全文获取类型
收费全文 | 6142篇 |
免费 | 192篇 |
专业分类
各国政治 | 472篇 |
工人农民 | 163篇 |
世界政治 | 642篇 |
外交国际关系 | 382篇 |
法律 | 2564篇 |
中国政治 | 34篇 |
政治理论 | 2002篇 |
综合类 | 75篇 |
出版年
2023年 | 26篇 |
2020年 | 78篇 |
2019年 | 109篇 |
2018年 | 137篇 |
2017年 | 158篇 |
2016年 | 168篇 |
2015年 | 123篇 |
2014年 | 158篇 |
2013年 | 979篇 |
2012年 | 158篇 |
2011年 | 180篇 |
2010年 | 153篇 |
2009年 | 153篇 |
2008年 | 202篇 |
2007年 | 262篇 |
2006年 | 192篇 |
2005年 | 183篇 |
2004年 | 202篇 |
2003年 | 198篇 |
2002年 | 187篇 |
2001年 | 113篇 |
2000年 | 127篇 |
1999年 | 99篇 |
1998年 | 129篇 |
1997年 | 99篇 |
1996年 | 113篇 |
1995年 | 87篇 |
1994年 | 75篇 |
1993年 | 94篇 |
1992年 | 77篇 |
1991年 | 100篇 |
1990年 | 81篇 |
1989年 | 81篇 |
1988年 | 79篇 |
1987年 | 93篇 |
1986年 | 94篇 |
1985年 | 56篇 |
1984年 | 73篇 |
1983年 | 74篇 |
1982年 | 69篇 |
1981年 | 55篇 |
1980年 | 49篇 |
1979年 | 46篇 |
1978年 | 46篇 |
1977年 | 47篇 |
1976年 | 27篇 |
1975年 | 26篇 |
1974年 | 27篇 |
1973年 | 34篇 |
1972年 | 23篇 |
排序方式: 共有6334条查询结果,搜索用时 15 毫秒
931.
Statutes criminalizing behavior that risks transmission of HIV/AIDS exemplify use of the criminal law against individuals
who are victims of infectious disease. These statutes, despite their frequency, are misguided in terms of the goals of the
criminal law and the public health aim of reducing overall burdens of disease, for at least three important reasons. First,
they identify individual offenders for punishment, a paradigm that is misplaced in the most typical contexts of transmission
of infectious disease and even for HIV/AIDS, despite claims of AIDS exceptionalism. Second, although there are examples of
individuals who transmit infectious disease in a manner that fits the criminal law paradigm of identification of individual
offenders for deterrence or retribution, these examples are limited and can be accommodated by existing criminal laws not
devoted specifically to infectious disease. Third, and most importantly, the current criminal laws regarding HIV/AIDS, like
many other criminal laws applied to infectious disease transmission, have been misguided in focusing on punishment of the
diseased individual as a wrongful transmitter. Instead of individual offenders, activities that enhance the scale of disease
transmission—behaviors that might be characterized as ‘transmission facilitation’—are a more appropriate target for the criminal
law. Examples are trafficking in human beings (including sex trafficking, organ trafficking, and labor trafficking), suppression
of information about the emergence of infection in circumstances in which there is a legally established obligation to disclose,
and intentional or reckless activities to discourage disease treatment or prevention. Difficulties remain with justifications
for criminalizing even these behaviors, however, most importantly the need for trust in reducing overall burdens of disease,
problems in identifying individual responsible offenders, and potential misalignment between static criminal law and the changing
nature of infectious disease. 相似文献
932.
Using stochastic methods we illustrate that the Provisional Irish Republican Army's (PIRA) network is clustered along three primary dimensions: (a) brigade affiliation, (b) whether the member participated in violent activities, and (c) task/role within PIRA. While most brigades tended to foster connections within the brigade (that is, “closure”), the tendency to do so varied across the organization. Members who engaged with violent activities were far more likely to connect with each other; in later periods there is polarization into those who engage in violent activities and those who do not. Across brigades, those who engage in a particular task and role (improvised explosive device [IED] constructor, IED planter, gunman, robber/kidnapper/drug smuggler/hijacker) are more likely to connect with others who do the same task or play the same role than with other members who fulfill other roles. Standard forms of homophily (that is, the tendency to make connections with people who are similar in terms of demography or status) play a very weak role in explaining which members interact with one another. Finally, our analysis illustrates clear patterns of relational change that correspond to changes in the formal structures that PIRA's leadership promoted. 相似文献
933.
