首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1046篇
  免费   60篇
各国政治   62篇
工人农民   48篇
世界政治   65篇
外交国际关系   75篇
法律   453篇
中国政治   13篇
政治理论   377篇
综合类   13篇
  2023年   10篇
  2022年   5篇
  2021年   10篇
  2020年   29篇
  2019年   29篇
  2018年   35篇
  2017年   39篇
  2016年   53篇
  2015年   30篇
  2014年   41篇
  2013年   148篇
  2012年   38篇
  2011年   37篇
  2010年   29篇
  2009年   32篇
  2008年   25篇
  2007年   29篇
  2006年   44篇
  2005年   44篇
  2004年   31篇
  2003年   42篇
  2002年   38篇
  2001年   23篇
  2000年   21篇
  1999年   20篇
  1998年   19篇
  1997年   22篇
  1996年   5篇
  1995年   13篇
  1994年   9篇
  1993年   14篇
  1992年   8篇
  1991年   8篇
  1990年   10篇
  1989年   8篇
  1988年   8篇
  1987年   5篇
  1986年   8篇
  1985年   11篇
  1983年   6篇
  1982年   6篇
  1981年   7篇
  1980年   9篇
  1979年   6篇
  1978年   8篇
  1977年   6篇
  1975年   4篇
  1974年   4篇
  1973年   5篇
  1972年   4篇
排序方式: 共有1106条查询结果,搜索用时 296 毫秒
21.
The 1998 federal election emphasizes the fact that in Australian politics the power of the major parties remains strong both in terms of voter identification and in terms of setting the policy agenda on which political contests are fought, say Professors John Wanna and Patrick Weller from the Department of Public Policy at Griffith University, Brisbane, Australia. The results of the election nevertheless illustrate a substantial level of discontent in the community, and the term of the next government promises frequent stalemates, as the clash between the House of Representatives and the Senate makes the passing of controversial legislation difficult.  相似文献   
22.
23.
24.
25.
The Edward Snowden leaks challenge policy makers and the public's understanding and perspectives on the role of security intelligence in liberal democratic states. This article explores the challenges confronting security intelligence collection by the ‘Five Eyes’ countries – particularly those most affected by the leaks. We argue that the debate now needs to move beyond simplistic notions of privacy vs. security to a more detailed understanding of the policy and ethical dilemmas confronting policy makers and intelligence agencies. To that end, we provide a schematic framework (methods, context and target) to promote a better understanding of the practical, policy and ethical problems for security intelligence collection emerging post Snowden. The framework is a first step in identifying common principles that could be used develop an ethically informed set of policy guidelines to help decision makers better navigate between citizen's two basic rights: security and privacy.  相似文献   
26.
27.
This article explores the case of Anderson v Gorrie (1894) in which the Court of Appeal completed the immunity of judges from suit for actions whilst ostensibly sitting judicially and within their jurisdiction. They subsequently rejected an argument for an extension of the ambit of the decision in Dimes v Grand Junction Canal Company to judges sitting in a case in which they had an interest. The strength of the fortifications the judiciary had built around itself, erected on the bones of Anderson and others, must have been influenced by the concerns the judges felt – concerns with the influx of litigants in person, who sometimes pursued their cases all the way to the Lords, benefiting from the in forma pauperis procedure.  相似文献   
28.
29.
30.
Patrick Seale 《亚洲事务》2013,44(2):188-195
An account of two separate expeditions to climb mountains in Tibet, which, while not among the highest in the world, offer a technical challenge equal to the Matterhorn – indeed they are roughly the same height (about 6,500 metres). The first expedition was to Kajaqiao, which the author, Mick Fowler successfully climbed with Chris Watts, the second, a couple of years later, was to Manamcho, which was climbed with Paul Ramsden. The article contains a wealth of detail about the technicalities of this sort of climbing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号