首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23987篇
  免费   737篇
  国内免费   5篇
各国政治   1214篇
工人农民   1007篇
世界政治   1721篇
外交国际关系   884篇
法律   14667篇
中国共产党   8篇
中国政治   291篇
政治理论   4684篇
综合类   253篇
  2020年   315篇
  2019年   386篇
  2018年   489篇
  2017年   585篇
  2016年   582篇
  2015年   447篇
  2014年   473篇
  2013年   2473篇
  2012年   644篇
  2011年   751篇
  2010年   578篇
  2009年   604篇
  2008年   686篇
  2007年   718篇
  2006年   694篇
  2005年   627篇
  2004年   627篇
  2003年   688篇
  2002年   560篇
  2001年   932篇
  2000年   808篇
  1999年   708篇
  1998年   376篇
  1997年   257篇
  1996年   296篇
  1995年   261篇
  1994年   294篇
  1993年   286篇
  1992年   451篇
  1991年   480篇
  1990年   459篇
  1989年   392篇
  1988年   453篇
  1987年   402篇
  1986年   446篇
  1985年   409篇
  1984年   360篇
  1983年   347篇
  1982年   249篇
  1981年   248篇
  1980年   198篇
  1979年   252篇
  1978年   191篇
  1977年   168篇
  1976年   157篇
  1975年   171篇
  1974年   175篇
  1973年   144篇
  1972年   148篇
  1969年   144篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
1.
ABSTRACT

Since the late 20th century, the federal government has regulated colleges’ and universities’ handling of campus sexual and gender-based violence (CSGBV). Although the arc of history has bent toward establishing greater protections for victims of such violence, new proposed regulation by the U.S. Department of Education under the Trump administration focuses more heavily on ensuring due process rights for students accused of CSGBV. Most recently, in November 2018, U.S. Secretary of Education, Betsy DeVos submitted a proposed rule change to the regulation of Title IX of the Education Amendments of 1972. This article provides the historical context for this most recent proposed federal regulation of CSGBV and discusses the criticism of this proposal that, if it is implemented, students would become less safe in the ivory tower.  相似文献   
2.
Objectives

This study was an attempt to replicate the findings from an earlier experimental evaluation of a probation officer training program by Bonta et al. (Criminal Justice and Behavior, 38: 1127–1148, 2011). An experimental design was used with an improvement in the random assignment of clients and was tested with a sample of probation officers from a new jurisdiction.

Methods

Probation officers from the Canadian province of Alberta were randomly assigned to training or probation-as-usual. Officer behavior was measured by audio recordings of supervision sessions and recidivism was defined as a new conviction within 2 years of the initial recording. Attrition resulted in 27 probation officers submitting audio recordings of supervision sessions over a 6-month period (15 in the experimental group and 12 in the control). There were 160 recordings of 81 probationers submitted.

Results

The audio recordings showed inconsistent changes in officer behavior and no differences in recidivism between the clients of the experimental and control probation officers. However, the use of cognitive techniques by the probation officers was associated with a longer time to recidivism. In addition, by 10 months, more than half of the trained officers stopped their involvement in ongoing professional development activities.

Conclusion

Although the study failed to replicate the major findings reported by Bonta et al., it did highlight the importance of cognitive techniques in officer training. The results are interpreted with respect to the replication literature and the difficulties inherent in direct and conceptual replications especially in real-world settings.

  相似文献   
3.
In response to research demonstrating that irrelevant contextual information can bias forensic science analyses, authorities have increasingly urged laboratories to limit analysts' access to irrelevant and potentially biasing information (Dror and Cole (2010) [3]; National Academy of Sciences (2009) [18]; President's Council of Advisors on Science and Technology (2016) [22]; UK Forensic Science Regulator (2015) [26]). However, a great challenge in implementing this reform is determining which information is task-relevant and which is task-irrelevant. In the current study, we surveyed 183 forensic analysts to examine what they consider relevant versus irrelevant in their forensic analyses. Results revealed that analysts generally do not regard information regarding the suspect or victim as essential to their analytic tasks. However, there was significant variability among analysts within and between disciplines. Findings suggest that forensic science disciplines need to agree on what they regard as task-relevant before context management procedures can be properly implemented. The lack of consensus about what is relevant information not only leaves room for biasing information, but also reveals foundational gaps in what analysts consider crucial in forensic decision making.  相似文献   
4.
5.
ABSTRACT

Many liberals have been immodest in postulating that their own progressive, secular liberalism is the only one that can be justified in public reason. In Liberalism’s Religion, I articulate a more modest theory of liberalism and religion. While I personally endorse progressive secular liberalism, I argue that it is only one of the reasonable conceptions of liberal justice. This liberal modesty has profound, hitherto unnoticed implications for (i) the role of religious arguments in the public sphere, (ii) the legitimacy of religious establishment, and (iii) the justifiability of religious exemptions. In this article, I defend these three claims by providing replies to my critics.  相似文献   
6.
This paper describes several dimensions of the cost of the U.S. response to the threat of terrorism. Following an evaluation of the nature and magnitude of the threat of terrorism against the United States, the paper describes the restrictions on our civil liberties, the fiscal and other costs of the major homeland security measures, the fiscal cost of programs that make no contribution to the defense against terrorism but are rationalized on that ground, and the effects on our language and the potential for civil discourse of an extended defense against terrorism.  相似文献   
7.
8.
Numerous accounts reveal that congressional leaders often secure “hip‐pocket votes” or “if you need me” pledges from rank‐and‐file legislators. These are essentially options on votes. Leaders exercise sufficient options—pay legislators to convert to favorable votes—when those options will yield victory. Otherwise, they release the options. A model shows that this optimal strategy for leaders produces many small victories, few small losses, and losses that are, on average, larger than victories. We find precisely these patterns, hence strong evidence for vote options, in Congressional Quarterly key votes from 1975 through 2001 and in non‐key votes from the 106th Congress (1999–2000).  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号