首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9013篇
  免费   79篇
各国政治   265篇
工人农民   1096篇
世界政治   237篇
外交国际关系   329篇
法律   5072篇
中国政治   4篇
政治理论   2077篇
综合类   12篇
  2021年   5篇
  2020年   16篇
  2019年   13篇
  2018年   1298篇
  2017年   1226篇
  2016年   1045篇
  2015年   79篇
  2014年   33篇
  2013年   149篇
  2012年   218篇
  2011年   939篇
  2010年   1034篇
  2009年   599篇
  2008年   758篇
  2007年   723篇
  2006年   25篇
  2005年   78篇
  2004年   186篇
  2003年   161篇
  2002年   55篇
  2001年   17篇
  2000年   11篇
  1999年   7篇
  1998年   19篇
  1997年   26篇
  1996年   31篇
  1995年   47篇
  1994年   38篇
  1993年   17篇
  1992年   11篇
  1991年   12篇
  1990年   6篇
  1989年   12篇
  1988年   15篇
  1987年   12篇
  1986年   15篇
  1985年   13篇
  1984年   15篇
  1983年   16篇
  1982年   12篇
  1981年   8篇
  1980年   8篇
  1979年   14篇
  1978年   16篇
  1977年   13篇
  1976年   6篇
  1975年   5篇
  1973年   6篇
  1972年   5篇
  1969年   4篇
排序方式: 共有9092条查询结果,搜索用时 15 毫秒
991.
The introduction of competitive funding mechanisms in higher education is found to generally increase research productivity. However, the diversity within higher education systems may lead universities to behave in substantially different ways in response to the adoption of competitive funding criteria. In particular, we argue that the legitimacy of universities, defined as their level of recognition based on the adherence to socially accepted norms and expectations, is crucial in shaping their reaction. This paper investigates the change in research productivity experienced by Italian universities following the introduction of the first Performance-based Research Funding System (PRFS) in 2003, focusing on the moderating effect of university legitimacy. Using a sample of 75 universities observed during the period 1999–2011, we find that the introduction of PRFS leads to an increase in research productivity, and this increase is significantly more pronounced among more legitimate universities.  相似文献   
992.
The present research adopts a multiple informant approach to identify victims and perpetrators of cyberbullying. Similar approaches have been successfully applied in the field of traditional bullying, and they are highly relevant for studying cyberbullying as well. Three informants can provide key perspectives on cyberbullying incidents: victims, perpetrators, and bystanders. To collect data on these actors, all eighth-grade students in 11 secondary schools were invited to participate in a survey. In total 1458 respondents completed peer-nomination questions on cyberbullying involvement. The results indicated that the prevalence of cyberbullying varied depending on the type of informants that was consulted. In addition, limited overlap was observed between the reports of different informants, resulting in different profiles of victims and perpetrators, depending on the informants that identified them. In sum, different informants tended to have divergent views on cyberbullying, which has important implications. It warrants accurate reporting and critical reflection on the sources of data in cyberbullying research. Moreover, it demonstrates the need to study a more diverse set of informants to advance the understanding of cyberbullying and to enhance prevention efforts.  相似文献   
993.
Cyberbullying, the harassment of others via new technologies, is a growing phenomenon with important consequences for its victims. Despite the growing interest in this new form of violence, only a few longitudinal studies have analyzed the relationship between cyberbullying victimization and psychological problems, such as depression, in adolescents. Furthermore, the mechanisms through which cyberbullying victimization contributes to the development of depressive symptoms remain almost unexplored. The current study assesses whether cyberbullying victimization predicts the increase in depressive symptoms over time and the role of body image and cognitive schemas in the association between cyberbullying victimization and depression. We hypothesized that victims of cyberbullying would develop a negative body image, the belief that others would hurt them and that they were defective to some degree, and that, as a consequence of these cognitions, they would increase their symptoms of depression. A sample of 1015 adolescents (mean age?=?15.43, SD?=?1.09) completed measures of depressive symptoms at three waves (T1, T2, and T3) spaced 6 months apart, measures of body image and cognitive schemas at T1 and T2, and measures of CB victimization at T1. Findings indicated that CB victimization at T1 predicted a worsening of body image and cognitive schemas of mistrust and defectiveness at T2, and those changes in cognitions predicted in turn an increase in depressive symptoms from T2 to T3. Gender differences were also examined. The model was very similar for boys and girls. However, changes in body image acted as a mediator between CB victimization and depression only in girls. Therefore, this study contributes to clarifying the cognitive mechanisms involved in the development of depression among victims of CB. These findings suggest that intervention programs with victims of CB should address the cognitions that are relevant for the development of depression.  相似文献   
994.
