首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   737篇
  免费   24篇
各国政治   20篇
工人农民   14篇
世界政治   73篇
外交国际关系   51篇
法律   271篇
中国政治   1篇
政治理论   287篇
综合类   44篇
  2020年   15篇
  2019年   5篇
  2018年   6篇
  2017年   13篇
  2016年   12篇
  2015年   10篇
  2014年   12篇
  2013年   122篇
  2012年   22篇
  2011年   11篇
  2010年   13篇
  2009年   17篇
  2008年   23篇
  2007年   23篇
  2006年   23篇
  2005年   25篇
  2004年   20篇
  2003年   18篇
  2002年   24篇
  2001年   11篇
  2000年   12篇
  1999年   11篇
  1998年   22篇
  1997年   14篇
  1996年   13篇
  1995年   14篇
  1994年   9篇
  1993年   12篇
  1992年   10篇
  1991年   6篇
  1990年   15篇
  1989年   16篇
  1988年   16篇
  1987年   16篇
  1986年   9篇
  1985年   14篇
  1984年   13篇
  1983年   17篇
  1982年   12篇
  1981年   9篇
  1980年   10篇
  1978年   4篇
  1977年   6篇
  1976年   5篇
  1975年   7篇
  1974年   4篇
  1973年   6篇
  1972年   6篇
  1968年   3篇
  1967年   3篇
排序方式: 共有761条查询结果,搜索用时 78 毫秒
601.
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three.  相似文献   
602.
There has been little direct, systematic empirical analysis of the role that universities play in enhancing the success of entrepreneurial ventures. We attempt to fill this gap by analyzing data from the US SBIR program, a ??set-aside?? program that requires key federal agencies (e.g., Department of Defense) to allocate 2.5% of their research budget to small firms that attempt to commercialize new technologies. Based on estimation of Tobit and negative binomial regressions of the determinants of commercial success, we find that start-ups with closer ties to universities achieve higher levels of performance.  相似文献   
603.
We examine whether scientists employed in foreign countries and foreign-educated native researchers are more “entrepreneurial” than their “domestic” counterparts. We conjecture that foreign-born and foreign-educated scientists possess broader scientific skills and social capital, which increases their likelihood that they will start their own companies. To test this hypothesis we analyze comprehensive data from researchers at the Max Planck Society in Germany. Our findings provide strong support for the conjecture that academic entrepreneurship can be stimulated by facilitating the mobility of scientists across countries.  相似文献   
604.
Mental health courts have recently emerged as one means to reduce the number of persons with mental illness in the criminal justice system. Using a post-test only comparison group design, this study examined rearrest rates for 1 year post discharge among three groups meeting admission criteria for a municipal mental health court. The rearrest rate of defendants who successfully completed the program (N = 351) was 14.5%, compared to 38% among defendants negatively terminated from the program (N = 137), and 25.8% among defendants who chose not to participate (N = 89). This positive result held even when controlling for a range of variables in a Cox regression survival analysis. Factors associated with rearrest are identified for each of the three groups.  相似文献   
605.
606.
This article argues that administrative burden—that is, an individual's experience of policy implementation as onerous—is an important consideration for administrators and influences their views on policy and governance options. The authors test this proposition in the policy area of election administration using a mixed‐method assessment of local election officials. They find that the perceived administrative burden of policies is associated with a preference to shift responsibilities to others, perceptions of greater flaws and lesser merit in policies that have created the burden (to the point that such judgments are demonstrably wrong), and opposition to related policy innovations.  相似文献   
607.
608.
609.
610.
The Chinese university system is one of the world’s largest academic research performers and technology transfer is one of the system’s central roles. Academic interest in Chinese university technology transfer in both the West and China has increased in parallel. This review aims to outline what is known and evaluate the state of research about university technology transfer in China. To be comprehensive, uniquely this review considers the relevant journal articles in both English and Chinese languages. The major themes and methodologies used by authors are identified. The evolution of the literature, particularly those in Chinese from general discussions often with minimal citations to more empirically rigorous studies is documented. It is also shown that the English and Chinese language literatures have little overlap in terms of citations, thereby indicating that the two research communities are still largely disconnected. It is found that the sources of data have remained quite limited and the quantitative research is based almost entirely upon government statistics collected for administrative purpose. The concluding discussion suggests possible avenues for future progress in terms of developing new data sources and increasing the cross-fertilization of two research communities.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号