全文获取类型
收费全文 | 5870篇 |
免费 | 188篇 |
专业分类
各国政治 | 463篇 |
工人农民 | 151篇 |
世界政治 | 628篇 |
外交国际关系 | 367篇 |
法律 | 2462篇 |
中国政治 | 34篇 |
政治理论 | 1879篇 |
综合类 | 74篇 |
出版年
2023年 | 26篇 |
2020年 | 75篇 |
2019年 | 104篇 |
2018年 | 132篇 |
2017年 | 152篇 |
2016年 | 165篇 |
2015年 | 115篇 |
2014年 | 151篇 |
2013年 | 945篇 |
2012年 | 150篇 |
2011年 | 173篇 |
2010年 | 145篇 |
2009年 | 142篇 |
2008年 | 191篇 |
2007年 | 254篇 |
2006年 | 192篇 |
2005年 | 178篇 |
2004年 | 195篇 |
2003年 | 190篇 |
2002年 | 183篇 |
2001年 | 105篇 |
2000年 | 114篇 |
1999年 | 91篇 |
1998年 | 124篇 |
1997年 | 99篇 |
1996年 | 107篇 |
1995年 | 81篇 |
1994年 | 73篇 |
1993年 | 88篇 |
1992年 | 73篇 |
1991年 | 91篇 |
1990年 | 78篇 |
1989年 | 69篇 |
1988年 | 77篇 |
1987年 | 87篇 |
1986年 | 85篇 |
1985年 | 51篇 |
1984年 | 70篇 |
1983年 | 71篇 |
1982年 | 66篇 |
1981年 | 51篇 |
1980年 | 47篇 |
1979年 | 43篇 |
1978年 | 44篇 |
1977年 | 46篇 |
1976年 | 26篇 |
1975年 | 26篇 |
1974年 | 27篇 |
1973年 | 34篇 |
1972年 | 23篇 |
排序方式: 共有6058条查询结果,搜索用时 0 毫秒
881.
Jamie K. Pringle Ph.D. John R. Jervis Ph.D. James D. Hansen B.Sc. Glenda M. Jones Ph.D. Nigel J. Cassidy Ph.D. John P. Cassella Ph.D. 《Journal of forensic sciences》2012,57(6):1467-1486
Abstract: This study provides forensic search teams with systematic geophysical monitoring data over simulated clandestine graves for comparison to active cases. Simulated “wrapped” and “naked” burials were created. Multigeophysical surveys were collected over a 3‐year monitoring period. Bulk ground resistivity, electrical resistivity imaging, multifrequency ground‐penetrating radar (GPR), and grave and background “soil‐water” conductivity data were collected. Resistivity surveys revealed the naked burial had consistently low‐resistivity anomalies, whereas the wrapped burial had small, varying high‐resistivity anomalies. GPR 110‐ to 900‐MHz frequency surveys showed the wrapped burial could be detected throughout, with the “naked” burial mostly resolved. Two hundred and twenty‐five megahertz frequency GPR data were optimal. “Soil‐water” analyses showed rapidly increasing (year 1), slowly increasing (year 2), and decreasing (year 3) conductivity values. Results suggest resistivity and GPR surveys should be collected if target “wrapping” is unknown, with winter to spring surveys optimal. Resistivity surveys should be collected in clay‐rich soils. 相似文献
882.
Cochran JK Bjerregaard B 《International journal of offender therapy and comparative criminology》2012,56(2):203-217
Anomie is a highly prominent theoretical construct in macro-social, particularly cross-national, criminological inquiry. Yet despite its prominence, it has proven to be quite elusive with regard to its measurement and, hence, making it nearly impossible to test theoretical hypotheses regarding its predictive efficacy. Although the concept, whether derived from Merton's classic conceptualization or from its current incarnation in the form of institutional anomie as developed by Messner and Rosenfeld, is multidimensional and complex in its theoretical structure, most researchers have attempted to operationalize it through simple, single-item, often surrogate/proxy measures. The present research note attempts to develop a measure that is more consistent with its multidimensional and complex nature. This more complex operationalization is then examined with regard to its efficacy at predicting cross-national levels of both homicide and theft. Our results suggest that that this new operationalization has considerable predictive efficacy, accounting for approximately one third of the variation in the cross-national level of both homicide and theft. 相似文献
883.
Yarbrough A Jones S Sullivan C Sellers C Cochran J 《International journal of offender therapy and comparative criminology》2012,56(2):191-202
Social learning theory is one of the most prominent general theories of crime. Yet recent research has called into question its applicability to all offenders. Specifically, the influence of antisocial peers has been found to exert a stronger effect among those individuals evincing higher levels of criminal propensity (deemed social amplification), whereas other components of the theory have either not been shown to interact with criminal propensity or not been tested. This study examines several social learning theory components to determine whether its influence is dependent on an individual's level of self-control. Results suggest little support for the social amplification hypothesis as the components of social learning theory were found to operate similarly across individuals regardless one's level of self-control. Implications for criminological theory are discussed. 相似文献
884.
