首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   433篇
  免费   10篇
各国政治   50篇
工人农民   3篇
世界政治   65篇
外交国际关系   3篇
法律   189篇
中国政治   4篇
政治理论   128篇
综合类   1篇
  2018年   3篇
  2015年   5篇
  2014年   10篇
  2013年   31篇
  2012年   11篇
  2011年   21篇
  2010年   19篇
  2009年   19篇
  2008年   22篇
  2007年   12篇
  2006年   18篇
  2005年   23篇
  2004年   10篇
  2003年   11篇
  2002年   5篇
  2000年   3篇
  1999年   10篇
  1997年   4篇
  1996年   7篇
  1995年   6篇
  1994年   5篇
  1993年   10篇
  1992年   3篇
  1991年   8篇
  1990年   11篇
  1989年   10篇
  1988年   2篇
  1987年   7篇
  1986年   9篇
  1985年   11篇
  1984年   4篇
  1983年   5篇
  1982年   7篇
  1981年   14篇
  1980年   6篇
  1979年   11篇
  1978年   7篇
  1976年   8篇
  1975年   4篇
  1974年   7篇
  1973年   3篇
  1972年   4篇
  1970年   3篇
  1969年   3篇
  1968年   3篇
  1967年   5篇
  1966年   2篇
  1964年   4篇
  1963年   2篇
  1959年   2篇
排序方式: 共有443条查询结果,搜索用时 15 毫秒
171.
Previous research on the determinants of police expenditures has not risen to the level of empirical understanding in large part because it has failed to explain substantively important variation among local jurisdictions. This suggests a need to reevaluate research strategies and to examine closely those cases which cannot be predicted using traditional, social, economic, and environmental approaches. Incorporating deviant case analysis, the authors outline an alternative approach to determine whether policy maker variables should be added to more broadly based models.  相似文献   
172.
A review of current industrial practices, litigation trends, and the growing use of computer data banks and networks leads to the following conclusions about computer crime: data security and integrity are frequently compromised by lax security practices and operating procedures. Frequently the perceived but erroneous assumption that the inherent difficulty of the computer operating system will detour would-be violators is the only security a system has. This article describes methods commonly used to attack data bases and operating systems. The conclusion is that computer crime is an international phenomenon and investigation and prosecution are complex matters. For example, an examination of the copyright laws as they relate to computer crime indicates that there are frequent violations. International violators of the copyright laws frequently distribute bootleg copies of software worldwide. The article concludes that there is a gap between technology and law in the field of computer crimes. International cooperation is needed to define copyright laws and promote investigation and prosecution of international violators.  相似文献   
173.
This article uses information on state and local education spending from 1989–1990 through 2005–2006 to examine the impact of economic conditions on the pattern of real revenue per student. We find that typical economic and other observable education demand determinants are significant in explaining the pattern of real revenue per student before and after the 2001 recession. We also find that there is no economically significant change in how governments responded to economic conditions after the 2001 recession. Finally, our results provide strong evidence that local governments attempted to offset state declines in revenues by increases in local revenues.  相似文献   
174.
175.
176.
177.
Local enterprise boards were first developed as radical initiatives For economic intervention in the early 1980s. Despite the closeness of their dates of birth, however, and the apparent similarity of the organizational forms (and titles) which they adopted, the differences between the boards were as significant as their shared features. The ambitions of each of the five first-wave boards were quite distinct. Some were more radical than others: some were concerned to challenge the market, whilst others were more concerned to work with it. But the experience of market-based intervention through the last decade as well as the legislative and financial constraints imposed by central government have encouraged a degree of convergence, particularly as grander ambitions have been modified. Partnership with the private sector (including the financial sector) became increasingly important for all of them, to the extent that legislation to restrict the operation of local authority based companies of this sort seems misplaced, at least if it is intended to undermine local socialism. The enterprise boards now seem to offer a better model for the involvement of business in regional and local government, than they do as trojan horses for the local authority left.  相似文献   
178.
The introduction of the internal market to the National Health Service in Britain marks a major change in the form of provision of health care interventions. This article reports the findings of independent research into the development of the purchasing process in eight purchasing authorities (which collectively purchase health care for 5 per cent of the population of Britain), and considers the extent to which this has led to an explicit politics of rationing in British health care. The structure and organization of purchasing organizations is described, along with their relationship with providers of health care. The ability of purchasing organizations to assess the health needs of the populations for which they purchase health care services, and their ability to influence change in the nature of the services provided, is also examined.  相似文献   
179.
180.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号