The use of the Internet and new technologies now seems to permeate the entire society, affecting every aspect of daily life. Although this change is characterized by undeniable positive aspects, it simultaneously bears a number of risks which are higher especially with respect to the growing number of younger users. In fact, young people, as the most involved in cyber space, are an age group most exposed to the dangers of improper and not aware use of electronic tools. The specific aim of this research was to study unwanted online attentions (UOA) among a sample of Italian students (N?=?585, mean age?=?14.5), identifying UOA as all those behaviors carried out through the Internet and technology to annoy, disturb, offend, humiliate, intimidate, threat, harass, harm or attack others. The online questionnaire investigated the online habits of the students, the presence of UOA and the characteristics of victims and perpetrators, the perception and emotional impact of such conducts, and the victims' possible reactions. The findings offer an estimate of the prevalence of these behaviors in the population of this age group in the area considered. More importantly, the results reveal a very high involvement in technology by the students accompanied by a lack of awareness regarding the risks connected to technology use as well as a low perception of UOA. These results give evidence of the needs in terms of prevention and education instruments in order to improve the system of responses to cybervictimization among young people.  相似文献   
995.
996.
The difference in official crime statistics between women and men is a constant fact in criminology, but has yet to be explained in a satisfactory way. There are few studies addressing the issue of why this gender gap is larger in registered crime than it is in self-report studies. The study at hand comprises a survey among Greek and German students to examine whether this gap could be attributed to a gender-specific reporting of crime. Participants’ self-reported experiences of victimisation and their rating of the seriousness of offences depicted in case vignettes were used to gain insight into varying tendencies to report a crime depending on the offender’s gender. The act of reporting a crime did not vary gender-specifically.  相似文献   
997.
Government favouritism in the allocation of public funds raises costs for any society in which corruption prevails. Particularistic transactions can be identified in three different situations: uncompetitive awards of public contracts when there is only one “competitive” tender, when public money is spent on contracts supplied by politically connected firms, and a situation of capture in which one private contractor obtains a disproportionate share of contracts issued by some public agency. This present research has tested for the relevance of those three types of particularistic transactions that signal government favouritism as they apply to the Romanian construction sector for the period from 2007-2013, and to do so has made use of original public procurement databases. Furthermore, it will be proposed here that the “kickback”—a percentage of particularistic awarded values—can be used as a measurement of corruption. Even conservatively estimated, kickbacks account for much of the cost borne by any society that fails to eradicate corruption. For our purposes here, amounts of kickbacks at county level have been controlled against criminal convictions for corruption at county level. As a result, data analysis provides strong evidence that kickbacks based on particularistic allocation of public funds are indeed relevant in the measurement of corruption, and the steps used to evaluate kickbacks can be used just as well for other countries.  相似文献   
998.
Disclosure of income, assets and conflicts of interest can serve as powerful public accountability tools to draw attention to the abuse of public office, help prosecute corrupt offenders and create a culture of scrutiny in the public sector that deters corruption. Based on data of the World Bank’s Public Accountability Mechanisms initiative, we present the first indicator that captures a country’s financial disclosure in-law effort. By employing different panel data model specifications, we use this indicator to measure how the introduction of comprehensive financial disclosure systems impacted national corruption levels for 91 countries between 1996 and 2012. We present robust results that provide tentative evidence for a positive and significant relationship between a country’s capacity to control for corruption and the expansion of financial disclosure legislation for the years following the enactment.  相似文献   
999.
Social network theory suggests that firms bridging structural holes by connecting disconnected partners in a network benefit from timely access to diverse knowledge. However, the existing literature reports mixed evidence with regard to the performance implications of this view. Our study examines how a firm’s diverse knowledge base and knowledge-processing capabilities affect knowledge creation when a firm bridges multiple structural holes in an inter-firm network. The model is tested on a sample of 191 firms in high-technology industries. The dependent variable, knowledge creation, was measured by the number of patents generated. Results show that when a firm spans multiple structural holes, its diverse technological knowledge facilitates knowledge creation. However, when a firm already possesses well-developed knowledge acquisition capabilities, spanning structural holes reduces knowledge creation. This paper suggests that internal knowledge base and knowledge-processing capabilities determine the impacts of external network positions on firm knowledge creation. It provides implications on how a firm best capitalizes on external network positions.  相似文献   
1000.
We study how the scientific reputations and technology transfer policies of universities affect patenting by university researchers, with particular regard to whether they assign patent ownership to their university or to an outside firm. Using data on the career output of over 33,000 researchers in nanosciences, we find a strongly positive relationship of university reputation in nanosciences with the number of university-assigned patents, but almost a negligible association with firm-assignment of patents. University technology transfer office resources are related positively to both types of patents, but with diminishing returns. In contrast, the share of license revenue offered upfront to researchers is positively associated with university-assigned patents, but negatively related to firm-assigned patents. Taken together, our results suggest that universities that streamline their technology transfer efforts and improve their research reputation through support for basic research will see long-term success in technology commercialization.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号