首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1276篇
  免费   29篇
各国政治   52篇
工人农民   63篇
世界政治   150篇
外交国际关系   101篇
法律   546篇
中国政治   5篇
政治理论   383篇
综合类   5篇
  2023年   8篇
  2022年   4篇
  2021年   11篇
  2020年   23篇
  2019年   35篇
  2018年   44篇
  2017年   41篇
  2016年   58篇
  2015年   34篇
  2014年   38篇
  2013年   194篇
  2012年   29篇
  2011年   43篇
  2010年   25篇
  2009年   36篇
  2008年   37篇
  2007年   61篇
  2006年   40篇
  2005年   36篇
  2004年   38篇
  2003年   36篇
  2002年   43篇
  2001年   33篇
  2000年   20篇
  1999年   15篇
  1998年   19篇
  1997年   22篇
  1996年   19篇
  1995年   15篇
  1994年   23篇
  1993年   20篇
  1992年   13篇
  1991年   18篇
  1990年   12篇
  1989年   16篇
  1988年   18篇
  1987年   13篇
  1986年   15篇
  1985年   11篇
  1984年   21篇
  1983年   8篇
  1982年   11篇
  1981年   8篇
  1980年   5篇
  1979年   4篇
  1978年   4篇
  1977年   7篇
  1975年   5篇
  1974年   5篇
  1973年   3篇
排序方式: 共有1305条查询结果,搜索用时 0 毫秒
951.
Saari and Van Newenhizen (1987) misinterpret their findings about the indeterminacy of voting systems: far from being a vice, indeterminacy is a virtue in allowing voters to be more responsive to, and robbing them of the incentive to misrepresent, their preferences. The responsiveness of approval voting, in particular, means that the cardinal utilities that voters have for candidates can be reflected in voters' strategy choices, which ultimately translate into better social choices. Empirical data from a recent election support these claims, showing, among other things, that the Borda system, a determinate voting system favored by Saari and Van Newenhizen, is highly vulnerable to manipulation by strategic voters.  相似文献   
952.
Toward the development of an objective assessment of ego-identity status   总被引:4,自引:0,他引:4  
Four investigations were completed to develop a self-report measure of ego-identity status. Following James Marcia's definition of diffusion, moratorium, foreclosure, and identity achievement status, a series of Likert-type items were constructed and validated for use in the study of ego-identity formation. Convergent-divergent, concurrent, and predictive validity and test-retest reliability are documented in the reported data. Cross-sectional data suggest the measure will be sensitive to intraindividual change in identity formation. The new Objective Measure of Ego-Identity Status allows researchers to use either a typology or a distribution of stage responses in future longitudinal investigations.This research was supported by a Division of Research Grant at Utah State University.Received his Ph.D. in human development from the Pennsylvania State University. Current research interests include adolescent personality and social development, interpersonal attraction, and family relations.Received her M.S. from Utah State University and is currently a doctoral student at Pennsylvania State University.Received his B.S. from Utah State University and is currently a graduate student at that institution.  相似文献   
953.
954.
While the UK's official position is that it neither uses nor condones torture or cruel, inhuman and degrading treatment (CIDT), it is now a matter of public and parliamentary record that UK security services and military personnel colluded in rendition, torture, and cruel, inhuman and degrading treatment, both as part of the CIA's Rendition, Detention and Interrogation (RDI) programme, at military detention facilities in Afghanistan and Iraq, and through involvement in the detention and interrogation of prisoners by allied security forces. This paper will explain why the government is falling short of its obligations under international law, and why considerable risks remain that UK intelligence and security services will continue to collude in torture and CIDT .  相似文献   
955.
Suspects accused of involvement in the same crime can be tried in one multiple-defendant trial. While research has long demonstrated the difficulties of being a juror, no published work has examined whether multiple-defendant trials compound these difficulties. The current research recruited both student and community samples to determine whether trying multiple defendants would increase conviction rates for individual defendants. Every participant watched one of three trial videos – a single defendant against whom the State had a strong case (single-strong), a single-defendant against whom the State had a weak case (single-weak), or a multiple-defendant trial combining both defendants (multiple-defendant). The findings demonstrated an overshare effect – when the defendants were tried together, overall conviction rates for both defendants increased relative to when they were tried alone, though the pattern of results differed by study sample. Although we are unable to provide a definitive mechanism underlying the results, the best explanation seems to be that multiple-defendant trials prompt jurors to engage in a joint evaluation of the defendants, rather than single evaluations of each. Consequently, participant-jurors’ perceptions of each defendant are impacted by how they compare with one another. Thus, the current research casts some doubt on the fairness of multiple-defendant trials.  相似文献   
956.
    
Steven J. Main 《欧亚研究》2018,70(10):1717-1718
  相似文献   
957.
    
The aim of this pilot study was to investigate compositional changes in bone during decomposition. Elemental concentrations of barium, calcium, iron, potassium, magnesium, zinc and phosphorus in porcine bone (as an experimental analog for human bone) were analyzed by inductively coupled plasma optical emission spectroscopy (ICP‐OES). The samples were taken from porcine bone subjected to shallow burial and surface depositions at 28‐day intervals for a period of 140 days. Results indicated that ICP‐OES elemental profiling has potential to be developed as a forensic test for determining whether a bone sample originates from the early stages of soft tissue putrefaction. Significant changes in iron, sodium and potassium concentrations were found over 140 days. These elements are known to be primarily associated with proteins and/or tissue fluids within the bone. Changes in their respective concentrations may therefore be linked to dehydration over time and in turn may be indicative of time since deposition.  相似文献   
958.
959.
Objectives

Begun in 1939, the Cambridge-Somerville Youth Study (CSYS) is recognized as the first delinquency prevention experiment and the earliest example of a longitudinal–experimental study with criminological outcomes. This paper aims to develop a historical understanding of the origins of the study’s research design.

Methods

The present study is guided by the socio-historical approach and informed by past historical research in criminology. It draws upon a wide array of archival records and published works from the late nineteenth century to the present day.

Results

Richard Clarke Cabot designed and directed the CSYS. Major influences on the study’s research design can be traced to Cabot’s medical practice and research, his advocacy for social work practice and research, and his professional relationship with the Gluecks. The beginnings of experimentation in the social sciences during the early twentieth century may have also played a role. Joan McCord’s early involvement in the study proved instrumental to its longitudinal component.

Conclusions

The rigorous and innovative research design of the CSYS marks an important chapter in the history of experimental criminology, and its influence continues to this day. New experimental studies on the prevention of crime and delinquency must continue to strive to advance scientific knowledge and improve public policy.

  相似文献   
960.
How did the National Security Agency (NSA) adopt the practice of hacking? This paper explores how NSA confronted the digital age by focusing on arguably NSA’s key organizational innovation as a microcosm of these broader changes: the Office of Tailored Access Operations (TAO). This paper develops a pragmatist model of organizational change showing how the practice of hacking became a practical solution to deal with the problems posed by a globally networked world through TAO’s case history. TAO’s aggressive expansion by developing a scalable Computer Network Exploitation (CNE) architecture was designed to keep NSA relevant in the twenty-first century.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号