首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   237篇
  免费   13篇
各国政治   17篇
工人农民   26篇
世界政治   20篇
外交国际关系   15篇
法律   134篇
中国政治   1篇
政治理论   37篇
  2022年   4篇
  2021年   5篇
  2020年   5篇
  2019年   8篇
  2018年   14篇
  2017年   15篇
  2016年   11篇
  2015年   9篇
  2014年   5篇
  2013年   39篇
  2012年   11篇
  2011年   10篇
  2010年   11篇
  2009年   8篇
  2008年   11篇
  2007年   7篇
  2006年   8篇
  2005年   9篇
  2004年   7篇
  2003年   8篇
  2002年   9篇
  2001年   2篇
  2000年   1篇
  1999年   5篇
  1998年   4篇
  1995年   1篇
  1994年   1篇
  1992年   2篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1984年   1篇
  1983年   2篇
  1982年   2篇
  1980年   3篇
  1979年   1篇
  1977年   1篇
  1976年   1篇
  1973年   1篇
  1970年   1篇
  1968年   1篇
  1966年   1篇
排序方式: 共有250条查询结果,搜索用时 281 毫秒
21.
22.
23.
Two factors potentially affect observers'attributions of responsibility to a rape survivor: how closely they identify with the survivor and how much they adhere to rape myths. To assess the impact of these factors, 157 female college students categorized by their sexual assault history and by their acceptance of rape myths, evaluated a sexual assault scenario. It was hypothesized that previously victimized participants would attribute less blame, and that those participants who self-identify as rape survivors would view the assault as rape more often than other participants. Neither hypothesis was supported. As expected, those who scored higher on the Rape Myths Acceptance Scale(RMAS) blamed the victim more and were less likely to believe rape had occurred. Only one subscale of the RMAS, Adversarial Sexual Beliefs, was consistently associated with participants'evaluation of the scenario, suggesting that this dimension may be especially important to understanding an observer's assessment of rape.  相似文献   
24.
25.
Over the last several decades, numerous civil wars have ended as a consequence of negotiated settlements. Following many of these settlements, rebel groups have made the transition to political party and competed in democratic elections. In this paper, I assess the legacy of civil war on the performance of rebel groups as political parties. I argue that the ability of rebels to capture and control territory and their use of violence against the civilian population are two key factors explaining the performance of rebels as political parties. I test these hypotheses against the case of the Farabundo Martí National Liberation Front (FMLN) in El Salvador using one-way ANOVA and multivariate regression analyses. In analyzing the FMLN’s performance in the 1994 “elections of the century,” I find that, as a political party, the FMLN benefited both from the state’s violently disproportionate response and its ability to hold territory during the war.  相似文献   
26.
This study examines situation versus personality effects on foreign policy decision making. It proposes that while both factors are important in explaining decision outcomes, the relative importance of each in a given circumstance is a function of the structural constraints imposed by the policy decision environment. Following Maoz (1990) and Maoz and Astorino (1992b), a decision-game theoretic framework is used to "reconstruct" policy decision problems in order to study individual and environment effects concurrently. The substantive focus is the ten decisions that comprised the major events of the 1970 Civil War in Jordan. The decision reconstructions are used to rate these decision tasks according to the presence and degree of structural constraint. Although it represents a preliminary test, the decision analysis indicates that in structurally constrained decision settings, policymakers tended to respond in accordance with environmental clues, while response variability and evidence of simplifying decision heuristics was greater in more fluid decision settings.  相似文献   
27.
Since their introduction in 1984 Challenge funds have been widely adopted by central government. They are now used by twelve government departments to distribute competitively more than £3,250 million of Exchequer funds. The introduction of Challenge funds appears to have been politically driven, usually focusing on the objectives of cost and efficiency rather than quality and equity. They represent a further manifestation of the introduction of competition and 'market style' structures. This paper examines the key features of 41 Challenge funds and their operational characteristics. Numerous benefits, such as cost savings and innovation, arising from the introduction of Challenge funds have been put forward. By reviewing other studies, which have investigated the impact of the introduction of competition in producer and consumer markets, and through comparison with previous schemes it is possible to examine the potential impact of Challenge funds. Administrative and monitoring mechanisms are found to be centralizing control, despite assertions to the contrary. There is a growing concern that the level of information collection required is too arduous and it is used to control and regulate schemes rather than as a method of investigating where operations could be improved. Leverage from Challenge funds has been no more successful than earlier non-competitive initiatives. Competitive bidding could stifle innovation and participatory democracy is not encouraged or facilitated by Challenge funds.  相似文献   
28.
Scholars have long argued that international organizations solve information problems through increased transparency. This article introduces a distinct problem that instead requires such institutions to keep information secret. We argue that states often seek to reveal intelligence about other states' violations of international rules and laws but are deterred by concerns about revealing the sources and methods used to collect it. Properly equipped international organizations, however, can mitigate these dilemmas by analyzing and acting on sensitive information while protecting it from wide dissemination. Using new data on intelligence disclosures to the International Atomic Energy Agency and an analysis of the full universe of nuclear proliferation cases, we demonstrate that strengthening the agency's intelligence protection capabilities led to greater intelligence sharing and fewer suspected nuclear facilities. However, our theory suggests that this solution gives informed states a subtle form of influence and is in tension with the normative goal of international transparency.  相似文献   
29.

Perpetrator and victim gender influence how blame is assigned in intimate partner violence (IPV) scenarios. Although men’s differential capacity to inflict and sustain harm is posited as the reason male perpetrators and victims receive more blame for IPV, it is possible that other aspects of the construct of gender, such as gender role beliefs, underscore these effects. Using a sample of 323 college students and a factorial vignette design that varied body sizes and genders of victims and perpetrators, we examined the extent to which perceptions of physical injury accounted for the effects of perpetrator and victim gender on blame attributions, and whether adherence to traditional gender roles moderated any influences of gender unassociated with perceived injury. For female perpetrators, participants estimated lower levels of perceived injury and greater victim blame, with the former effect predominantly accounting for the latter. Male victims were viewed as less injured and more blameworthy, but the latter finding was not predominantly driven by injury perceptions. Perceived physical injury also did not account for why females perpetrating against males were blamed least. Controlling for differences in perceived injury, those holding more traditional gender views blamed victims of female violence more than victims of male-perpetrated violence. Notably, variations in body physical size were not associated with injury perceptions or blame attributions. These findings overall suggest that gender does influence blame attributions by way of perceived physical injury, but other aspects of the construct of gender are also relevant to these evaluations.

  相似文献   
30.
In Sutherland v Her Majesty's Advocate, the Supreme Court unanimously dismissed an appeal which argued that the use of communications obtained by a paedophile hunter group as evidence in criminal prosecution was a violation of Article 8 of the European Convention on Human Rights. The case raises fundamental questions of the scope of the right to private life as regards to the content of communications and the role played by private actors in the criminal justice process. This note argues that by limiting the protection of Article 8 to private communications which satisfy a contents-based test, the Court has bypassed the Article 8(2) balancing test to the detriment of the due process rights of the accused. The note concludes that the decision opens up the prospect of the state circumventing the accused's Article 8 privacy rights by lending tacit approval to the proactive investigations of these private ‘paedophile hunter’ groups.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号