首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9756篇
  免费   294篇
各国政治   663篇
工人农民   393篇
世界政治   763篇
外交国际关系   408篇
法律   5565篇
中国共产党   2篇
中国政治   145篇
政治理论   2014篇
综合类   97篇
  2020年   123篇
  2019年   145篇
  2018年   210篇
  2017年   235篇
  2016年   234篇
  2015年   207篇
  2014年   208篇
  2013年   1204篇
  2012年   254篇
  2011年   338篇
  2010年   239篇
  2009年   264篇
  2008年   267篇
  2007年   243篇
  2006年   247篇
  2005年   213篇
  2004年   236篇
  2003年   258篇
  2002年   184篇
  2001年   366篇
  2000年   337篇
  1999年   301篇
  1998年   154篇
  1997年   119篇
  1996年   119篇
  1995年   115篇
  1994年   118篇
  1993年   116篇
  1992年   171篇
  1991年   174篇
  1990年   150篇
  1989年   150篇
  1988年   169篇
  1987年   166篇
  1986年   177篇
  1985年   158篇
  1984年   163篇
  1983年   160篇
  1982年   102篇
  1981年   81篇
  1980年   95篇
  1979年   105篇
  1978年   84篇
  1977年   70篇
  1976年   78篇
  1975年   66篇
  1974年   55篇
  1973年   57篇
  1971年   56篇
  1969年   54篇
排序方式: 共有10000条查询结果,搜索用时 0 毫秒
951.
This paper is a case study of Eastern European immigrant women's social inclusion in Portugal through civic participation. An analysis of interviews conducted with women leaders and members of two ethnic associations provides a unique insight into their migrant pathways as highly educated women and the ways in which these women are constructing their citizenship in new contexts in Northern Portugal. These women's accounts of their immigrant experience embrace both the public realm, in using their own education and their children's as a means of integration but also spill over into ‘non-public’ familial relationships at home in contradictory ways. These include the sometimes traditional, gender-defined division of labour within the associations and at home and the new ways that they negotiate their relative autonomies to escape forms of violence and subordination that they face as women and immigrants.  相似文献   
952.
Purpose: in the literature, the term ‘Internet crime’ has been coined to indicate the scenario in which a victim of homicide or other crimes is met through a chat room, and lured to death at the hands of the murderer. Various criticisms have been made of this new concept, on the grounds that the outcome is no different from that of other crimes committed without the use of Web resources, and so the method used has no particular influence. Indeed, it has been claimed that informatic crime just reflects a technological change in the nature of crime rather than a new form of criminal behavior attributable to the use of the Internet for criminal purposes. Method: our reflections were prompted by our experience as expert forensic psychiatry witnesses in three cases in which the aggressors had confessed to having had an exclusively virtual relationship with the victims, in which they spent a lot of time daily in a chat room. Conclusion: this scenario offers points for reflection on the nature of Web-mediated victim–aggressor interactions, to assess the effects on the planning and commission of the crime. Discussion. it’s our opinion that there really is such a thing as Internet-correlated crime, because in this case the quality and quantity of the Internet interactions progressively altered the men’s perception of the real relationship between themself and their victims.  相似文献   
953.
954.
955.
956.
The literature on social justice, and social justice movements themselves, routinely ignore nonhuman animals as legitimate subjects of social justice. Yet, as with other social justice movements, the contemporary animal liberation movement has as its focus the elimination of institutional and systemic domination and oppression. In this paper, I explicate the philosophical and theoretical foundations of the contemporary animal rights movement, and situate it within the framework of social justice. I argue that those committed to social justice – to minimizing violence, exploitation, domination, objectification, and oppression – are equally obligated to consider the interests of all sentient beings, not only those of human beings.  相似文献   
957.
Evidence suggests that consideration of personality disorder (PD) severity, incorporating both externalising and internalising features of PD, might help to clarify the PD – violence relationship; moreover, that separate developmental pathways might link externalising and internalising personality pathology with criminal violence. This study of 96 forensic patients with confirmed PD and a history of violent offending addressed the question of whether delusional ideation, measured by the Peters Delusions Inventory, might play a significant role in the link between severe PD and criminal violence. Severe PD, defined by summing scores across DSM-IV PD criteria, was significantly associated with delusional thinking, with violence, and with high levels of both externalising and internalising personality features. Delusional thinking was associated with violence via internalising but not externalising PD features, suggesting that the link between severe PD and violence may be partly mediated by delusional thinking.  相似文献   
958.
959.
960.
The anti-corruption norm in both scholarship and the policy world has too narrowly focused on the domestic and institutional context of bribe-taking and public corruption. Instead, we argue that corruption in the contemporary global economy requires a multiple set of connected transactions, processes, and relationships that take place within informal transnational networks that blur the line between illegal and legal activities. These networks include multinational companies, elites in host countries, offshore financial vehicles and conduits, middlemen and brokers, and destination financial institutions. We examine how these actors operate in Central Asia, a region that is widely identified as corrupt, yet is rarely understood as embedded in the types of global processes, offshore connections and transnational links specified in our analysis. Examples of offshore centers in tax planning from Central Asia, and partial results from a field experiment based on impersonating high corruption risks from four Central Asian states, provide evidence for how the various actors in transnational financial networks structure their dealings. We then present two brief illustrative cases of how these transnational networks have operated in energy explorations services in Kazakhstan and telecommunications contracts in Uzbekistan. Our findings have theoretical, practical, and normative implications for scholars and practitioners of Central Asian international political economy and other ‘high risk' regions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号