首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9756篇
  免费   326篇
各国政治   644篇
工人农民   410篇
世界政治   791篇
外交国际关系   432篇
法律   5547篇
中国共产党   2篇
中国政治   144篇
政治理论   2017篇
综合类   95篇
  2020年   151篇
  2019年   159篇
  2018年   224篇
  2017年   239篇
  2016年   243篇
  2015年   223篇
  2014年   222篇
  2013年   1218篇
  2012年   252篇
  2011年   335篇
  2010年   254篇
  2009年   267篇
  2008年   270篇
  2007年   244篇
  2006年   247篇
  2005年   220篇
  2004年   243篇
  2003年   258篇
  2002年   180篇
  2001年   373篇
  2000年   358篇
  1999年   306篇
  1998年   160篇
  1997年   114篇
  1996年   117篇
  1995年   107篇
  1994年   115篇
  1993年   110篇
  1992年   165篇
  1991年   161篇
  1990年   153篇
  1989年   150篇
  1988年   167篇
  1987年   163篇
  1986年   164篇
  1985年   150篇
  1984年   151篇
  1983年   158篇
  1982年   96篇
  1981年   69篇
  1980年   82篇
  1979年   101篇
  1978年   80篇
  1977年   68篇
  1976年   68篇
  1975年   60篇
  1974年   50篇
  1972年   53篇
  1971年   54篇
  1969年   56篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
991.
992.
Disasters such as flash flooding, mass shootings, and train and airplane accidents involving large numbers of victims produce significant opportunity for research in the biosciences. This opportunity exists in the extreme tails of life events, however, during which decisions about life and death, valuing and foregoing, speed and patience, trust and distrust, are tested simultaneously and abundantly. The press and urgency of these scenarios may also challenge the ability of researchers to comprehensively deliver information about the purposes of a study, risks, benefits, and alternatives. Under these circumstances, we argue that acquiring consent for the immediate use of data that are not time sensitive represents a gap in the protection of human study participants. In response, we offer a two-tiered model of consent that allows for data collected in real-time to be held in escrow until the acute post-disaster window has closed. Such a model not only respects the fundamental tenet of consent in research, but also enables such research to take place in an ethically defensible manner.  相似文献   
993.
994.
The anti-corruption norm in both scholarship and the policy world has too narrowly focused on the domestic and institutional context of bribe-taking and public corruption. Instead, we argue that corruption in the contemporary global economy requires a multiple set of connected transactions, processes, and relationships that take place within informal transnational networks that blur the line between illegal and legal activities. These networks include multinational companies, elites in host countries, offshore financial vehicles and conduits, middlemen and brokers, and destination financial institutions. We examine how these actors operate in Central Asia, a region that is widely identified as corrupt, yet is rarely understood as embedded in the types of global processes, offshore connections and transnational links specified in our analysis. Examples of offshore centers in tax planning from Central Asia, and partial results from a field experiment based on impersonating high corruption risks from four Central Asian states, provide evidence for how the various actors in transnational financial networks structure their dealings. We then present two brief illustrative cases of how these transnational networks have operated in energy explorations services in Kazakhstan and telecommunications contracts in Uzbekistan. Our findings have theoretical, practical, and normative implications for scholars and practitioners of Central Asian international political economy and other ‘high risk' regions.  相似文献   
995.
996.
Although terrorism is widely understood to be the politically motivated creation of fear by means of violence in a target group, the nature of that fear is seldom explained or even considered. The present article attempts to close that gap by proposing a definition of terror as the apprehension of (more) violence to come. Because every terrorist act is perceived to be part of a potential series, terror is oriented towards the future and involves the imaginary anticipation of prospective events. On the basis of this definition, I will examine the problematical role of counterterrorist discourse. As the statements of public officials and security experts in the run-up to, and during, the “War on Terror” demonstrate, the peculiar dynamic of terror is, seemingly paradoxically, reinforced by counterterrorist rhetoric. With its insistence on the escalatory nature of terrorist violence and its repeated prediction of even worse attacks, counterterrorism contributes to the evocation of terror in the sense proposed here.  相似文献   
997.
Drawing on attribution theory, research on police discretion, and public attitudes toward mental illness, we examine attributional processes in police decision making in response to domestic violence situations involving veterans and nonveterans with signs of mental illness. Using data from experimental vignettes varying veteran status, victim injury, and suspect compliance administered to a sample of 309 police officers, the results indicate that 1) veterans are perceived as less responsible for troublesome behavior but more dangerous than nonveterans, 2) suspects’ veteran status has a significant effect on officers’ preference for mental health treatment versus arrest, and 3) part of the effect of veteran status on officer response is mediated by internal and external attributions for problematic behavior and by perceptions of dangerousness. The study empirically demonstrates countervailing processes in police decision making—recognition of the causes for troublesome behavior and the need for mental health treatment on the one hand and concern for community safety and enforcing the law on the other.  相似文献   
998.
Prior research on patterns of intimate partner violence (IPV) has documented changes over time, but few studies have focused directly on IPV desistance processes. This analysis identifies unique features of IPV, providing a rationale for the focus on this form of behavior cessation. We develop a life‐course perspective on social learning as a conceptual framework and draw on qualitative interviews (n = 89) elicited from a sample of young adults who participated in a larger longitudinal study (Toledo Adolescent Relationships Study). The respondents’ backgrounds reflected a range of persistence and desistance from IPV perpetration. Our analyses revealed that relationship‐based motivations and changes were central features of the narratives of successful desisters, whether articulated as a stand‐alone theme or in tandem with other potential “hooks” for change. The analysis provides a counterpoint to individualistic views of desistance processes, highlighting ways in which social experiences foster attitude shifts and associated behavioral changes that respondents tied to this type of behavior change. The analyses of persisters and those for whom change seemed to be a work in progress provide points of contrast and highlight barriers that limit a respondent's desistance potential. We describe implications for theories of desistance as well as for IPV prevention and intervention efforts.  相似文献   
999.
Both the columnar‐thin‐film (CTF) and the vacuum‐metal‐deposition (VMD) techniques for visualizing sebaceous fingermarks require the deposition of a material thereon in a vacuum chamber. Despite that similarity, there are many differences between the two techniques. The film deposited with the CTF technique has a columnar morphology, but the film deposited with the VMD technique comprises discrete islands. A split‐print methodology on a variety of fingermarked substrates was used to determine that the CTF technique is superior for developing fingermarks on clear sandwich bags and partial bloody fingermarks on stainless steel. Both techniques are similar in their ability to develop fingermarks on glass but the CTF technique yields higher contrast. The VMD technique is superior for developing fingermarks on white grocery bags and the smooth side of Gloss Finish Scotch Multitask? tape. Neither technique worked well for fingermarks on black garbage bags.  相似文献   
1000.
The traditional histology method typically employed by forensic anthropologists involves plastic embedding of undecalcified bone. The embedded sample is then cut by a diamond blade saw and ground to the required thickness of ~50–100 microns using a grinder. There are several limitations to this method: Cement lines may be blurred; depth‐of‐field artifacts may result from viewing thick sections; and medicolegal offices with limited budgets may not be able to invest in additional equipment or training for this method. A silver nitrate stain modification of the standard histology preparation technique of decalcified bone is presented. The benefits of this technique are that: Cement lines are viewed clearly; no depth‐of‐field artifacts are present; and because this is a modification of the standard technique used by histology laboratories typically employed by medicolegal offices, no additional equipment or training is required.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号