全文获取类型
收费全文 | 804篇 |
免费 | 18篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 19篇 |
世界政治 | 19篇 |
外交国际关系 | 477篇 |
法律 | 261篇 |
中国共产党 | 1篇 |
政治理论 | 36篇 |
出版年
2024年 | 2篇 |
2023年 | 7篇 |
2022年 | 6篇 |
2021年 | 7篇 |
2020年 | 10篇 |
2019年 | 15篇 |
2018年 | 10篇 |
2017年 | 17篇 |
2016年 | 15篇 |
2015年 | 10篇 |
2014年 | 41篇 |
2013年 | 90篇 |
2012年 | 58篇 |
2011年 | 84篇 |
2010年 | 65篇 |
2009年 | 71篇 |
2008年 | 40篇 |
2007年 | 37篇 |
2006年 | 41篇 |
2005年 | 44篇 |
2004年 | 47篇 |
2003年 | 44篇 |
2002年 | 38篇 |
2001年 | 2篇 |
1999年 | 1篇 |
1996年 | 1篇 |
1992年 | 2篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 1篇 |
1982年 | 1篇 |
1980年 | 2篇 |
1979年 | 1篇 |
1978年 | 2篇 |
1977年 | 1篇 |
1971年 | 1篇 |
排序方式: 共有822条查询结果,搜索用时 0 毫秒
121.
122.
Douglas C. Peifer Author Vitae 《Orbis》2011,55(1):114-131
This article examines the assumptions that lead China alarmists to dismiss America's ability to impose a distant blockade as an inadequate counter to Chinese A2/AD systems. It argues that distant blockade is indeed a viable, lower cost strategy that capitalizes on America's strengths and China's weaknesses. 相似文献
123.
Brian Glyn Williams Author Vitae 《Orbis》2011,55(2):216-239
This article provides a review of the history of jihadi foreign fighters in Afghanistan over the last 30 years. It details the post-9/11 period and the invasion of Afghanistan by U.S. forces, focusing on the ethnic origin of the foreign fighters and how different groups engaged in different aspects of the conflict. Additionally, the piece explains that while the foreign fighters who came to fight alongside the Taliban in Afghanistan included, among others, Uzbekistanis (not Afghan Uzbeks), Turks, and Arabs, there was also a significant force of Pakistanis—of both Pashtun and Punjabi origins—that joined, bolstering the Taliban army. 相似文献
124.
Walter A. McDougall Author Vitae 《Orbis》2011,55(3):339-346
The Pulitzer Prize-winning historian reflects on the rich intellectual fare enjoyed over weekly lunches with Harvey Sicherman. McDougall describes Harvey's mastery of traditional geopolitical analysis, as well as his deftness in adapting strategy to the late-Cold War and post-Cold War eras. 相似文献
125.
David Betz Author Vitae 《Orbis》2011,55(4):613-630
The author reflects on our decade long conflict in Afghanistan and identifies what he considers a main contributor to the malaise. He believes it is a failure to communicate: a message of purpose which answers the oft-asked “why are we there?” question amongst Western audiences; a message of resolve on which Afghans can bet their lives that ISAF will remain there until the Taliban is beaten or compelled to reasonable compromise; and, a message of what success will look like which is accompanied by a compelling rationalization of the cost. 相似文献
126.
Shashank Joshi Author Vitae 《Orbis》2011,55(4):558-576
This article surveys the key loci of Sino-Indian tension, situating them within the context of a classical if uneven security dilemma. It then examines the sources of stability within the relationship, arguing that the scope and intensity of conflict is attenuated by a series of military, political, economic and other factors. Lastly, the essay discusses the implications of the analysis for external powers, and the possible trajectories of the relationship. 相似文献
127.
