全文获取类型
收费全文 | 961篇 |
免费 | 47篇 |
专业分类
各国政治 | 37篇 |
工人农民 | 60篇 |
世界政治 | 71篇 |
外交国际关系 | 56篇 |
法律 | 487篇 |
中国政治 | 15篇 |
政治理论 | 272篇 |
综合类 | 10篇 |
出版年
2023年 | 11篇 |
2022年 | 6篇 |
2021年 | 14篇 |
2020年 | 33篇 |
2019年 | 24篇 |
2018年 | 37篇 |
2017年 | 43篇 |
2016年 | 50篇 |
2015年 | 35篇 |
2014年 | 43篇 |
2013年 | 134篇 |
2012年 | 35篇 |
2011年 | 23篇 |
2010年 | 30篇 |
2009年 | 43篇 |
2008年 | 37篇 |
2007年 | 53篇 |
2006年 | 36篇 |
2005年 | 43篇 |
2004年 | 24篇 |
2003年 | 35篇 |
2002年 | 23篇 |
2001年 | 17篇 |
2000年 | 17篇 |
1999年 | 13篇 |
1998年 | 15篇 |
1997年 | 9篇 |
1996年 | 7篇 |
1995年 | 10篇 |
1994年 | 8篇 |
1993年 | 6篇 |
1992年 | 10篇 |
1991年 | 5篇 |
1990年 | 4篇 |
1989年 | 5篇 |
1988年 | 9篇 |
1986年 | 5篇 |
1985年 | 5篇 |
1984年 | 4篇 |
1983年 | 2篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 2篇 |
1979年 | 6篇 |
1978年 | 2篇 |
1977年 | 7篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1970年 | 3篇 |
1968年 | 2篇 |
排序方式: 共有1008条查询结果,搜索用时 0 毫秒
911.
912.
Mark Eric Williams 《拉美政治与社会》2001,43(4):91-126
Despite repeated conflict with organized labor, the government of Carlos Salinas de Gortari (1988–94) pushed an aggressive divestment agenda that transformed Mexico into Latin America's leading privatizer. Explanations of Salinas's achievements typically emphasize centralized presidential power (including control over the ruling party) and autonomy; technocratic and political savvy; and weak labor opposition. This article questions such a pure "capacity-outcome" approach. Of equal importance are the learning effects of repeated interaction between the state and labor, which changed the course of divestment struggles and thereby influenced their outcomes. Lessons learned in successive confrontations led to patterns of interaction conducive to widescale privatization. The article develops this argument through comparative analysis of major divestment episodes in the aviation, mining, steel, and telecommunications sectors. 相似文献
913.
This paper studies a principal-agent model of the relationship between office-holder and an electorate, where everyone is initially uninformed about the office-holder’s ability. If office-holder effort and ability interact in the determination of performance in office, then an office-holder has an incentive to learn, i.e., raise effort so that performance becomes a more accurate signal of her ability. Elections reduce the learning effect, and the reduction in this effect may more than offset the positive “re-election concerns” effect of elections on effort, implying higher effort with appointment. When this occurs, appointment of officials may welfare-dominate elections. 相似文献
914.
915.
Nancy L. Hogan Eric G. Lambert Morris Jenkins Daniel E. Hall 《American Journal of Criminal Justice》2009,34(3-4):151-165
The number of private prisons run by corporate security businesses has increased rapidly throughout the past two decades. There has been a parallel increase in literature, both pro and con, comparing the efficiency and effectiveness of private and public prisons; however, private prison staff has been largely ignored. OLS regression analysis of a survey of 160 employees at a Midwestern private prison facility showed that the job characteristics of job stress, supervision, and job variety were far more important than personal characteristics of race/ethnicity, gender, age, tenure, education and position in influencing staff job satisfaction and organizational commitment. Specifically, job stress had the largest impact on job satisfaction, while quality of supervision had the greatest impact on organizational commitment. 相似文献
916.
