全文获取类型
收费全文 | 833篇 |
免费 | 34篇 |
专业分类
各国政治 | 36篇 |
工人农民 | 27篇 |
世界政治 | 74篇 |
外交国际关系 | 46篇 |
法律 | 490篇 |
中国共产党 | 2篇 |
中国政治 | 11篇 |
政治理论 | 142篇 |
综合类 | 39篇 |
出版年
2023年 | 8篇 |
2022年 | 10篇 |
2021年 | 6篇 |
2020年 | 24篇 |
2019年 | 24篇 |
2018年 | 26篇 |
2017年 | 26篇 |
2016年 | 35篇 |
2015年 | 25篇 |
2014年 | 33篇 |
2013年 | 103篇 |
2012年 | 40篇 |
2011年 | 36篇 |
2010年 | 39篇 |
2009年 | 33篇 |
2008年 | 37篇 |
2007年 | 24篇 |
2006年 | 30篇 |
2005年 | 45篇 |
2004年 | 33篇 |
2003年 | 31篇 |
2002年 | 24篇 |
2001年 | 28篇 |
2000年 | 25篇 |
1999年 | 10篇 |
1998年 | 16篇 |
1997年 | 3篇 |
1996年 | 7篇 |
1995年 | 10篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 3篇 |
1990年 | 5篇 |
1989年 | 7篇 |
1988年 | 7篇 |
1987年 | 2篇 |
1986年 | 9篇 |
1983年 | 6篇 |
1982年 | 3篇 |
1978年 | 2篇 |
1977年 | 2篇 |
1976年 | 2篇 |
1975年 | 1篇 |
1974年 | 4篇 |
1973年 | 1篇 |
1972年 | 2篇 |
1969年 | 1篇 |
1967年 | 3篇 |
1963年 | 1篇 |
排序方式: 共有867条查询结果,搜索用时 0 毫秒
91.
The purpose of the study was to identify the insecure adult attachment style associated with childhood physical abuse. Five hundred fifty-two female and 294 male university students completed questionnaires on their child abuse history, adult attachment style, and other variables. Regression analyses were completed. A history of physical abuse was associated with attachment avoidance while controlling for other forms of childhood abuse. Some support was also found for an association between physical abuse and attachment anxiety. Social support, as a control variable, was found to be an important predictor of attachment avoidance and attachment anxiety. A history of childhood physical abuse has important and specific impacts on intimate adult relationships with social support acting as a possible protective factor. 相似文献
92.
Lucio Cassia Alfredo De Massis Michele Meoli Tommaso Minola 《The Journal of Technology Transfer》2014,39(3):376-392
This work investigates entrepreneurship research centers, and analyzes their research performance. Studies on the determinants of performance of research centers have mainly focused on science and technology, while entrepreneurship has been so far neglected. Through an analysis of 46 centers worldwide, we focus on entrepreneurship research and the role of centers, by discussing how knowledge transfer mechanisms and research orientation affect research performance. Our findings contribute to shed light on the divergence of methodologies and approaches characterizing entrepreneurship research; they also corroborate the view that centers enable a “compound Matthew-effect”, according to which knowledge transfer to external stakeholders, after controlling for research orientation of the center, does foster and enrich research performance. 相似文献
93.
This article addresses the long-standing continuities in the history of the Italian forensic psychiatric units and views them as the result of conflicting forces, interests, mentalities and strategies at the cross-road of forensic psychiatry, psychiatry, prison and health services. It focuses on the period from the 1960s to the present and deals with, among other issues, the long-term impact of the anti-asylum movements and the on-going debate on the ‘phasing out’ of the forensic psychiatric units. 相似文献
94.
The European Union (EU) has firmly set its stall out to protect individuals' data and privacy and has demonstrated this through the rejection of the old opt-out regime and the introduction of the new opt-in rules. These require businesses to obtain individual's prior and informed consent before their data are collected, stored and used for the purposes of online behavioural advertising (OBA). Individuals in the EU are afforded protection from the apparent dangers relating to data privacy and misuse that is associated with OBA, which is beyond the expectation of most Internet users. However, there are some criticisms levelled at the law that the EU has produced. Is simply gaining informed consent sufficient for protecting all types of information? Do certain types of information require a higher level of consent than others? Does the law fulfil its aim of protecting data subject's privacy and data? Is the current law restrictive to business? Do individuals know or care that their information is being collected for the purposes of targeted advertising and is there a better way to ensure that they do? Finally, will proposed new law to be found in the EU Data Protection Regulation solve any of these problems? This article will assess whether, as a policy decision, the EU's current approach has been too cautious in its attempts to protect individuals or restrict business. 相似文献
95.
