全文获取类型
收费全文 | 314篇 |
免费 | 23篇 |
专业分类
各国政治 | 13篇 |
工人农民 | 16篇 |
世界政治 | 24篇 |
外交国际关系 | 40篇 |
法律 | 140篇 |
中国政治 | 5篇 |
政治理论 | 98篇 |
综合类 | 1篇 |
出版年
2023年 | 8篇 |
2022年 | 9篇 |
2021年 | 6篇 |
2020年 | 14篇 |
2019年 | 20篇 |
2018年 | 27篇 |
2017年 | 18篇 |
2016年 | 27篇 |
2015年 | 27篇 |
2014年 | 14篇 |
2013年 | 47篇 |
2012年 | 23篇 |
2011年 | 10篇 |
2010年 | 8篇 |
2009年 | 8篇 |
2008年 | 11篇 |
2007年 | 6篇 |
2006年 | 10篇 |
2005年 | 7篇 |
2004年 | 6篇 |
2003年 | 6篇 |
2002年 | 6篇 |
2001年 | 2篇 |
1999年 | 3篇 |
1997年 | 3篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1990年 | 2篇 |
1987年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有337条查询结果,搜索用时 15 毫秒
321.
In this short essay, we introduce readers to a special issue of Terrorism and Political Violence on criminological approaches to the study of terrorism. In addition to summarizing the eight articles in the issue, we outline some general points about the relationship between criminological thinking and our understanding of terrorism. Our goal is to place the special issue's contributions in context and highlight under-explored issues that future research could address. 相似文献
322.
This study examines whether Criminology's Routine Activities Theory (RAT) and related Lifestyle Theory (LST) can account for variation between the attributes of victims of fatal ideologically motivated attacks (akin to terrorism) and the victims of non-ideologically motivated homicide incidents committed by far-Right extremists in the United States. This article makes four contributions. First, we empirically test Criminology theory in the context of terrorism by using routine activities to devise four core hypotheses to explain differences between the two types of victims. Second, our investigation uniquely includes a non-terrorist comparison group (i.e., victims of homicides committed by extremists for personal reasons like greed). Third, our study focuses on ideological victimization. Terrorism researchers have usually ignored victims because of the difficulty in accessing the necessary data. Finally, we also make a methodological contribution by showing that criminology can build upon the terrorism literature by utilizing open-sources. Using data from the Extremist Crime Database (ECDB), the results of a multivariate analysis partially supported the hypotheses, showing that RAT and LST offer empirically supported theoretical constructs that have the ability to differentiate between ideological and non-ideological homicides. 相似文献
323.
324.
How do parties decide which issues to emphasize during electoral competition? We argue that the answer to this question depends on how parties of the left and of the right respond to economic inequality. Increasing inequality shifts the proportion of the population falling into lower socioeconomic categories, thereby increasing the size of the electoral constituency that is receptive toward leftist parties' redistributive economic appeals. In the face of rising inequality, then, leftist parties will emphasize economic issues in their manifestos. By contrast, the nonredistributive economic policies often espoused by rightist parties will not appeal to this burgeoning constituency. Rather, we argue, rightist parties will opt to emphasize values‐based issues, especially in those cases where “social demand” in the electorate for values‐based representation is high. We find support for these relationships with hierarchical regression models that draw from data across hundreds of parties in a diverse set of the world's democracies. 相似文献
325.
AbstractPresidents often give speeches about crime issues as a way to convince the public that there are significant problems for which an easy solution can be found. Studies have shown that presidential rhetoric on crime not only influences the public’s perception of the problem, but also the perception of the best solution. More recent research has demonstrated that presidents sometimes draw on the public’s fear of crime as a way to further affect the public’s perception of crime. In other words, presidents link crime with the public’s anxiety about other fearful events as a way to further impact the public’s perception of a problem (and thus further their agenda). This study examines presidential rhetoric on cybercrime to determine if executives link cybercrime with other issues such as national security. The findings provide credibility to both Cavelty’s threat frames approach as well as assertions made regarding the politics of fear. 相似文献
326.
Low participation rates in government assistance programs are a major policy concern in the United States. This paper studies take‐up of Section 8 housing vouchers, a program in which take‐up rates are quite low among interested and eligible households. We link 18,109 households in Chicago that were offered vouchers through a lottery to administrative data and study how baseline employment, earnings, public assistance, arrests, residential location, and children's academic performance predict take‐up. Our analysis finds mixed evidence of whether the most disadvantaged or distressed households face the largest barriers to program participation. We also study the causal impact of peer behavior on take‐up by exploiting idiosyncratic variation in the timing of voucher offers. We find that the probability of lease‐up increases with the number of neighbors who recently received voucher offers. Finally, we explore the policy implications of increasing housing voucher take‐up by applying reweighting methods to existing causal impact estimates of voucher receipt. This analysis suggests that greater utilization of vouchers may lead to larger reductions in labor market activity. Differences in take‐up rates across settings may be important to consider when assessing the external validity of studies identifying the effects of public assistance programs. 相似文献
327.
Information controls are actions intended to deny, disrupt, monitor, or secure information for political ends. They can be implemented using a wide variety of technical and nontechnical means. Political contests over the control of information are heightened around important events, such as major anniversaries, armed conflicts, protests, and elections. In this paper, we offer a comparative case study of online censorship of the circumvention tool Psiphon during the Iranian elections in 2016 and 2013, drawing on unique access to analytics data from Psiphon. We find that the Iranian regime developed its censorship approach in two ways, deploying blocking that was more targeted and strategically timed in the more recent case. Evidence suggests that the regime relaxed censorship of Psiphon during the official campaign period for the 2016 election. The apparent objective of this new approach was to control access to information while minimizing the political consequences of doing so. 相似文献
328.
Liverpool Law Review - Contracts often make provision for the remedies available upon breach, i.e., by providing for a sum or stipulation available to either party upon breach by the other (an... 相似文献
329.
Albrecht Brian C. Hendrickson Joshua R. Salter Alexander William 《Public Choice》2022,192(1-2):169-188
Public Choice - Politics, like any social system, involves selection mechanisms. This paper presents a model of politics as an evolutionary process. Our model yields three main results. First, the... 相似文献
330.