首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   314篇
  免费   23篇
各国政治   13篇
工人农民   16篇
世界政治   24篇
外交国际关系   40篇
法律   140篇
中国政治   5篇
政治理论   98篇
综合类   1篇
  2023年   8篇
  2022年   9篇
  2021年   6篇
  2020年   14篇
  2019年   20篇
  2018年   27篇
  2017年   18篇
  2016年   27篇
  2015年   27篇
  2014年   14篇
  2013年   47篇
  2012年   23篇
  2011年   10篇
  2010年   8篇
  2009年   8篇
  2008年   11篇
  2007年   6篇
  2006年   10篇
  2005年   7篇
  2004年   6篇
  2003年   6篇
  2002年   6篇
  2001年   2篇
  1999年   3篇
  1997年   3篇
  1995年   1篇
  1994年   2篇
  1993年   2篇
  1992年   2篇
  1990年   2篇
  1987年   1篇
  1981年   1篇
排序方式: 共有337条查询结果,搜索用时 15 毫秒
321.
In this short essay, we introduce readers to a special issue of Terrorism and Political Violence on criminological approaches to the study of terrorism. In addition to summarizing the eight articles in the issue, we outline some general points about the relationship between criminological thinking and our understanding of terrorism. Our goal is to place the special issue's contributions in context and highlight under-explored issues that future research could address.  相似文献   
322.
This study examines whether Criminology's Routine Activities Theory (RAT) and related Lifestyle Theory (LST) can account for variation between the attributes of victims of fatal ideologically motivated attacks (akin to terrorism) and the victims of non-ideologically motivated homicide incidents committed by far-Right extremists in the United States. This article makes four contributions. First, we empirically test Criminology theory in the context of terrorism by using routine activities to devise four core hypotheses to explain differences between the two types of victims. Second, our investigation uniquely includes a non-terrorist comparison group (i.e., victims of homicides committed by extremists for personal reasons like greed). Third, our study focuses on ideological victimization. Terrorism researchers have usually ignored victims because of the difficulty in accessing the necessary data. Finally, we also make a methodological contribution by showing that criminology can build upon the terrorism literature by utilizing open-sources. Using data from the Extremist Crime Database (ECDB), the results of a multivariate analysis partially supported the hypotheses, showing that RAT and LST offer empirically supported theoretical constructs that have the ability to differentiate between ideological and non-ideological homicides.  相似文献   
323.
324.
How do parties decide which issues to emphasize during electoral competition? We argue that the answer to this question depends on how parties of the left and of the right respond to economic inequality. Increasing inequality shifts the proportion of the population falling into lower socioeconomic categories, thereby increasing the size of the electoral constituency that is receptive toward leftist parties' redistributive economic appeals. In the face of rising inequality, then, leftist parties will emphasize economic issues in their manifestos. By contrast, the nonredistributive economic policies often espoused by rightist parties will not appeal to this burgeoning constituency. Rather, we argue, rightist parties will opt to emphasize values‐based issues, especially in those cases where “social demand” in the electorate for values‐based representation is high. We find support for these relationships with hierarchical regression models that draw from data across hundreds of parties in a diverse set of the world's democracies.  相似文献   
325.
Abstract

Presidents often give speeches about crime issues as a way to convince the public that there are significant problems for which an easy solution can be found. Studies have shown that presidential rhetoric on crime not only influences the public’s perception of the problem, but also the perception of the best solution. More recent research has demonstrated that presidents sometimes draw on the public’s fear of crime as a way to further affect the public’s perception of crime. In other words, presidents link crime with the public’s anxiety about other fearful events as a way to further impact the public’s perception of a problem (and thus further their agenda). This study examines presidential rhetoric on cybercrime to determine if executives link cybercrime with other issues such as national security. The findings provide credibility to both Cavelty’s threat frames approach as well as assertions made regarding the politics of fear.  相似文献   
326.
Low participation rates in government assistance programs are a major policy concern in the United States. This paper studies take‐up of Section 8 housing vouchers, a program in which take‐up rates are quite low among interested and eligible households. We link 18,109 households in Chicago that were offered vouchers through a lottery to administrative data and study how baseline employment, earnings, public assistance, arrests, residential location, and children's academic performance predict take‐up. Our analysis finds mixed evidence of whether the most disadvantaged or distressed households face the largest barriers to program participation. We also study the causal impact of peer behavior on take‐up by exploiting idiosyncratic variation in the timing of voucher offers. We find that the probability of lease‐up increases with the number of neighbors who recently received voucher offers. Finally, we explore the policy implications of increasing housing voucher take‐up by applying reweighting methods to existing causal impact estimates of voucher receipt. This analysis suggests that greater utilization of vouchers may lead to larger reductions in labor market activity. Differences in take‐up rates across settings may be important to consider when assessing the external validity of studies identifying the effects of public assistance programs.  相似文献   
327.
Information controls are actions intended to deny, disrupt, monitor, or secure information for political ends. They can be implemented using a wide variety of technical and nontechnical means. Political contests over the control of information are heightened around important events, such as major anniversaries, armed conflicts, protests, and elections. In this paper, we offer a comparative case study of online censorship of the circumvention tool Psiphon during the Iranian elections in 2016 and 2013, drawing on unique access to analytics data from Psiphon. We find that the Iranian regime developed its censorship approach in two ways, deploying blocking that was more targeted and strategically timed in the more recent case. Evidence suggests that the regime relaxed censorship of Psiphon during the official campaign period for the 2016 election. The apparent objective of this new approach was to control access to information while minimizing the political consequences of doing so.  相似文献   
328.
Liverpool Law Review - Contracts often make provision for the remedies available upon breach, i.e., by providing for a sum or stipulation available to either party upon breach by the other (an...  相似文献   
329.
Public Choice - Politics, like any social system, involves selection mechanisms. This paper presents a model of politics as an evolutionary process. Our model yields three main results. First, the...  相似文献   
330.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号