首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   541篇
  免费   21篇
各国政治   32篇
工人农民   41篇
世界政治   67篇
外交国际关系   39篇
法律   246篇
中国政治   4篇
政治理论   127篇
综合类   6篇
  2023年   11篇
  2022年   2篇
  2021年   8篇
  2020年   16篇
  2019年   21篇
  2018年   19篇
  2017年   33篇
  2016年   34篇
  2015年   16篇
  2014年   21篇
  2013年   89篇
  2012年   24篇
  2011年   23篇
  2010年   27篇
  2009年   19篇
  2008年   21篇
  2007年   24篇
  2006年   19篇
  2005年   18篇
  2004年   24篇
  2003年   13篇
  2002年   9篇
  2001年   7篇
  2000年   6篇
  1999年   3篇
  1998年   6篇
  1995年   2篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1991年   6篇
  1990年   6篇
  1989年   2篇
  1988年   3篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   2篇
  1977年   1篇
  1975年   1篇
  1974年   1篇
  1973年   3篇
  1970年   1篇
  1969年   4篇
  1968年   1篇
排序方式: 共有562条查询结果,搜索用时 46 毫秒
141.
142.
This study partially replicates and expands on a previous study that showed women's perceptions of risk to be a strong predictor of reassault among batterers. The current study employed a larger and multisite sample, a longer follow-up period of 15 months, and multiple outcomes including "repeated reassault" (n = 499). According to the multinomial logistic regressions, women's perceptions of risk improved prediction with risk factors (ROC area under the curve improved by.04 and sensitivity of repeated reassault increased 12 percentage points). In comparison to simulated risk instruments, women's perceptions by themselves were better predictors than the K-SID, similar in predictive ability to the SARA, and almost as strong as the DAS. The best prediction of repeated reassault was obtained using risk markers, including women's perceptions (ROC AUC =.83; 70% sensitivity) or by using the DAS and women's perceptions together (ROC AUC =.73; 64% sensitivity).  相似文献   
143.
144.
This paper has three complementary aims: to highlight the risks of IT fraud in the workplace and the implication for controls and future investigation; to show how emerging technologies such as the Internet and electronic commerce (e-commerce) have affected fraud risk; and to indicate some additional fraud risks which arise from the Euro-conversion and Y2K ('the millennium bug') compliance projects, both of which require heavy IT support. Information Technology (IT) fraud can be defined as: Where a financial loss or malicious damage has been sustained by an organisation, which has been facilitated by the use of computers in some way.  相似文献   
145.
146.
This study empirically addresses the relevance of public transparency in promoting sustainable development in Sub-Saharan Africa. Using the generalized method of moments techniques in order to account for concerns of endogeneity and simultaneity, the study utilizes a panel of forty-eight (48) countries in Sub-Saharan African countries for the period 2000-2019. We then establish the subsequent findings. Public transparency maintains overall positive net effects on both the human development index (i.e., social sustainability); adjusted net national income growth (i.e., economic sustainability), and renewal energy consumption (i.e., environmental sustainability). Overall, we establish that public transparency enhances sustainable development. This study recommends that policymakers should ensure that public transparency processes are enhanced in order to achieve the post-2015 agenda.  相似文献   
147.
Cultural responsiveness is a key aspect of the quality of organized activities, yet has rarely been examined. Based on developmental theories and a theoretical framework for culturally responsive activities, the current study investigated the prevalence and correlates of two ethnic cultural features (i.e., ethnic cultural content & ethnic cultural respect) in organized activities. Using data from 154 Latino adolescents (Mage?=?12.36, SD?=?.53; 59% Female) and parents, we examined associations between adolescent perceptions of both ethnic cultural features and their activity experiences; and associations between parent perceptions of both ethnic cultural features and parental involvement in the activity. Latino adolescents and parents in general perceived lower than average ethnic cultural content and moderate to high ethnic cultural respect in the reported activity. Both adolescents and parents were more likely to perceive ethnic cultural content and respect in activities where Latino youth were the numerical ethnic majority than in activities where Latino youth were the numerical ethnic minority. Latino adolescents’ perceptions of ethnic cultural respect were associated with more positive activity experiences, whereas their perceptions of ethnic cultural content were associated with more negative feelings. Latino parents’ perceptions of ethnic cultural content predicted higher involvement. To design culturally responsive activities, ethnic cultural features should be incorporated in a thoughtful, meaningful way that reflects both adolescents’ and parents’ perspectives.  相似文献   
148.
What explains variation in the depth of intelligence sharing? Realism provides the standard answer: shared threat motivates deeper cooperation. In a recent article, Ryan Bock offers a liberal antidote to this conventional view, leveraging insights on domestic regime type to explain why Anglo-Soviet sharing remained shallow despite the German threat during 1941–5. Several shortcomings in Bock’s innovative study undermine his main arguments and findings. A reevaluation of the Anglo-Soviet case and a cursory examination of nine other intelligence-sharing relationships during the Second World War reveal a spread of variation in the depth of cooperation that cannot be explained by a liberal regime-type argument, a realist threat perspective, or other prevailing International Relations paradigms. Marrying insights from interdisciplinary scholarship on gossip and embedded exchange, we propose a novel alternative framework that suggests plausible solutions to puzzles left behind by other accounts, thus opening a new line of inquiry for future research on intelligence cooperation.  相似文献   
149.
What might be described as a double impasse characterizes debate on U.S. housing tenure with advocates fighting for rental or ownership housing on one side and Third Way or mixed-tenure solutions on the other. Breaking this impasse requires disengaging from conceptions of an idealized form of tenure and instead advocating making virtually all tenures as secure and supported as possible, so that diverse households are able to live in homes that best fit their changing needs over their life cycles. This essay (a) presents data on the variety of tenures in the United States; (b) conveys a new two-dimensional map of tenure according to their degrees of control and potential for wealth-building; and (c) shows how U.S. institutions shape their risks and subsidies. Most U.S. tenures are at least somewhat risky, including those that receive the greatest federal subsidies. A new housing system is needed to secure and support as many tenures as possible.  相似文献   
150.
Findings from climate change vulnerability assessments can inform decision-makers in their evaluation of options to reduce the negative impacts of climate change. Certain attributes of an assessment can improve the use or uptake of its results. The science policy literature describes three characteristics – credibility, salience, and legitimacy – as being necessary for the uptake of scientific results for decision-making. We draw from the experiences of eight climate change vulnerability assessments conducted in Africa and Latin America for USAID (United States Agency for International Development) to explore the practical application of these three characteristics to fostering uptake of the assessment results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号