首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9094篇
  免费   278篇
各国政治   611篇
工人农民   360篇
世界政治   705篇
外交国际关系   373篇
法律   5255篇
中国共产党   2篇
中国政治   139篇
政治理论   1839篇
综合类   88篇
  2020年   119篇
  2019年   140篇
  2018年   197篇
  2017年   218篇
  2016年   223篇
  2015年   194篇
  2014年   202篇
  2013年   1101篇
  2012年   237篇
  2011年   319篇
  2010年   225篇
  2009年   245篇
  2008年   252篇
  2007年   234篇
  2006年   227篇
  2005年   197篇
  2004年   221篇
  2003年   239篇
  2002年   166篇
  2001年   355篇
  2000年   329篇
  1999年   291篇
  1998年   145篇
  1997年   102篇
  1996年   111篇
  1995年   99篇
  1994年   106篇
  1993年   102篇
  1992年   159篇
  1991年   156篇
  1990年   146篇
  1989年   138篇
  1988年   158篇
  1987年   156篇
  1986年   160篇
  1985年   146篇
  1984年   145篇
  1983年   154篇
  1982年   92篇
  1981年   67篇
  1980年   80篇
  1979年   98篇
  1978年   78篇
  1977年   66篇
  1976年   68篇
  1975年   58篇
  1974年   49篇
  1972年   53篇
  1971年   54篇
  1969年   54篇
排序方式: 共有9372条查询结果,搜索用时 15 毫秒
921.
922.
The anti-corruption norm in both scholarship and the policy world has too narrowly focused on the domestic and institutional context of bribe-taking and public corruption. Instead, we argue that corruption in the contemporary global economy requires a multiple set of connected transactions, processes, and relationships that take place within informal transnational networks that blur the line between illegal and legal activities. These networks include multinational companies, elites in host countries, offshore financial vehicles and conduits, middlemen and brokers, and destination financial institutions. We examine how these actors operate in Central Asia, a region that is widely identified as corrupt, yet is rarely understood as embedded in the types of global processes, offshore connections and transnational links specified in our analysis. Examples of offshore centers in tax planning from Central Asia, and partial results from a field experiment based on impersonating high corruption risks from four Central Asian states, provide evidence for how the various actors in transnational financial networks structure their dealings. We then present two brief illustrative cases of how these transnational networks have operated in energy explorations services in Kazakhstan and telecommunications contracts in Uzbekistan. Our findings have theoretical, practical, and normative implications for scholars and practitioners of Central Asian international political economy and other ‘high risk' regions.  相似文献   
923.
924.
Although terrorism is widely understood to be the politically motivated creation of fear by means of violence in a target group, the nature of that fear is seldom explained or even considered. The present article attempts to close that gap by proposing a definition of terror as the apprehension of (more) violence to come. Because every terrorist act is perceived to be part of a potential series, terror is oriented towards the future and involves the imaginary anticipation of prospective events. On the basis of this definition, I will examine the problematical role of counterterrorist discourse. As the statements of public officials and security experts in the run-up to, and during, the “War on Terror” demonstrate, the peculiar dynamic of terror is, seemingly paradoxically, reinforced by counterterrorist rhetoric. With its insistence on the escalatory nature of terrorist violence and its repeated prediction of even worse attacks, counterterrorism contributes to the evocation of terror in the sense proposed here.  相似文献   
925.
Drawing on attribution theory, research on police discretion, and public attitudes toward mental illness, we examine attributional processes in police decision making in response to domestic violence situations involving veterans and nonveterans with signs of mental illness. Using data from experimental vignettes varying veteran status, victim injury, and suspect compliance administered to a sample of 309 police officers, the results indicate that 1) veterans are perceived as less responsible for troublesome behavior but more dangerous than nonveterans, 2) suspects’ veteran status has a significant effect on officers’ preference for mental health treatment versus arrest, and 3) part of the effect of veteran status on officer response is mediated by internal and external attributions for problematic behavior and by perceptions of dangerousness. The study empirically demonstrates countervailing processes in police decision making—recognition of the causes for troublesome behavior and the need for mental health treatment on the one hand and concern for community safety and enforcing the law on the other.  相似文献   
926.
Prior research on patterns of intimate partner violence (IPV) has documented changes over time, but few studies have focused directly on IPV desistance processes. This analysis identifies unique features of IPV, providing a rationale for the focus on this form of behavior cessation. We develop a life‐course perspective on social learning as a conceptual framework and draw on qualitative interviews (n = 89) elicited from a sample of young adults who participated in a larger longitudinal study (Toledo Adolescent Relationships Study). The respondents’ backgrounds reflected a range of persistence and desistance from IPV perpetration. Our analyses revealed that relationship‐based motivations and changes were central features of the narratives of successful desisters, whether articulated as a stand‐alone theme or in tandem with other potential “hooks” for change. The analysis provides a counterpoint to individualistic views of desistance processes, highlighting ways in which social experiences foster attitude shifts and associated behavioral changes that respondents tied to this type of behavior change. The analyses of persisters and those for whom change seemed to be a work in progress provide points of contrast and highlight barriers that limit a respondent's desistance potential. We describe implications for theories of desistance as well as for IPV prevention and intervention efforts.  相似文献   
927.
Both the columnar‐thin‐film (CTF) and the vacuum‐metal‐deposition (VMD) techniques for visualizing sebaceous fingermarks require the deposition of a material thereon in a vacuum chamber. Despite that similarity, there are many differences between the two techniques. The film deposited with the CTF technique has a columnar morphology, but the film deposited with the VMD technique comprises discrete islands. A split‐print methodology on a variety of fingermarked substrates was used to determine that the CTF technique is superior for developing fingermarks on clear sandwich bags and partial bloody fingermarks on stainless steel. Both techniques are similar in their ability to develop fingermarks on glass but the CTF technique yields higher contrast. The VMD technique is superior for developing fingermarks on white grocery bags and the smooth side of Gloss Finish Scotch Multitask? tape. Neither technique worked well for fingermarks on black garbage bags.  相似文献   
928.
929.
930.
There have been periodic electronic news media reports of potential bioterrorism-related incidents involving unknown substances (often referred to as “white powder”) since the 2001 intentional dissemination of Bacillus anthracis through the U.S. Postal System. This study reviewed the number of unknown “white powder” incidents reported online by the electronic news media and compared them with unknown “white powder” incidents reported to the U.S. Centers for Disease Control and Prevention (CDC) and the U.S. Federal Bureau of Investigation (FBI) during a 2-year period from June 1, 2009 and May 31, 2011. Results identified 297 electronic news media reports, 538 CDC reports, and 384 FBI reports of unknown “white powder.” This study showed different unknown “white powder” incidents captured by each of the three sources. However, the authors could not determine the public health implications of this discordance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号