首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   541篇
  免费   21篇
各国政治   32篇
工人农民   41篇
世界政治   67篇
外交国际关系   39篇
法律   246篇
中国政治   4篇
政治理论   127篇
综合类   6篇
  2023年   11篇
  2022年   2篇
  2021年   8篇
  2020年   16篇
  2019年   21篇
  2018年   19篇
  2017年   33篇
  2016年   34篇
  2015年   16篇
  2014年   21篇
  2013年   89篇
  2012年   24篇
  2011年   23篇
  2010年   27篇
  2009年   19篇
  2008年   21篇
  2007年   24篇
  2006年   19篇
  2005年   18篇
  2004年   24篇
  2003年   13篇
  2002年   9篇
  2001年   7篇
  2000年   6篇
  1999年   3篇
  1998年   6篇
  1995年   2篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1991年   6篇
  1990年   6篇
  1989年   2篇
  1988年   3篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   2篇
  1977年   1篇
  1975年   1篇
  1974年   1篇
  1973年   3篇
  1970年   1篇
  1969年   4篇
  1968年   1篇
排序方式: 共有562条查询结果,搜索用时 31 毫秒
261.
262.
263.
Terrorism has been situated—and thereby implicitly also defined—in various contexts such as crime, politics, war, propaganda and religion. Depending on which framework one chooses, certain aspects of terrorism get exposed while others are placed ‘outside the picture’ if only one framework is utilised. In this article five conceptual lenses are utilised: 1. terrorism as/and crime; 2. terrorism as/and politics; 3. terrorism as/and warfare; 4. terrorism as/and communication; and 5. terrorism as/and religious fundamentalism.  相似文献   
264.
Abstract

The study of risk for sexual recidivism has undergone substantial development in recent years. The foundation for advances in this area has been the use of actuarial measures to identify subgroups of offenders with different observed rates of sexual re-offending over time. An unresolved issue within this research area has been the moderating function of age in the assessment of risk. The current study examined sexual re-offending as a function of age and actuarial risk in a large sample of sexual offenders released from prison between 1990 and 2004. There was an overall decrease in the rate of sexual re-offending over the age of 50. However, a small group of offenders from the higher actuarial risk categories of the older age groups continued to re-offend at higher rates than their lower-risk peers.  相似文献   
265.
Research has indicated that traditional methods for accessing facial memories usually yield unidentifiable images. Recent research, however, has made important improvements in this area to the witness interview, method used for constructing the face and recognition of finished composites. Here, we investigated whether three of these improvements would produce even-more recognisable images when used in conjunction with each other. The techniques are holistic in nature: they involve processes which operate on an entire face. Forty participants first inspected an unfamiliar target face. Nominally 24 h later, they were interviewed using a standard type of cognitive interview (CI) to recall the appearance of the target, or an enhanced ‘holistic’ interview where the CI was followed by procedures for focussing on the target's character. Participants then constructed a composite using EvoFIT, a recognition-type system that requires repeatedly selecting items from face arrays, with ‘breeding’, to ‘evolve’ a composite. They either saw faces in these arrays with blurred external features, or an enhanced method where these faces were presented with masked external features. Then, further participants attempted to name the composites, first by looking at the face front-on, the normal method, and then for a second time by looking at the face side-on, which research demonstrates facilitates recognition. All techniques improved correct naming on their own, but together promoted highly-recognisable composites with mean naming at 74% correct. The implication is that these techniques, if used together by practitioners, should substantially increase the detection of suspects using this forensic method of person identification.  相似文献   
266.
267.
Abstract

Banks and other depository institutions have signed more than 300 community reinvestment agreements valued at $350 billion in the two decades since the passage of the Community Reinvestment Act (CRA). This article examines the effectiveness of negotiating CRA agreements in Chicago, Cleveland, Pittsburgh, and New Jersey. After describing the agreements and the procedures by which they are enforced, the article looks at their impact and discusses several factors that could limit implementation of CRA agreements in the future.

The findings suggest that CRA agreements are more effective in some areas than others. They seem most consistently successful in meeting their goals for mortgages, investments in low‐income housing tax credits, grant giving to community‐based organizations, and in opening (and keeping open) inner‐city bank branches. The future of CRA agreements is clouded by several factors, most notably the restructuring and consolidation of the financial service sector.  相似文献   
268.
269.
Abstract

Community development corporations and other nonprofit organizations are increasingly responsible for producing and managing low‐income housing in urban America. This article examines the network of governmental, philanthropic, educational, and other institutions that channel financial, technical, and political support to nonprofit housing sponsors. We analyze the relationships among these institutions and propose an explanation for their success. We then consider challenges the network must confront if the reinvention of federal housing policy is to succeed.

Block grants and rental vouchers, the dominant emphases of federal policy, present opportunities and constraints for nonprofit housing groups and their institutional networks. While states and municipalities are likely to continue to use block grants for nonprofit housing, the viability of this housing will be severely tested as project‐based operating subsidies are replaced by tenant‐based vouchers. We recommend ways that the federal, state, and local governments should help the institutional support network respond to this challenge.  相似文献   
270.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号