Purpose
This study examined the process of leaving the gang. Gang membership was conceptualized in a life course framework and the motives for why and methods for how one leaves the gang were analyzed.Methods
Data were gathered from a sample of 84 juvenile arrestees in Arizona, all of whom left their gang. Motives for leaving the gang were organized into factors internal (push) and external (pull) to the gang, while methods for leaving the gang were organized into hostile and non-hostile modes of departure. Motives and methods were cross-classified and their correlates were examined, notably in relation to gang ties—persisting social and emotional attachments to the gang.Results
Push motives and non-hostile methods were the modal responses for leaving the gang. While it was not uncommon to experience a hostile departure from the gang, most former gang members reported walking away without ritual violence or ceremony. This method was conditional on the motive for departure, however. None of the individuals leaving the gang for pull or external reasons experienced a hostile departure. While gang ties persisted regardless of motive or method, retaining such ties corresponded with serious consequences.Conclusions
A life course framework is capable of organizing similarities between leaving the gang and desistance from other forms of crime and deviant groups. The process of gang desistance is consistent with asymmetrical causation. Due to limited attention to this process, a typology is introduced as a basis for understanding leaving the gang in relation to desisting from crime. 相似文献128.
Daniel P. MearsAuthor Vitae Joshua C. CochranAuthor VitaeSarah J. GreenmanAuthor Vitae Avinash S. BhatiAuthor VitaeMark A. GreenwaldAuthor Vitae 《Journal of criminal justice》2011,39(6):509
Purpose
The past decade has been witness to a proliferation of calls for evidence-based juvenile court sanctions—including various programs, interventions, services, and strategies or approaches—that reduce recidivism and improve mental health, drug dependency, and education outcomes. At the same time, an emerging body of work has identified “proven,” “evidence-based,” “best practice,” or, more generally, “effective” efforts to achieve these outcomes. Even so, grounds for concern exist regarding the evidence-base for these and other sanctions.Methods
This paper describes the heterogeneity of sanctioning within juvenile justice and argues that, despite substantial advances in research, the heterogeneity severely delimits the generalizability of evaluations to date. It also raises questions about how much is in fact known about the effectiveness of many juvenile justice sanctions.Conclusion
Extant research offers grounds for optimism. Even so, explicit articulation of the limitations of this research and the need for studies that examine external validity is important for developing evidence about “what works” in juvenile justice. Implications for research and policy are discussed. 相似文献129.
Joel SmithAuthor VitaeVictoria HorseyAuthor Vitae 《Computer Law & Security Report》2011,27(3):305-307
On 1st March 2011, the scope of the CAP Code was extended, giving the Advertising Standards Authority significantly expanded powers to regulate marketing claims made by advertisers on their own websites and in other non-paid-for space under their control, such as social networking sites and company blogs. The ASA’s extended remit will apply to all sectors and all businesses and organisations which are operating from the UK, regardless of size, in a move to ensure the same standards of consumer and business protection in the digital space as in other media. The extension aims to plug a regulatory gap following a formal recommendation from a wide cross-section of UK industry. 相似文献
130.
Warren B. ChikAuthor Vitae 《Computer Law & Security Report》2011,27(4):331-347
Is Google in its quest for search engine optimization through the creation of new technologies, which not only improves its search algorithms but also refines its search functions for users, doing it in a manner that makes it a perpetrator of primary copyright infringement or an invaluable facilitator for Internet functionality? How should the balance of interests in the treatment of creative works be recalibrated in the face of changes in search engine technology and operations, and the disputes that have arisen within the last decade in the context of the digital age and its needs? Using Google as a case study, this paper will look at the two main areas of dispute over the operations of information locator tools and services that either threatens search engine functionality and efficiency or weakens copyright holders’ exclusive rights. It proposes a concerted set of solutions through a reassessment and amendment of copyright law to optimize the social benefits and objectives of both the copyright regime and technological innovations in the electronic model of information archiving, indexing and delivery. A fair distribution of responsibilities and allocation of rights and liabilities will be suggested. In the process, due consideration will be given to both public and private interests, with the former taking precedence; while the recommended solutions will be made within the currently outdated framework for Internet intermediary protection (i.e. safe harbor laws) and exceptions (i.e. specific statutory exemptions and the general fair use defense) under the existing copyright regime. Thus, the proposed changes will be far reaching without being too radical a departure from current law, an evolution that will likely be more acceptable and realistic a solution to the problem.This paper is published in two parts. Part One of this paper published in the previous edition of the CLSR at [2011] 27 CLSR 110-131 dealt with the challenges to the copyright regime posed by the operations and technology behind the Google Images Search Engine, while Part Two will assess the benefits of the Google Books Search Project vis-à-vis the effects it will have on the scope of copyright protection. Recommendations are made to copyright law to accommodate both functions while generally preserving the main objectives of copyright protection. 相似文献