首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9002篇
  免费   39篇
各国政治   239篇
工人农民   1101篇
世界政治   235篇
外交国际关系   319篇
法律   5025篇
中国政治   20篇
政治理论   2084篇
综合类   18篇
  2023年   4篇
  2022年   4篇
  2021年   4篇
  2020年   17篇
  2019年   13篇
  2018年   1283篇
  2017年   1213篇
  2016年   1030篇
  2015年   77篇
  2014年   30篇
  2013年   151篇
  2012年   223篇
  2011年   935篇
  2010年   1032篇
  2009年   604篇
  2008年   762篇
  2007年   707篇
  2006年   34篇
  2005年   82篇
  2004年   191篇
  2003年   162篇
  2002年   51篇
  2001年   16篇
  2000年   24篇
  1999年   14篇
  1998年   22篇
  1997年   23篇
  1996年   35篇
  1995年   36篇
  1994年   32篇
  1993年   13篇
  1992年   14篇
  1991年   12篇
  1990年   14篇
  1989年   11篇
  1988年   4篇
  1987年   6篇
  1986年   11篇
  1985年   11篇
  1984年   24篇
  1983年   15篇
  1982年   15篇
  1981年   7篇
  1980年   9篇
  1979年   13篇
  1978年   10篇
  1977年   15篇
  1975年   5篇
  1972年   4篇
  1967年   3篇
排序方式: 共有9041条查询结果,搜索用时 31 毫秒
991.
The introduction of competitive funding mechanisms in higher education is found to generally increase research productivity. However, the diversity within higher education systems may lead universities to behave in substantially different ways in response to the adoption of competitive funding criteria. In particular, we argue that the legitimacy of universities, defined as their level of recognition based on the adherence to socially accepted norms and expectations, is crucial in shaping their reaction. This paper investigates the change in research productivity experienced by Italian universities following the introduction of the first Performance-based Research Funding System (PRFS) in 2003, focusing on the moderating effect of university legitimacy. Using a sample of 75 universities observed during the period 1999–2011, we find that the introduction of PRFS leads to an increase in research productivity, and this increase is significantly more pronounced among more legitimate universities.  相似文献   
992.
The present research adopts a multiple informant approach to identify victims and perpetrators of cyberbullying. Similar approaches have been successfully applied in the field of traditional bullying, and they are highly relevant for studying cyberbullying as well. Three informants can provide key perspectives on cyberbullying incidents: victims, perpetrators, and bystanders. To collect data on these actors, all eighth-grade students in 11 secondary schools were invited to participate in a survey. In total 1458 respondents completed peer-nomination questions on cyberbullying involvement. The results indicated that the prevalence of cyberbullying varied depending on the type of informants that was consulted. In addition, limited overlap was observed between the reports of different informants, resulting in different profiles of victims and perpetrators, depending on the informants that identified them. In sum, different informants tended to have divergent views on cyberbullying, which has important implications. It warrants accurate reporting and critical reflection on the sources of data in cyberbullying research. Moreover, it demonstrates the need to study a more diverse set of informants to advance the understanding of cyberbullying and to enhance prevention efforts.  相似文献   
993.
Cyberbullying, the harassment of others via new technologies, is a growing phenomenon with important consequences for its victims. Despite the growing interest in this new form of violence, only a few longitudinal studies have analyzed the relationship between cyberbullying victimization and psychological problems, such as depression, in adolescents. Furthermore, the mechanisms through which cyberbullying victimization contributes to the development of depressive symptoms remain almost unexplored. The current study assesses whether cyberbullying victimization predicts the increase in depressive symptoms over time and the role of body image and cognitive schemas in the association between cyberbullying victimization and depression. We hypothesized that victims of cyberbullying would develop a negative body image, the belief that others would hurt them and that they were defective to some degree, and that, as a consequence of these cognitions, they would increase their symptoms of depression. A sample of 1015 adolescents (mean age?=?15.43, SD?=?1.09) completed measures of depressive symptoms at three waves (T1, T2, and T3) spaced 6 months apart, measures of body image and cognitive schemas at T1 and T2, and measures of CB victimization at T1. Findings indicated that CB victimization at T1 predicted a worsening of body image and cognitive schemas of mistrust and defectiveness at T2, and those changes in cognitions predicted in turn an increase in depressive symptoms from T2 to T3. Gender differences were also examined. The model was very similar for boys and girls. However, changes in body image acted as a mediator between CB victimization and depression only in girls. Therefore, this study contributes to clarifying the cognitive mechanisms involved in the development of depression among victims of CB. These findings suggest that intervention programs with victims of CB should address the cognitions that are relevant for the development of depression.  相似文献   
994.
