首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   763篇
  免费   45篇
各国政治   40篇
工人农民   33篇
世界政治   59篇
外交国际关系   77篇
法律   353篇
中国政治   4篇
政治理论   235篇
综合类   7篇
  2023年   7篇
  2022年   3篇
  2021年   12篇
  2020年   19篇
  2019年   24篇
  2018年   39篇
  2017年   42篇
  2016年   27篇
  2015年   22篇
  2014年   26篇
  2013年   119篇
  2012年   16篇
  2011年   26篇
  2010年   14篇
  2009年   20篇
  2008年   31篇
  2007年   37篇
  2006年   42篇
  2005年   19篇
  2004年   19篇
  2003年   16篇
  2002年   19篇
  2001年   13篇
  2000年   18篇
  1999年   14篇
  1998年   17篇
  1997年   13篇
  1996年   6篇
  1995年   9篇
  1994年   14篇
  1993年   11篇
  1992年   7篇
  1991年   11篇
  1990年   6篇
  1988年   8篇
  1987年   6篇
  1986年   6篇
  1985年   7篇
  1984年   9篇
  1983年   4篇
  1982年   5篇
  1980年   3篇
  1979年   2篇
  1977年   2篇
  1976年   6篇
  1975年   1篇
  1972年   1篇
  1971年   3篇
  1970年   1篇
  1966年   4篇
排序方式: 共有808条查询结果,搜索用时 0 毫秒
201.
We argue that personal belief exemptions to the mandate for childhood immunizations should not be allowed. Parents who choose not to immunize their children put both their own children and other children at risk. Other children are at risk because unimmunized children go to school or day care when they are contagious but asymptomatic, exposing many more children to potentially dangerous infections. The risks to children from disease are much higher than the risks of vaccines. There are, of course, some bona fide reasons why children should not be immunized. Some children have known allergies or other medical contraindications to certain immunizations. Immunization refusals based on parental beliefs, however, do not fall into this category. In those cases, children are denied the protection of immunizations without any medical or scientific justification. By eliminating personal belief exemptions to those childhood vaccines associated with contagious diseases that have high rates of childhood mortality, we would better protect children and would more fairly spread the burdens of this important public health program.  相似文献   
202.
203.
Public reporting is increasingly used to enhance accountability and transparency and stimulate performance improvement in the public sector. In Canada performance reporting in the health sector is still in development, and involves a large number of actors. This article reports on the results of a recent intervention by the Canadian Institute for Health Information (CIHI) to develop a platform for pan‐Canadian performance reporting ( http://www.yourhealthsystem.cihi.ca ). It describes approaches taken to: develop a conceptual framework; engage the public in the definition of performance reporting priorities; and select indicators for public reporting. This article also discusses conceptual, methodological and operational challenges as well as a proposed evaluation strategy.  相似文献   
204.
Because of the importance of technology to the operations of modern terrorist groups, the factors that affect the technological sophistication of extreme organizations are of great interest. In this article, the process through which terrorist groups seek out and deploy new technology is examined by bringing to bear the deep literature that exists on technology adoption by commercial organizations. A framework is described that delineates not only the factors that influence a group's decision-making processes surrounding new technology but also the obstacles that stand in the way of the successful absorption and use of unfamiliar technologies by a terrorist organization. This framework, by taking a holistic view of the entire technology adoption process, sets out a methodology to both more reasonably predict the outcome of a group's technology-seeking efforts and to speculate about its future innovation efforts. Such a technology focused viewpoint provides a route to more fully inform risk assessment, especially with regard to the low probabilityhigh consequence technologies that have served as the focus of much recent counterterrorist deliberation. The lessons provided by the framework with respect to weapons of mass destruction terrorism and to novel counterterrorist routes are discussed.  相似文献   
205.
In terrorist operations, weapons technologies are the tools groups use to pursue their violent ends. Because of differences in what they can do, different weapons are useful for different types of operations. Using a random sample of terrorist incidents from the RAND-MIPT Terrorism Incident Database, this article explores (1) how terrorists in general used particular weapons technologies and (2) the variation in the technology choices of individual terrorist groups. The results demonstrate significant differences in the ways different weapons are used, in the versatility of individual technologies, and among the technology strategies of different terrorist organizations.  相似文献   
206.
207.
208.
209.

The modern conception of the ``Rule of Law'' entails government bylaw not men, and takes law to consist in rules known in advance. Thislatter characteristic assumes that, for the most part, the meaningof such rules is unproblematic (Hart's ``core of settled meaning''), this usually being understood as a function of ``literal meaning''.A quite different model exists in the Bible: the early rules display``oral residue'', and their meaning, I argue, is constructed in``narrative'' rather than ``semantic'' terms: instead of asking:``what situations do the words of this rule cover?'', we shouldinquire: ``what typical situations do the words of this rule evoke?''.Moreover, courtroom adjudication was not the norm, and its originalform was not based upon the application of written rules but ratherupon judicial discretion taken to have been divinely inspired. Isuggest that modern jurisprudence still retains traces of such earlierconceptions, in its account of modern law: despite their differences, both Hart and Fuller make use of narrative constructions of meaning,and Kelsen ultimately prefers the authority of the judge to the correctness of the rule he purports to apply.

  相似文献   
210.
Considering the steady and rapid growth of product counterfeiting and the damage it causes to society, it is important for criminology and criminal justice scholars to assist criminal justice officials, industry practitioners, and law makers in understanding the product counterfeiting problem and developing strategies to combat it. However, for researchers to be effective in their advisory role they must first establish what is known about product counterfeiting. As a first step in this process, we investigated relevant published research through a content analysis of 47 articles discussing product counterfeiting published in criminal justice and criminology journals through 2014. We analyzed various characteristics about the articles themselves, their authors, the journals they appeared in, and the nature and extent of their focus on product counterfeiting. We conclude this study with an evaluation of the state of product counterfeiting research and recommendations for future research.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号