首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   746篇
  免费   23篇
各国政治   20篇
工人农民   14篇
世界政治   74篇
外交国际关系   51篇
法律   276篇
中国政治   1篇
政治理论   289篇
综合类   44篇
  2020年   15篇
  2019年   5篇
  2018年   6篇
  2017年   13篇
  2016年   12篇
  2015年   10篇
  2014年   12篇
  2013年   124篇
  2012年   22篇
  2011年   11篇
  2010年   13篇
  2009年   17篇
  2008年   23篇
  2007年   22篇
  2006年   23篇
  2005年   25篇
  2004年   20篇
  2003年   19篇
  2002年   25篇
  2001年   13篇
  2000年   13篇
  1999年   11篇
  1998年   22篇
  1997年   14篇
  1996年   13篇
  1995年   14篇
  1994年   9篇
  1993年   12篇
  1992年   10篇
  1991年   7篇
  1990年   15篇
  1989年   16篇
  1988年   16篇
  1987年   16篇
  1986年   9篇
  1985年   14篇
  1984年   13篇
  1983年   17篇
  1982年   12篇
  1981年   9篇
  1980年   10篇
  1978年   4篇
  1977年   6篇
  1976年   5篇
  1975年   8篇
  1974年   4篇
  1973年   6篇
  1972年   6篇
  1968年   3篇
  1967年   3篇
排序方式: 共有769条查询结果,搜索用时 10 毫秒
271.
As evidence mounts about the positive effects of autonomous motivation such as public service motivation, there is a growing case for public organizations to design reforms to better support public employees’ inherent desire to help others. But how feasible is this in reality? Most experimental evidence on autonomous motivation stems from interventions at the individual level, possibly exaggerating what government reforms can achieve in reality. We present a longitudinal study that analyses a three-year trial in Danish hospitals in which incentives and autonomy were changed to encourage autonomous motivation. This set-up offers a rare opportunity to observe the potential malleability of intrinsic, public service, user and external motivation. The results show little observable change in motivation due to the reform. We explore the practical difficulties of translating evidence about motivation into reforms given implementation challenges, contextual factors and a recognition that motivation might be less malleable than implied by research.  相似文献   
272.
Building Secure Elections: E-Voting, Security, and Systems Theory   总被引:1,自引:0,他引:1  
The increased use of information technology promises to revolutionize both the provision of government services and the vibrancy of democracy. In the aftermath of the Florida voting controversy during the 2000 presidential election, governments have placed their faith in technology, adopting e-voting machines that offer enhanced voter convenience and eliminate the need for subjective recounts. However, the same underlying assumptions that apply to e-government theory do not apply to e-voting because of the severity of consequences if failure occurs and the loss of transparency traditionally associated with the voting process. A more useful theoretical guide is systems theory, which deals with complex, high-risk systems. This literature has been largely overlooked by adopters of e-voting technology, even though the practical criticisms of e-voting made by computer security specialists reflect an essentially systems theory perspective.  相似文献   
273.
274.
This study found that in spite of increased calls for conversion from defense to commercial-based capabilities to enhance survival and growth opportunities, reduced dependency on Department of Defense (DOD) sales was negatively associated with sales growth for a sample of 90 Ohio-based small to medium-sized defense firms from 1990 to 1993. This implies that rather than converting to commercial production, most smaller defense firms are shrinking along with DOD procurement budgets. This finding is not surprising, since the structural characteristics of the defense industry make DOD-dependent firms' transitioning to commercial business extremely difficult if not impossible. The paper concludes by providing several recommendations for managers and policy makers to help these firms make the transition to a civilian economy.  相似文献   
275.
In restitution cases should the compensation be based on the benefit to one side or on the cost to the other side? For example, should a rescuer be compensated for the costs to the rescuer or for the benefits to the rescuee? A similar question can be asked regarding awards in nuisance and accident cases. For example, should a polluter be liable for the damage to the pollutee or for the benefit to the polluter from not having to install smoke scrubbers? In this paper we will show the critical role that asymmetries in information have on the choice of payment structure.  相似文献   
276.
This article is based on papers presented at the 1993 Critical Legal Conference in Oxford, and to the Critical Law Groups of Bristol and Lancaster Universities. I would like to thank Mary Barker, Eugene Mac Namee and Paul Skidmore for their comments on earlier drafts.  相似文献   
277.
278.
Antecedents of abusive personality and abusive behavior in wife assaulters   总被引:1,自引:0,他引:1  
One hundred and forty men referred for wife assault and 45 demographically matched controls were assessed for psychological variables associated with abusive personality (anger, cyclical (borderline) personality organization (BPO) and chronic experience of trauma symptoms) and abusive behaviors (both physical and emotional) as reported by their female partners. Predictor variables for these abuse measures included the EMBU which assesses recollections of parental warmth and rejection and the Conflict Tactics Scale which assesses physical abuse in the family of origin. A composite of BPO, anger, trauma symptoms and fearful attachment called Abusive Personality (ABP) correlated .42 with wives reports of emotionally abusive behaviors. ABP was positively and significantly correlated with recollections of negative parental treatment by the abuse perpetrator. A compositive of parental rejection and verbal and physical abuse by parents correlated .41 with ABP. A discriminant function of high and low ABP found that ABP was predicted by paternal rejection, physical abuse, and absence of maternal warmth. Physical abuse by either parent correlated significantly with all subscales and total scores on the ABP measure. When combined with data showing ABP to correlate significantly with frequency of use of violence by wife assaulters (Dutton, 1995b, Dutton and Starzomski, 1993), the current study suggests a personality syndrome of assaultive males that has antecedents in the early experiences of these men. The present data suggest that family of origin experiences may have effects beyond modeling of abusive behaviors. These effects include development of a specific personality form associated with abusiveness.  相似文献   
279.
280.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号