The use of the Internet and new technologies now seems to permeate the entire society, affecting every aspect of daily life. Although this change is characterized by undeniable positive aspects, it simultaneously bears a number of risks which are higher especially with respect to the growing number of younger users. In fact, young people, as the most involved in cyber space, are an age group most exposed to the dangers of improper and not aware use of electronic tools. The specific aim of this research was to study unwanted online attentions (UOA) among a sample of Italian students (N?=?585, mean age?=?14.5), identifying UOA as all those behaviors carried out through the Internet and technology to annoy, disturb, offend, humiliate, intimidate, threat, harass, harm or attack others. The online questionnaire investigated the online habits of the students, the presence of UOA and the characteristics of victims and perpetrators, the perception and emotional impact of such conducts, and the victims' possible reactions. The findings offer an estimate of the prevalence of these behaviors in the population of this age group in the area considered. More importantly, the results reveal a very high involvement in technology by the students accompanied by a lack of awareness regarding the risks connected to technology use as well as a low perception of UOA. These results give evidence of the needs in terms of prevention and education instruments in order to improve the system of responses to cybervictimization among young people.  相似文献   
995.
996.
The difference in official crime statistics between women and men is a constant fact in criminology, but has yet to be explained in a satisfactory way. There are few studies addressing the issue of why this gender gap is larger in registered crime than it is in self-report studies. The study at hand comprises a survey among Greek and German students to examine whether this gap could be attributed to a gender-specific reporting of crime. Participants’ self-reported experiences of victimisation and their rating of the seriousness of offences depicted in case vignettes were used to gain insight into varying tendencies to report a crime depending on the offender’s gender. The act of reporting a crime did not vary gender-specifically.  相似文献   
997.
Government favouritism in the allocation of public funds raises costs for any society in which corruption prevails. Particularistic transactions can be identified in three different situations: uncompetitive awards of public contracts when there is only one “competitive” tender, when public money is spent on contracts supplied by politically connected firms, and a situation of capture in which one private contractor obtains a disproportionate share of contracts issued by some public agency. This present research has tested for the relevance of those three types of particularistic transactions that signal government favouritism as they apply to the Romanian construction sector for the period from 2007-2013, and to do so has made use of original public procurement databases. Furthermore, it will be proposed here that the “kickback”—a percentage of particularistic awarded values—can be used as a measurement of corruption. Even conservatively estimated, kickbacks account for much of the cost borne by any society that fails to eradicate corruption. For our purposes here, amounts of kickbacks at county level have been controlled against criminal convictions for corruption at county level. As a result, data analysis provides strong evidence that kickbacks based on particularistic allocation of public funds are indeed relevant in the measurement of corruption, and the steps used to evaluate kickbacks can be used just as well for other countries.  相似文献   
998.
Disclosure of income, assets and conflicts of interest can serve as powerful public accountability tools to draw attention to the abuse of public office, help prosecute corrupt offenders and create a culture of scrutiny in the public sector that deters corruption. Based on data of the World Bank’s Public Accountability Mechanisms initiative, we present the first indicator that captures a country’s financial disclosure in-law effort. By employing different panel data model specifications, we use this indicator to measure how the introduction of comprehensive financial disclosure systems impacted national corruption levels for 91 countries between 1996 and 2012. We present robust results that provide tentative evidence for a positive and significant relationship between a country’s capacity to control for corruption and the expansion of financial disclosure legislation for the years following the enactment.  相似文献   
999.
Social network theory suggests that firms bridging structural holes by connecting disconnected partners in a network benefit from timely access to diverse knowledge. However, the existing literature reports mixed evidence with regard to the performance implications of this view. Our study examines how a firm’s diverse knowledge base and knowledge-processing capabilities affect knowledge creation when a firm bridges multiple structural holes in an inter-firm network. The model is tested on a sample of 191 firms in high-technology industries. The dependent variable, knowledge creation, was measured by the number of patents generated. Results show that when a firm spans multiple structural holes, its diverse technological knowledge facilitates knowledge creation. However, when a firm already possesses well-developed knowledge acquisition capabilities, spanning structural holes reduces knowledge creation. This paper suggests that internal knowledge base and knowledge-processing capabilities determine the impacts of external network positions on firm knowledge creation. It provides implications on how a firm best capitalizes on external network positions.  相似文献   
1000.
We study how the scientific reputations and technology transfer policies of universities affect patenting by university researchers, with particular regard to whether they assign patent ownership to their university or to an outside firm. Using data on the career output of over 33,000 researchers in nanosciences, we find a strongly positive relationship of university reputation in nanosciences with the number of university-assigned patents, but almost a negligible association with firm-assignment of patents. University technology transfer office resources are related positively to both types of patents, but with diminishing returns. In contrast, the share of license revenue offered upfront to researchers is positively associated with university-assigned patents, but negatively related to firm-assigned patents. Taken together, our results suggest that universities that streamline their technology transfer efforts and improve their research reputation through support for basic research will see long-term success in technology commercialization.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号