全文获取类型
收费全文 | 657篇 |
免费 | 35篇 |
专业分类
各国政治 | 85篇 |
工人农民 | 53篇 |
世界政治 | 63篇 |
外交国际关系 | 38篇 |
法律 | 284篇 |
中国政治 | 22篇 |
政治理论 | 142篇 |
综合类 | 5篇 |
出版年
2023年 | 6篇 |
2022年 | 5篇 |
2021年 | 9篇 |
2020年 | 8篇 |
2019年 | 28篇 |
2018年 | 29篇 |
2017年 | 36篇 |
2016年 | 37篇 |
2015年 | 20篇 |
2014年 | 20篇 |
2013年 | 149篇 |
2012年 | 19篇 |
2011年 | 26篇 |
2010年 | 14篇 |
2009年 | 15篇 |
2008年 | 22篇 |
2007年 | 17篇 |
2006年 | 18篇 |
2005年 | 9篇 |
2004年 | 14篇 |
2003年 | 10篇 |
2002年 | 23篇 |
2001年 | 11篇 |
2000年 | 13篇 |
1999年 | 12篇 |
1998年 | 8篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1994年 | 9篇 |
1992年 | 9篇 |
1991年 | 5篇 |
1990年 | 7篇 |
1989年 | 5篇 |
1987年 | 8篇 |
1985年 | 3篇 |
1984年 | 5篇 |
1983年 | 5篇 |
1982年 | 3篇 |
1981年 | 4篇 |
1980年 | 2篇 |
1979年 | 5篇 |
1978年 | 4篇 |
1977年 | 2篇 |
1975年 | 3篇 |
1973年 | 2篇 |
1972年 | 4篇 |
1971年 | 2篇 |
1970年 | 2篇 |
1967年 | 2篇 |
1966年 | 3篇 |
排序方式: 共有692条查询结果,搜索用时 15 毫秒
161.
Jeannette Taylor 《Australian Journal of Public Administration》2019,78(4):497-515
What causes employees in the Australian Public Service (APS) to internally blow the whistle on corruption in the workplace? This research examines the impact of the nature of corruption, organisational culture, and employees’ work attitudes and actions on internal whistle‐blowing in the APS. The respondents were found to internally blow the whistle for most types of corruption: fraud, conflict of interest, unlawful disclosure of government information, and perverting the course of justice. Their whistle‐blowing behaviour was, however, unaffected by observations of theft of official assets. They were also unlikely to report observations of cronyism and nepotism. Active observers of workplace bullying (those who have blown the whistle after witnessing someone else being bullied) were three times more likely to also internally report corruption than inactive observers of bullying. 相似文献
162.
The U.S. Supreme Court decisions in Daubert v. Merrell Dow Pharmaceuticals Inc. and Kumho Tire Co. Ltd. v. Carmichael transformed the way scientific expert evidence was reviewed in courts across the United States. To gauge the impact of these rulings on the admission of forensic identification evidence, the authors analyzed 548 judicial opinions from cases where admission of such evidence was challenged. Eighty-one cases (15%) involved exclusion or limitation of identification evidence, with 50 (65.7%) of these failing to meet the "reliability" threshold. This was largely because of a failure to demonstrate a sufficient scientific foundation for either the technique (27 cases) or the expert's conclusions (17 cases). The incidence of exclusion/limitation because of a lack of demonstrable reliability suggests that there is a continuing need for the forensic sciences to pursue research validating their underlying theories and techniques of identification to ensure their continued acceptance by the courts. 相似文献
163.
To better understand why we do harm by killing and eating nonhuman animals, we engaged in autoethnography. We used reflections
on our harmful behavior to understand harmful behavior more generally. Our method first and foremost was to be as honest as we know
how to be. The process of reflecting on our behavior had us moving through a series of questions that organize the essay.
We also referred to scholarly literature on violence and on hunting to challenge our thoughts. In this way we arrived at insights
on aspects of doing harm, including the role of positioning the target in a certain way; not thinking about the harm and the
institutional supports for not thinking; the particular lure of power through killing; and the problematic indictment of hunting
by meat-eaters. 相似文献
164.
