首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   429篇
  免费   9篇
各国政治   26篇
工人农民   53篇
世界政治   40篇
外交国际关系   14篇
法律   198篇
中国政治   5篇
政治理论   100篇
综合类   2篇
  2023年   3篇
  2021年   2篇
  2020年   6篇
  2019年   8篇
  2018年   15篇
  2017年   12篇
  2016年   17篇
  2015年   11篇
  2014年   11篇
  2013年   86篇
  2012年   13篇
  2011年   14篇
  2010年   11篇
  2009年   9篇
  2008年   20篇
  2007年   9篇
  2006年   19篇
  2005年   15篇
  2004年   10篇
  2003年   7篇
  2002年   7篇
  2001年   13篇
  2000年   4篇
  1999年   9篇
  1998年   6篇
  1997年   6篇
  1996年   3篇
  1995年   8篇
  1994年   9篇
  1993年   6篇
  1992年   3篇
  1991年   4篇
  1990年   7篇
  1989年   2篇
  1988年   5篇
  1987年   5篇
  1985年   4篇
  1984年   3篇
  1983年   7篇
  1982年   4篇
  1981年   3篇
  1980年   3篇
  1977年   4篇
  1976年   2篇
  1974年   1篇
  1973年   2篇
  1972年   1篇
  1971年   1篇
  1969年   2篇
  1967年   3篇
排序方式: 共有438条查询结果,搜索用时 15 毫秒
121.
122.
I know that, as proof of the inferiority of the [female] sex, Rousseau has exultingly exclaimed, "How can they leave the nursery for the camp!" -Mary Wollstonecraft, Vindication of the Rights of Woman INTRODUCTION: CONTAGIOUS READING AND CRITICAL ENNUI  相似文献   
123.
Technologically mediated contexts are social arenas in which adolescents can be both perpetrators and victims of aggression. Yet, there remains little understanding of the developmental etiology of cyber aggression, itself, as experienced by either perpetrators or victims. The current study examines 3-year latent within-person trajectories of known correlates of cyber-aggression: problem behavior, (low) self-esteem, and depressed mood, in a large and diverse sample of youth (N = 1,364; 54.6 % female; 12–14 years old at T1). Findings demonstrate that developmental increases in problem behavior across grades 8–10 predict both cyber-perpetration and victimization in grade 11. Developmental decreases in self-esteem also predicted both grade 11 perpetration and victimization. Finally, early depressed mood predicted both perpetration and victimization later on, regardless of developmental change in depressed mood in the interim. Our results reveal a clear link between risky developmental trajectories across the early high school years and later cyber-aggression and imply that mitigating trajectories of risk early on may lead to decreases in cyber-aggression at a later date.  相似文献   
124.
Whereas most studies find the poor in Africa to be more vulnerable to bribery because of their lower socio-economic status, this paper proposes institutional differences as an alternative explanation. Because poor people are unable to afford privately provided services, they must use public services. In relying on the state more often, the poor become more vulnerable to bribery. Analyses of Afrobarometer data show that the poor are not more likely to pay bribes for state monopolised services. The poor’s disproportionate vulnerability to bribery for choice services is a function of their greater likelihood to have contact with the state.  相似文献   
125.
126.
This paper discusses trends in criminal justice and penal policy over the past twenty‐five years. This period has been characterised as a time of penal populism, which originated in the failure of the 1991 Criminal Justice Act, and the competition between the main political parties to be ‘tough on crime’. However, this is not the only trend to be found in penal policy. There has continued to be a strong undertow of support for rehabilitation and community penalties, including restorative justice. There has been pressure from the left as much as the right to take domestic violence, sexual offences against women and children, and hate crimes more seriously. There have been pressures to meet performance targets—which gradually transformed into calls to build the legitimacy of the justice system. Finally, there have been pressures to privatise criminal justice agencies. These various impulses have sometimes amplified and sometimes counteracted the pressures towards tough penal policy. If the period of intense penal populism ran from 1993 to 2007, inertia in the system has ensured that there have been no significant attempts to row back from tough policies, and to reassert the values of penal parsimony. Given that money has been tight since 2007 and crime has continued to fall, this must amount to a lost opportunity of significant proportions.  相似文献   
127.
128.
Confusion among companies over what is adequate in environmental disclosure, in general, sets an unfortunate stage for contemplating the newer matter of climate change-related disclosure. Companies waiting for new legislative and regulatory outcomes before contending with climate change disclosure, however, are in exposed and inadvisable delay on the matter. Existing regulations and standards pertain and instruct, if indirectly, on what is to be disclosed and accrued, and when. Their requirements, the possibility of enforcement actions, and recent evidence of costly consequences to former executives from improper environmental financial disclosure reinforce corporate management's need for disclosure diligence, including on climate change. The future is here.  相似文献   
129.
130.
This article critiques ethical arguments against conducting forensic evaluations of capital defendants or condemned prisoners and against treating prisoners found incompetent for execution, and considers the impact of widespread professional abstention on the legal system. It concludes that arguments for abstention by forensic evaluators are grounded mainly in personal moral scruples against capital punishment, rather than in tenets of professional ethics, but that abstention would be ethically required if the evaluator's scruples preclude objectivity. It also concludes that treatment of incompetent prisoners known to want treatment is ethically permissible but that treatment for the sole purpose of readying the prisoner for execution is not.Editor's note: Adversary Forum is edited by Gary B. Melton. Stan Brodsky was asked to respond to Professor Bonnie's article, and Professor Bonnie was given an opportunity to reply.This article is based on a paper presented as the Keynote Address to the Annual Meeting of the  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号