This study assessed women's violent and nonviolent offending, using data from two online student samples (men and women: n = 344), reporting on either being a perpetrator and witness (women) or being a victim and witness (men). A comprehensive measure of general violence, intimate partner violence (IPV), and nonviolent offending was collected. From women's self-reports, 59.9% reported perpetrating general violent offenses, 58.1% reported perpetrating IPV offenses and 85.6% reported perpetrating nonviolent offenses. Correlations showed that women were involved in a variety of offenses and demonstrated the interrelatedness of general violence and IPV, and of violent and nonviolent offenses. Regression analysis confirmed the close association between partner and general violence, and found that drug offenses were also related to the former and criminal damage to the latter. Overall, the prevalence data demonstrated women's involvement in all types of offending, and a similar pattern of offending was supported across data sources. Limitations of the sampling method and measures are discussed. 相似文献
885.
886.
Statutes criminalizing behavior that risks transmission of HIV/AIDS exemplify use of the criminal law against individuals
who are victims of infectious disease. These statutes, despite their frequency, are misguided in terms of the goals of the
criminal law and the public health aim of reducing overall burdens of disease, for at least three important reasons. First,
they identify individual offenders for punishment, a paradigm that is misplaced in the most typical contexts of transmission
of infectious disease and even for HIV/AIDS, despite claims of AIDS exceptionalism. Second, although there are examples of
individuals who transmit infectious disease in a manner that fits the criminal law paradigm of identification of individual
offenders for deterrence or retribution, these examples are limited and can be accommodated by existing criminal laws not
devoted specifically to infectious disease. Third, and most importantly, the current criminal laws regarding HIV/AIDS, like
many other criminal laws applied to infectious disease transmission, have been misguided in focusing on punishment of the
diseased individual as a wrongful transmitter. Instead of individual offenders, activities that enhance the scale of disease
transmission—behaviors that might be characterized as ‘transmission facilitation’—are a more appropriate target for the criminal
law. Examples are trafficking in human beings (including sex trafficking, organ trafficking, and labor trafficking), suppression
of information about the emergence of infection in circumstances in which there is a legally established obligation to disclose,
and intentional or reckless activities to discourage disease treatment or prevention. Difficulties remain with justifications
for criminalizing even these behaviors, however, most importantly the need for trust in reducing overall burdens of disease,
problems in identifying individual responsible offenders, and potential misalignment between static criminal law and the changing
nature of infectious disease. 相似文献
887.
Using stochastic methods we illustrate that the Provisional Irish Republican Army's (PIRA) network is clustered along three primary dimensions: (a) brigade affiliation, (b) whether the member participated in violent activities, and (c) task/role within PIRA. While most brigades tended to foster connections within the brigade (that is, “closure”), the tendency to do so varied across the organization. Members who engaged with violent activities were far more likely to connect with each other; in later periods there is polarization into those who engage in violent activities and those who do not. Across brigades, those who engage in a particular task and role (improvised explosive device [IED] constructor, IED planter, gunman, robber/kidnapper/drug smuggler/hijacker) are more likely to connect with others who do the same task or play the same role than with other members who fulfill other roles. Standard forms of homophily (that is, the tendency to make connections with people who are similar in terms of demography or status) play a very weak role in explaining which members interact with one another. Finally, our analysis illustrates clear patterns of relational change that correspond to changes in the formal structures that PIRA's leadership promoted. 相似文献
888.
John Coakley 《The Journal of Legislative Studies》2014,20(4):542-572
The turn of the twenty-first century witnessed a surprising reversal of the long-observed trend towards the disappearance of second chambers in unitary states, with 28 countries – all but one of them unitary – adopting the bicameral system. This article explores this development by first setting it in the context of the historical evolution of second chambers and the arguments that support bicameralism, and then exploring the characteristics that distinguish today's second chambers from first chambers. A ‘census’ of second chambers in 2014 is used to provide data on second chambers in federal and unitary states, to facilitate comparison with earlier data, and to distinguish between ‘new’ and longer-established second chambers. The article concludes that newly established second chambers are concentrated predominantly in political systems where liberal democratic principles are not established, suggesting that the debate over their role in democratic states is set to continue. 相似文献
889.
Paul Gill Ph.D. John Horgan Ph.D. Paige Deckert M.S. A.B.D. 《Journal of forensic sciences》2014,59(2):425-435
This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone‐actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone‐actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone‐actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone‐actor terrorists were socially isolated. Lone‐actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone‐actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. 相似文献
890.