首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1092篇
  免费   41篇
各国政治   51篇
工人农民   81篇
世界政治   117篇
外交国际关系   82篇
法律   507篇
中国共产党   1篇
中国政治   6篇
政治理论   278篇
综合类   10篇
  2023年   10篇
  2022年   13篇
  2021年   14篇
  2020年   48篇
  2019年   38篇
  2018年   46篇
  2017年   42篇
  2016年   39篇
  2015年   49篇
  2014年   39篇
  2013年   165篇
  2012年   41篇
  2011年   29篇
  2010年   40篇
  2009年   38篇
  2008年   29篇
  2007年   41篇
  2006年   33篇
  2005年   36篇
  2004年   33篇
  2003年   28篇
  2002年   20篇
  2001年   23篇
  2000年   34篇
  1999年   18篇
  1998年   20篇
  1997年   14篇
  1996年   8篇
  1995年   11篇
  1994年   10篇
  1993年   9篇
  1992年   8篇
  1991年   9篇
  1990年   8篇
  1989年   14篇
  1988年   11篇
  1987年   10篇
  1986年   6篇
  1985年   5篇
  1984年   10篇
  1983年   6篇
  1982年   4篇
  1981年   2篇
  1980年   2篇
  1979年   5篇
  1978年   3篇
  1977年   2篇
  1975年   2篇
  1974年   2篇
  1969年   2篇
排序方式: 共有1133条查询结果,搜索用时 78 毫秒
141.
Research has reported that not only characteristics of the perpetrator but also characteristics of the victim influence risk for intimate partner violence (IPV). This would suggest that prevention of repeat abuse could benefit from a focus on both perpetrator and victim characteristics. Knowledge on factors that are within victims' sphere of influence is important because a focus on victim characteristics can help victims to take control of their situations and can thereby empower them. Dynamic victim-related factors are most relevant here as these are factors that can be changed or improved, in contrast to unchangeable static factors. Surprisingly, however, little is known about how victim-related factors affect risk for revictimization of IPV. The current study was conducted among a Dutch sample of 156 female, help-seeking IPV victims. The aim was to examine to what extent prior IPV and, in particular, dynamic victim-related factors influence risk for future IPV. In accordance with the models articulated by Foa, Cascardi, Zoellner and Feeny, we studied how the three key factors from their models-partner violence, victims' psychological difficulties, and victims' resilience-related to risk for IPV revictimization. Results provide support for several key factors (partner violence and victims' psychological difficulties) and, moreover, show which victim-related factors contribute to revictimization risk above and beyond the influence of prior violence committed by a partner against the victim (i.e., victims' prior IPV victimizations). Findings are discussed in terms of recommendations for practice and future research.  相似文献   
142.
Both the number of crime suspects without legal status and the number of irregular or undocumented immigrants held in detention facilities increased substantially in the Netherlands between 1997 and 2003. In this period, the Dutch state increasingly attempted to exclude irregular immigrants from the formal labour market and public provisions. At the same time the registered crime among irregular migrants rose. The ??marginalisation thesis?? asserts that a larger number of migrants have become involved in crime in response to a decrease in conventional life chances. Using police and administrative data, the present study takes four alternative interpretations into consideration based on: 1) reclassification of immigrant statuses by the state and redefinition of the law, 2) criminal migration and cross-border crime, 3) changes in policing, and 4) demographic changes. A combination of factors is found to have caused the rise in crime, but the marginalisation thesis still accounts for at least 28%. These findings accentuate the need for a more thorough discussion on the intended and unintended consequences of border control for immigrant crime.  相似文献   
143.
Abstract

The Russian Revolution is analysed in this paper in the context of a conjuncture dominated by counterrevolution. Beginning with the repression of the 1850s, a process of permanent counterrevolution has become the over-determining trend of social-political history. The Russian Revolution was subject to several distinct aspects of this process. First was external counterrevolution, the attack on it from the outside. Whilst Anglo-America was the main bulwark organising it, the Nazi/fascist counterrevolution and invasion of the USSR was an example of counterrevolution that ran out of control and ended in a defeat in Europe that was only overcome through a long and risky Cold War. Internal counterrevolution affected the Russian Revolution as part of a longer process of adjusting socialist theory to successive defeats. In the Soviet case, Socialism in One Country was the decisive mutation in this respect and must be viewed as the decisive component of the triumph of counterrevolution. After the war, Anglo-America adjusted the counterrevolutionary strategy to surgical excisions of socialist tendencies until the USSR, isolated and ideologically exhausted, collapsed. Even so, several of its legacies continue to be relevant, notably the nationality policy and internationalism. Also, today’s information revolution casts a new light on the Soviet planning experience that must be studied now that capitalism is slipping into a systemic crisis.  相似文献   
144.