917.
Eric Chwang 《The Journal of law, medicine & ethics》2009,37(3):487-495
Futility is easily defined as uselessness. The mistaken appearance that it cannot be defined is explained by difficulties applying it to particular cases. This latter problem is a major goal of clinical training and cannot be solved in a pithy statement. 相似文献
918.
919.
Site‐, Technique‐, and Time‐Related Aspects of the Postmortem Redistribution of Diazepam,Methadone, Morphine,and their Metabolites: Interest of Popliteal Vein Blood Sampling 下载免费PDF全文
Eric Lemaire M.D. Ph.D. Carl Schmidt M.D. Nathalie Dubois Ph.D. Raphael Denooz Ph.D. Corinne Charlier Ph.D. Philippe Boxho M.D. Ph.D. 《Journal of forensic sciences》2017,62(6):1559-1574
Sampling site, technique, and time influence postmortem drug concentrations. In 57 cases, we studied drug concentration differences as follows: subclavian vein‐dissection/clamping versus blind stick, femoral vein‐dissection/clamping versus blind stick, right cardiac chamber, and popliteal vein‐dissection and clamping only. Cases were distributed in group #1 (all cases with both techniques), group #2 (dissection/clamping), and group #3 (blind stick). Sampled drugs were diazepam, methadone, morphine, and their metabolites. To assess PMR, mean concentrations and ratios were calculated for each group. Time‐dependent variations of blood concentrations and ratios were also assessed. Results indicate that site, method, and time may influence postmortem distribution interpretation in different ways. Popliteal blood seems less subject to PMR. In conclusion, our study is the first to evaluate concurrently three main aspects of PMR and confirms that the popliteal vein may represent a site that is more resistant to the changes seen as a result of PMR. 相似文献
920.
This article reports on preliminary findings and recommendations of a cross-discipline project to accelerate international business-to-business automated sharing of cyber-threat intelligence, particularly IP addresses. The article outlines the project and its objectives and the importance of determining whether IP addresses can be lawfully shared as cyber threat intelligence.The goal of the project is to enhance cyber-threat intelligence sharing throughout the cyber ecosystem. The findings and recommendations from this project enable businesses to navigate the international legal environment and develop their policy and procedures to enable timely, effective and legal sharing of cyber-threat information. The project is the first of its kind in the world. It is unique in both focus and scope. Unlike the cyber-threat information sharing reviews and initiatives being developed at country and regional levels, the focus of this project and this article is on business-to-business sharing. The scope of this project in terms of the 34 jurisdictions reviewed as to their data protection requirements is more comprehensive than any similar study to date.This article focuses on the sharing of IP addresses as cyber threat intelligence in the context of the new European Union (EU) data protection initiatives agreed in December 2015 and formally adopted by the European Council and Parliament in April 2016. The new EU General Data Protection Regulation (GDPR) applies to EU member countries, a major focus of the international cyber threat sharing project. The research also reveals that EU data protection requirements, particularly the currently applicable law of the Data Protection Directive 95/46/EC (1995 Directive) (the rules of which the GDPR will replace in practice in 2018), generally form the basis of current data protection requirements in countries outside Europe. It is expected that this influence will continue and that the GDPR will shape the development of data protection internationally.In this article, the authors examine whether static and dynamic IP addresses are “personal data” as defined in the GDPR and its predecessor the 1995 Directive that is currently the model for data protection in many jurisdictions outside Europe. The authors then consider whether sharing of that data by a business without the consent of the data subject, can be justified in the public interest so as to override individual rights under Articles 7 and 8(1) of the Charter of Fundamental Rights of the European Union, which underpin EU data protection. The analysis shows that the sharing of cyber threat intelligence is in the public interest so as to override the rights of a data subject, as long as it is carried out in ways that are strictly necessary in order to achieve security objectives. The article concludes by summarizing the project findings to date, and how they inform international sharing of cyber-threat intelligence within the private sector. 相似文献