首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1767篇
  免费   89篇
各国政治   110篇
工人农民   195篇
世界政治   156篇
外交国际关系   85篇
法律   884篇
中国政治   65篇
政治理论   352篇
综合类   9篇
  2023年   22篇
  2022年   12篇
  2021年   22篇
  2020年   48篇
  2019年   73篇
  2018年   92篇
  2017年   110篇
  2016年   108篇
  2015年   56篇
  2014年   63篇
  2013年   272篇
  2012年   75篇
  2011年   70篇
  2010年   48篇
  2009年   65篇
  2008年   69篇
  2007年   69篇
  2006年   64篇
  2005年   45篇
  2004年   29篇
  2003年   30篇
  2002年   28篇
  2001年   16篇
  2000年   21篇
  1999年   23篇
  1998年   17篇
  1997年   13篇
  1996年   15篇
  1995年   23篇
  1994年   19篇
  1993年   17篇
  1992年   13篇
  1991年   14篇
  1990年   15篇
  1989年   11篇
  1988年   10篇
  1987年   12篇
  1986年   14篇
  1985年   18篇
  1984年   15篇
  1983年   15篇
  1982年   20篇
  1981年   6篇
  1980年   5篇
  1978年   5篇
  1977年   6篇
  1976年   10篇
  1975年   5篇
  1974年   5篇
  1968年   4篇
排序方式: 共有1856条查询结果,搜索用时 15 毫秒
981.
The China-Japan dispute over the Diaoyu Islands is a global concern.It is said that "good fences make good neighbors." One of the longstanding political traits of human behavior is to create territorial certainty,especially since the decline of nomadic societies.However,disputes over territories are still the main cause of serious conflicts,some of which lead to violence between communities and countries.  相似文献   
982.
983.
Some nine months have elapsed since the last G20 meeting. What has changed? What has stayed the same? The temptation would be to emphasize the things that have happened and to understate the issues that have remained the same.  相似文献   
984.
Journal of Youth and Adolescence - Adolescents keep secrets from parents to assert independence or avoid punishment; however, there is little research on nondisclosure in other close relationships...  相似文献   
985.
986.
987.
988.
The state has long relied on ordinary civilians to do surveillance work, but recent advances in networked technologies are expanding mechanisms for surveillance and social control. In this article, we analyze the phenomenon in which private individuals conduct surveillance on behalf of the state, often using private sector technologies to do so. We develop the concept of surveillance deputies to describe when ordinary people, rather than state actors, use their labor and economic resources to engage in such activity. Although surveillance deputies themselves are not new, their participation in everyday surveillance deputy work has rapidly increased under unique economic and technological conditions of our digital age. Drawing upon contemporary empirical examples, we hypothesize four conditions that contribute to surveillance deputization and strengthen its effects: (1) when interests between the state and civilians converge; (2) when law institutionalizes surveillance deputization or fails to clarify its boundaries; (3) when technological offerings expand personal surveillance capabilities; and (4) when unequal groups use surveillance to gain power or leverage resistance. In developing these hypotheses, we bridge research in law and society, sociology, surveillance studies, and science and technology studies and suggest avenues for future empirical investigation.  相似文献   
989.
Ian Brown 《亚洲事务》2013,44(1):15-33
A detailed examination of the war-time discussions within the British government and between government and the private sector over the direction of Burma's post-war economic reconstruction and the conditions under which companies might return. Through the focus on capital and commerce, the author seeks to explore British understandings-and misunderstandings- in their broadest sense.  相似文献   
990.
In a world of problem‐solving lawyering, principled negotiation, and integrative bargaining, to describe a negotiation as “distributional” may strike some as heretical. Still, we disserve our students if we ignore distributional bargaining altogether. Unfortunately, many law students who are drawn to negotiation classes bring with them a fundamental discomfort with claiming value. Contrary to the stereotypes that attribute aggression and “sharp practices” to lawyers, many law students struggle to become more assertive. The Thomas–Kilmann Conflict Mode Instrument (TKI) is one tool that I have found can help raise students' awareness of, and comfort with, the reflexive responses to conflict that can impede their attempts to claim as well as create value in negotiation. The insights students gain from taking the TKI can be quickly put to use in the next negotiation role play. Although it may help students realize their dominant response to conflict, the TKI highlights that no single approach to negotiation is always best. Thus, the TKI can both encourage the reticent to claim more value in negotiation and suppress the seemingly insatiable appetites for value claiming that drive other students. When administering the TKI, I encourage students to learn at least four major lessons:
  • 1 A negotiator has a choice in resolving the dilemma between value claiming and value creating. We are not just stuck with our reflexes.
  • 2 Still, it is good to know what our reflexive response to conflict is likely to be so that we are more mindful of the choices as we make them.
  • 3 Departing from reflexes requires energy: preparation, planning, mindfulness, and conscious effort.
  • 4 Adaptability is desirable. A well‐integrated negotiator might move from one TKI “type” to another as a negotiation progresses.
In this article, I seek to give a very brief overview of the ways I have used the TKI to convey these lessons, increasing students' comfort with, and management of, value claiming. To this end, the article will describe the TKI, explain how I administer and debrief the students' encounter with it, and point out some potential pitfalls of this process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号