Direct influence over communication media is a potent resource during electoral campaigns, and politicians have an incentive to gain control of the airwaves to advance their careers. In this article, we use data on community radio license applications in Brazil to identify both the causal effect of incumbency on politicians’ ability to control the media and the causal effect of media control on their future electoral prospects. Using a regression discontinuity design, we compare city council candidates who barely won or barely lost an election, showing that incumbency more than doubles the probability of an application’s approval by the Ministry of Communications. Next, using genetic matching, we compare candidates who acquired community radio licenses before an election to similar politicians who did not, showing that a radio station substantially increases one’s vote share and probability of victory. These findings demonstrate that media control helps entrench local political power in Brazil. 相似文献
165.
The ivory industry is the single most serious threat to global elephant populations. A highly sensitive, species-specific real-time PCR assay has been developed to detect and quantify African elephant (Loxodonta africana), Asian elephant (Elephas maximus) and Woolly Mammoth (Mammuthus primigenius) mitochondrial DNA from highly processed samples involved in the international ivory trade. This assay is especially useful for highly processed samples where there are no distinguishing morphological features to identify the species of origin. Using species-specific Taqman(?) probes targeting a region of the mitochondrial cytochrome b gene, we developed an assay that can be used to positively identify samples containing elephant or Woolly mammoth DNA faster and more cost-effectively than traditional sequencing methods. Furthermore, this assay provides a diagnostic result based on probe hybridization that eliminates ambiguities associated with traditional DNA sequence protocols involving low template DNA. The real-time method is highly sensitive, producing accurate and reproducible results in samples with as few as 100 copies of template DNA. This protocol can be applied to the enforcement of the Convention on the International Trade of Endangered Species (CITES), when positive identification of species from illegally traded products is required by conservation officers in wildlife forensic cases. 相似文献
166.
Mark Taylor Glyn Hughes John Haggerty David Gresty Peter Almond 《Computer Law & Security Report》2012
In this paper we examine the legal aspects of the forensic investigation of mobile telephone applications. Mobile telephone applications might be involved with a variety of types of computer misuse including fraud, theft, money laundering, dissemination of copyrighted materials or indecent images, or instances where mobile telephone applications have been involved in the transmission of malware for malicious or criminal purposes. In this paper we examine the process of the forensic investigation of mobile telephone applications, and the issues relating to obtaining digital evidence from mobile telephone applications. 相似文献
167.
Page M Taylor J Blenkin M 《Journal of forensic sciences》2012,57(2):556; author reply 557-556; author reply 559
168.
Sandra C. Taylor 《Intelligence & National Security》2013,28(2):61-70
Women who fought the Americans and the South Vietnamese in the Vietnam War performed many tasks. Some were the usual women's work: nursing, providing food, shelter, repairing trails, and preparing ambushes. But, they also were useful as combatants and spies. Less obvious than men, they exchanged information on troop movements while at market. They were couriers, demonstrators and recruiters. They fought and also performed intelligence through ingenious strategems. One old woman cut off her hair, was half naked, and convinced the Southern troops that she was harmless; then she entered a base and gathered information that aided the NLF forces to defeat the enemy. The communist women were indeed a key to victory. 相似文献
169.
Lori S. Bennear Jonathan M. Lee Laura O. Taylor 《Journal of policy analysis and management》2013,32(2):350-372
When policies incentivize voluntary activities that also take place in the absence of the incentive, it is critical to identify the additionality of the policy—that is, the degree to which the policy results in actions that would not have occurred otherwise. Rebate programs have become a common conservation policy tool for local municipalities seeking to retrofit residential properties with efficient appliances. This research evaluates whether such rebates can be cost‐effective means for water utilities to promote water conservation. A unique database is developed that combines water‐use data over a three‐year period for all households that participated in a utility's high‐efficiency toilet (HET) rebate program, water‐use data for a matched sample of neighbors who did not receive a rebate, and a survey of rebate participants. Difference‐in‐differences models indicate that installation of an HET reduces household water consumption by approximately 7 percent. While installation of an HET appears to be an effective means for achieving household reductions in water consumption, our results also suggest that the rebate program is a much less effective means for achieving household reductions in water consumption. Specifically, the rebate program is found to provide limited additional water savings beyond what would have occurred naturally and is responsible for only 37 percent of the total water reduction attributable to the installation of HETs over the study period. © 2013 by the Association for Public Policy Analysis and Management. 相似文献
170.
Guy Taylor 《人权》2012,(1):17
As a Un Volunteer,working with UnaiDS China,i have the opportunity to get involved in a wide range of areas.From working with community-based organizations,set up by people living with hiV to interacting with the mediaon topics related to hiV/aiDS to sup-porting campaigns to fight HIV/AIDS-related discrimination in the workplace,i get to do it all. 相似文献