首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   275篇
  免费   18篇
各国政治   17篇
工人农民   41篇
世界政治   31篇
外交国际关系   12篇
法律   145篇
中国政治   3篇
政治理论   43篇
综合类   1篇
  2023年   3篇
  2020年   3篇
  2019年   7篇
  2018年   13篇
  2017年   11篇
  2016年   18篇
  2015年   7篇
  2014年   7篇
  2013年   44篇
  2012年   6篇
  2011年   10篇
  2010年   3篇
  2009年   14篇
  2008年   13篇
  2007年   15篇
  2006年   13篇
  2005年   6篇
  2004年   8篇
  2003年   5篇
  2002年   5篇
  2001年   9篇
  2000年   5篇
  1999年   6篇
  1998年   4篇
  1997年   4篇
  1996年   5篇
  1995年   3篇
  1994年   4篇
  1993年   3篇
  1992年   3篇
  1991年   4篇
  1990年   2篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1984年   3篇
  1983年   3篇
  1982年   2篇
  1981年   2篇
  1980年   1篇
  1979年   3篇
  1978年   3篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1973年   1篇
  1968年   1篇
排序方式: 共有293条查询结果,搜索用时 15 毫秒
31.
32.
Hurricane Mitch caused unprecedented destruction when it swept through Nicaragua and Honduras in October 1998. Official reports estimated that 3,332 were reported killed or missing and an estimated $1.5 billion damages were caused in Nicaragua alone. Though Mitch did not cause Nicaragua's impoverishment, the severity of its destruction revealed a deeper crisis that has been troubling Nicaragua's economy for over a decade—an economic crisis aggravated by heavy external debts and structural adjustment policies. Using feminist analysis, the case of Nicaragua is explored to consider the effects of natural disasters from a global perspective and to rethink the long-term merits of structural adjustment and foreign aid.  相似文献   
33.
With globalization and the rise of information and communications technology (ICT), the protection of intellectual protection in software and indeed foreign copyright has never been more paramount. The absence of statutory provisions in Nigeria’s main copyright legislation specifically protecting the intellectual protection in software has not helped. This article examines the Court of Appeal’s recent decision dealing with the protection of copyright in Microsoft’s software. The author is of the considered view that the approach adopted by the courts in the case is not in the overall interest of encouraging foreign ICT companies and the protection of foreign copyrights in Nigeria.  相似文献   
34.
35.
36.
37.
38.
39.
An examination of self-report scales of 160 men and 76 of their partners or former partners found significant correlations between jealousy and abusiveness (for coupled dyads) or intrusiveness (for separated dyads). Jealousy was related to borderline personality and to MCMI-II measures of Post Traumatic Stress Disorder. Rejection sensitivity leading to pathological acts, such as abusiveness and intrusiveness, is seen as originating in early insecure attachment and exposure to shaming experiences.  相似文献   
40.
Extending from the organizing crime perspective, we study how legitimate world actors contribute to structuring a criminal network. This focus also underscores the facilitating role that some participants have in criminal settings. Based on a case study of an illegal drug importation network that was monitored by law-enforcement investigators over a two-year period, we find that although most legitimate actors (or non-traffickers) had nominal roles and contributed minimally to the criminal network's structure, a minority of these actors were critical to the network in two ways: (1) they were active in bringing other participants (including traffickers) into the network; and (2) they were influential directors of relationships with both non-traffickers and traffickers. The presence of such influential participants from legitimate occupational settings illustrates how upperworld figures can facilitate criminal enterprise beyond the mere contributions of legitimate status and expertise.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号