Joost M. Leunissen David De Cremer Marius van Dijke Christopher P. Reinders Folmer 《Social Justice Research》2014,27(3):322-339
Apologizing is often seen as the appropriate response after a transgression for perpetrators. Yet, despite the positive effects that apologies elicit after situations of conflict, they are not always delivered easily. We argue that this is due—at least in part—to perpetrators overestimating the averseness of apologizing, thus committing a forecasting error. Across two laboratory experiments and one autobiographical recall study, we demonstrate that perpetrators overestimate the averseness they will experience when apologizing compared to the averseness they experience when they actually apologize. Moreover, we show that this effect is driven by a misconstrual of the effects of an apology. Perpetrators overestimate the potentially negative effects of apologizing while simultaneously underestimating the potentially positive effects of apologizing. This forecasting error may have a negative effect on the initiation of the reconciliation process, due to perpetrators believing that apologizing is more averse than it actually is. 相似文献
96.
Jorge Emilio Núñez 《International Journal for the Semiotics of Law》2014,27(4):645-664
State sovereignty is often thought to be absolute, unlimited. This paper argues that there is no such a thing as absolute State sovereignty. Indeed, absolute sovereignty is impossible because all sovereignty is necessarily underpinned by its conditions of possibility—i.e. limited sovereignty is the norm, though the nature of the limitations varies. The article consists of two main sections: (a) the concept of sovereignty: this section is focused on some of the limitations the concept of sovereignty itself presents; and (b) a historical account of the notion of sovereignty as it was used in the Ancient Times. The particular focus on early notions of a modern concept such as sovereignty has to do with the fact that this early notion has been anthropomorphised with societal evolution. Therein, the current concept of State sovereignty embraces the same limitations it had in its ancient form as a non-fully developed conceptual idea. The implications of understanding State sovereignty as limited rather than absolute are several, both directly and indirectly. A main immediate consequence is that sovereign States can cooperate together, limit their sovereignty and still be considered sovereign. 相似文献
97.
98.
Sarah De Los Santos Upton 《Development in Practice》2016,26(2):223-235
Traditional top-down approaches to community development reinforce nos/otros binaries within provider/recipient relationships; transcendent approaches, on the other hand, create space for nosotros collaborative development. This article describes an instance of the nos/otros binary, in which a foreign volunteer in a rural community in Ecuador assumed the role of practitioner and limited community members’ roles to recipients or beneficiaries of her development projects. Inspired by findings from this experience, the article presents a case study highlighting an alternative, transcendent, nosotros approach in Albuquerque, New Mexico, where community members work together to imagine, implement, and sustain projects. 相似文献
99.
The use of the Internet and new technologies now seems to permeate the entire society, affecting every aspect of daily life. Although this change is characterized by undeniable positive aspects, it simultaneously bears a number of risks which are higher especially with respect to the growing number of younger users. In fact, young people, as the most involved in cyber space, are an age group most exposed to the dangers of improper and not aware use of electronic tools. The specific aim of this research was to study unwanted online attentions (UOA) among a sample of Italian students (N?=?585, mean age?=?14.5), identifying UOA as all those behaviors carried out through the Internet and technology to annoy, disturb, offend, humiliate, intimidate, threat, harass, harm or attack others. The online questionnaire investigated the online habits of the students, the presence of UOA and the characteristics of victims and perpetrators, the perception and emotional impact of such conducts, and the victims' possible reactions. The findings offer an estimate of the prevalence of these behaviors in the population of this age group in the area considered. More importantly, the results reveal a very high involvement in technology by the students accompanied by a lack of awareness regarding the risks connected to technology use as well as a low perception of UOA. These results give evidence of the needs in terms of prevention and education instruments in order to improve the system of responses to cybervictimization among young people. 相似文献
100.