John Coakley 《The Journal of Legislative Studies》2014,20(4):542-572
The turn of the twenty-first century witnessed a surprising reversal of the long-observed trend towards the disappearance of second chambers in unitary states, with 28 countries – all but one of them unitary – adopting the bicameral system. This article explores this development by first setting it in the context of the historical evolution of second chambers and the arguments that support bicameralism, and then exploring the characteristics that distinguish today's second chambers from first chambers. A ‘census’ of second chambers in 2014 is used to provide data on second chambers in federal and unitary states, to facilitate comparison with earlier data, and to distinguish between ‘new’ and longer-established second chambers. The article concludes that newly established second chambers are concentrated predominantly in political systems where liberal democratic principles are not established, suggesting that the debate over their role in democratic states is set to continue. 相似文献
934.
McFall’s (1982, 1989) Social Information Processing (SIP) model outlines different stages in cognitive processing and decision-making that may be deficient in men who engage in interpersonal violence (IPV). A decision-making task was developed to assess the utility of abusive and nonabusive behaviors among 32 men who engage in mild IPV, 32 maritally distressed men, and 32 nondistressed men. Because anger impacts appraisal and decision-making (e.g., Lerner and Tiedens in Journal of Behavioral Decision Making, 19, 115-137, 2006), all participants were randomly assigned to an anger induction or neutral induction condition. As hypothesized, the perceived utility for abusive behavior was greater for angry abusive men and the perceived utility of control appeared to significantly contribute to this difference. Specific deficits in the IPV group were found, supporting a SIP model of IPV, aiding in understanding the function of violent behavior. Despite study limitations, these findings have implications for enhancing specific skill training components of treatment for abusive men. 相似文献
935.
Paul Gill Ph.D. John Horgan Ph.D. Paige Deckert M.S. A.B.D. 《Journal of forensic sciences》2014,59(2):425-435
This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone‐actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone‐actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone‐actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone‐actor terrorists were socially isolated. Lone‐actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone‐actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. 相似文献
936.
937.
Louis B. Schlesinger Ashley Gardenier John Jarvis Jamie Sheehan-Cook 《Journal of Police and Criminal Psychology》2014,29(1):44-51
A nonrandom national U.S. sample of 946 homicide crime scenes--supplied by the FBI Behavioral Science Unit for purposes of research--was studied to delineate the prevalence, types, levels, and motives for staging in domestic, nonserial sexual, serial sexual, and general felony homicides. Stagers were found to be a relatively small group who employ a variety of methods to alter the crime scene in an attempt to redirect the investigation away from themselves as logical suspects. Results also suggest that different types of homicides have different staging rates based primarily on the relationship (or connection) between offender and victim. Implications for investigations and understanding this type of crime scene behavior are discussed. 相似文献
938.
Objectives
To present and test an opportunity perspective on prison inmate victimization.Methods
Stratified random samples of inmates (n 1 = 5,640) were selected from Ohio and Kentucky prisons (n 2 = 46). Bi-level models of the prevalence of assaults and thefts were estimated. Predictors included indicators of inmate routines/guardianship, target antagonism, and target vulnerability at the individual level, and several indicators of guardianship at the facility level.Results
Assaults were more common among inmates with certain routines and characteristics that might have increased their odds of being victimized (e.g., less time spent in recreation; committed violence themselves during incarceration), and higher levels of assaults characterized environments with lower levels of guardianship (e.g., architectural designs with more “blind spots”, larger populations, and less rigorous rule enforcement as perceived by correctional officers). Similar findings emerged for thefts in addition to stronger individual level effects in prisons with weaker guardianship (e.g., ethnic group differences in the risk of theft were greater in facilities with larger populations and less rigorous rule enforcement).Conclusions
The study produced evidence favoring a bi-level opportunity perspective of inmate victimization, with some unique differences in the relevance of particular concepts between prison and non-prison contexts. 相似文献939.
940.
The authors present a cogent and detailed case for altering the Medical Devices Directive to allow regulation of cognitive enhancement devices (CEDs). Protection against significant risk of harm, especially for the vulnerable, and promotion of benefit through informed use of CEDs are all good features of the proposal. However, the pre-market approval process has limitations, which we explore. We raise the possibility of ‘risk compensation’ in response to the introduction of safety measures, which could alter its effectiveness. The proposal alludes to use of ‘formally trained practitioners,’ which provide a further tier of regulation for CEDs within the proposal. We consider some positive and negative implications of this aspect of the proposal that might warrant further consideration. 相似文献