Treatment Process Models). While improvements were less consistent in criminal thinking, overall evidence supported efficacy for the TIC interventions.  相似文献   
292.
Extortionate terrorism is the threatened use of terrorist acts to gain concessions from the victim. In this article, game theory is used to seek answers to the following questions: (a) When will people resort to extortionate terrorism? (b) When will extortionate terrorism succeed and when will it fail? (c) What constitutes an “optimal” threat, i.e., what bribes, extortion, ransom, or payoff should be asked in exchange for which hostages or property? (d) When should unsuccessful threats be carried out and when should they be abandoned? (e) How should a victim choose among potential responses to specific terrorist threats and to the general problem of terrorism? Two different game theoretic models of terrorism are examined— one using ordinal preferences, the other von Neumann‐Mor‐genstern utilities. Terrorism is considered not simply as isolated incidents; institutions are potential victims of repeated terrorism. The terrorist and the victim, in formulating a response to each incident, are guided not only by present gains and losses, but by the effect their response has on others’ perception of their credibility and resolve—two long‐run variables.  相似文献   
293.
294.
295.
296.
297.
298.
299.

Recently, attention has been drawn to the close relations between the Palestine Liberation Organization (PLO) and the ruling Sandinista regime in Nicaragua. The support, training, and arms furnished by the PLO to the Sandinistas and like‐minded revolutionary movements in surrounding Central American countries have often been cited as proof that Nicaragua has been transformed into a base for international terrorism in the Western Hemisphere.

This article assesses the relationship between the PLO and the Sandinistas. In particular, it examines the geopolitical dimension of this relationship, that is, the extension or transposition of the conflict between the PLO and Israel in the Middle East to Central America. In this respect, PLO support and assistance to the Sandinistas and other revolutionary movements in surrounding countries has served as a counterbalance to Israeli support and arms sales to Nicaragua's neighbors in Central America.  相似文献   
300.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号