The soft law measures that transnational regulatory networks produce have become increasingly important in regulating cross-border market activity. However, domestic agencies vary considerably in terms of the rate by which these soft law measures are adopted, and the ways in which they spread across jurisdictions are not well understood. This article argues that existing theoretical explanations referring to socialization or power dynamics have a specific network-structural pattern associated with them, and that longitudinal network analysis can be used to test their hypothesized effects. In particular, we study the widespread adoption of the International Organization of Securities Commissions’ (IOSCO) Multilateral Memorandum of Understanding (MMoU). Based on a longitudinal dataset (2002–15) of the inter-agency relationships between securities regulators (n = 109), we use Stochastic Actor-Oriented Models (SAOM) to predict the rate at which transnational standards are adopted by domestic agencies. The results indicate that standard adoption is contagious in the network of securities regulators.  相似文献   
145.
146.
We consider an election between two parties that nominate candidates for office. The parties are polarized along a traditional cleavage, but they are also internally divided along a second issue dimension. We introduce a threat of entry from Outsider candidates, who have the prominence and resources to bypass party elites. We consider when voters will turn to Outsiders, and identify the conditions under which Outsiders will enter the election through an established party's nomination process, as opposed to circumventing established parties via a third-party challenge. We further explore when the elites will fail to respond to the threat of Outsider candidates. Our framework highlights how established parties will be especially vulnerable to Outsider primary entry in periods of intense ideological polarization between the parties, and that this vulnerability is especially heightened for the majority party.  相似文献   
147.
In Western European democracies opposition to the European Union is commonly found at the ideological extremes. Yet, the Euroscepticism of radical left-wing and radical right-wing parties has been shown to have distinct roots and manifestations. The article investigates whether these differences are mirrored at the citizen level. Using data from the European Election Study (2009/2014) and the European Social Survey (2008/2012) in 15 West European countries, it is found that left-wing and right-wing citizens not only differ in the object of their Euroscepticism, but also in their motivations for being sceptical of the EU. Left-wing Eurosceptics are dissatisfied with the current functioning of the EU, but do not oppose further European integration per se, while right-wing Eurosceptics categorically reject European integration. Euroscepticism among left-wing citizens is motivated by economic and cultural concerns, whereas for right-wing citizens Euroscepticism is solely anchored in cultural attitudes. These results refine the common ‘horseshoe’ understanding of ideology and Euroscepticism.  相似文献   
148.
This paper critically examines qualitative survey data from 36 Victorian public sector bodies on their perceptions of corruption risks, and strategies to mitigate these risks, as well as the integrity mechanisms in place. The findings indicate that even though corruption does not seem to be prevalent in these bodies it is not on their radar either, though fraud prevention was significantly present. The paper identifies international best practices of integrity management and inculcation of public service ethos in developed countries, and stresses three vital elements or pillars that combine both the ‘values’ and ‘compliance’ based approaches. These pillars are as follows: (1) specific corruption prevention programs and strategies that are additional to but complement existing anti‐fraud programs; (2) targeted anti‐corruption training, both for employees and for the public; and (3) effective leadership engagement and commitment to an ethical culture (Tone at the Top).  相似文献   
149.
Young people who grow up in a violent family context are more vulnerable to become victims of sexual aggression outside the family context. The present study contributes to the understanding of the mechanisms that explain this link among young women by looking at the mediating role of sexual exposure behavior and target vulnerability. Data were used from an online survey among 237 young women aged 16 to 26 (M?=?21.0 years, SD?=?2.75). Experiencing violence from (one of) the parents and to a lesser extent witnessing interparental violence were related to an elevated risk for sexual victimization. Witnessing interparental violence was related to increased target vulnerability but this factor did not mediate the link with sexual victimization. Experiencing parental violence was related to both increased sexual exposure behavior and increased target vulnerability and these factors did mediate the link with sexual victimization.  相似文献   
150.
The present research adopts a multiple informant approach to identify victims and perpetrators of cyberbullying. Similar approaches have been successfully applied in the field of traditional bullying, and they are highly relevant for studying cyberbullying as well. Three informants can provide key perspectives on cyberbullying incidents: victims, perpetrators, and bystanders. To collect data on these actors, all eighth-grade students in 11 secondary schools were invited to participate in a survey. In total 1458 respondents completed peer-nomination questions on cyberbullying involvement. The results indicated that the prevalence of cyberbullying varied depending on the type of informants that was consulted. In addition, limited overlap was observed between the reports of different informants, resulting in different profiles of victims and perpetrators, depending on the informants that identified them. In sum, different informants tended to have divergent views on cyberbullying, which has important implications. It warrants accurate reporting and critical reflection on the sources of data in cyberbullying research. Moreover, it demonstrates the need to study a more diverse set of informants to advance the understanding of cyberbullying and to enhance prevention efforts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号