全文获取类型
收费全文 | 306篇 |
免费 | 4篇 |
专业分类
各国政治 | 6篇 |
工人农民 | 18篇 |
世界政治 | 23篇 |
外交国际关系 | 15篇 |
法律 | 174篇 |
中国政治 | 2篇 |
政治理论 | 71篇 |
综合类 | 1篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 1篇 |
2019年 | 5篇 |
2018年 | 2篇 |
2017年 | 2篇 |
2016年 | 6篇 |
2015年 | 4篇 |
2014年 | 1篇 |
2013年 | 39篇 |
2012年 | 8篇 |
2011年 | 8篇 |
2010年 | 9篇 |
2009年 | 3篇 |
2008年 | 12篇 |
2007年 | 10篇 |
2006年 | 10篇 |
2005年 | 6篇 |
2004年 | 5篇 |
2003年 | 9篇 |
2002年 | 6篇 |
2001年 | 4篇 |
2000年 | 5篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 5篇 |
1993年 | 6篇 |
1992年 | 5篇 |
1991年 | 7篇 |
1990年 | 6篇 |
1989年 | 6篇 |
1988年 | 13篇 |
1987年 | 14篇 |
1986年 | 5篇 |
1985年 | 5篇 |
1984年 | 11篇 |
1983年 | 6篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 8篇 |
1979年 | 6篇 |
1978年 | 5篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1975年 | 1篇 |
1974年 | 3篇 |
排序方式: 共有310条查询结果,搜索用时 15 毫秒
81.
Lescano CM Brown LK Miller PM Puster KL 《Journal of prevention & intervention in the community》2007,33(1-2):51-62
The purpose of this study was to investigate the relationships among self-efficacy for condom use during distress (SE-Condom Distress), self-efficacy related to general HIV prevention skills (SE-HIV), and HIV risk behaviors, attitudes, and knowledge. Two hundred and twenty two adolescents with psychiatric disorders between 13 and 18 years-old participated. Participants completed measures related to HIV Self-Efficacy, HIV Attitudes, and Sexual Behaviors. Self-efficacy for condom use during distress (SE-Condom Distress) was significantly associated with more HIV protective behaviors. Controlling for observed covariates, SE-Condom Distress was the only variable significantly associated with consistent condom use in a multiple logistic regression (OR=2.43). Self-efficacy regarding condom use during affective arousal is closely associated with HIV-related attitudes and behaviors. Clinicians need to be alert to subtle signs of distress as adolescents contemplate safer sexual behavior. 相似文献
82.
Larry Alexander 《Law and Philosophy》2012,31(2):213-241
In this article I take up a conceptual question: What is the distinction between ‘the law’ and the behavior the law regulates,
or, as I formulate it, the distinction between what is ‘inside’ the law and what is ‘outside’ it? That conceptual question
is in play in (at least) three different doctrinal domains: the constitutional law doctrines regarding the limits on the delegation
of legislative powers; the criminal law doctrines regarding mistakes of law; and the constitutional rights doctrines that
turn on the distinction between state action and the acts of non-state actors. I argue that legal doctrines should turn solely
on normative considerations and should not turn on answers to conceptual questions. However, the doctrines I discuss appear
to turn on the conceptual question regarding what is ‘inside’ and ‘outside’ the law. I show how each of these doctrinal areas
appears to raise this conceptual issue, and I explain how the doctrines might or might not escape being held hostage to conceptual
controversy. 相似文献
83.
84.
85.
86.
Larry Willmore 《发展研究杂志》2013,49(2):314-335
A recursive model of exports and imports of manufactures, in which imports depend in part on exports, is estimated using data for a cross‐section of 17,053 industrial firms. In this sample, 652 firms are foreign‐owned. Explanatory variables include firm size, skill intensity, advertising and other variables in addition to foreign ownership. Foreign ownership has a large, independent effect on both export performance and import propensities, but foreign ownership in itself explains little of the relatively low export/import ratios registered by affiliates of transnationals. 相似文献
87.
The strategic value of new university technology and its impact on exclusivity of licensing transactions: An empirical study 总被引:1,自引:0,他引:1
Commercialization of new university technology within the new product development process is an important tool by which established
firms can expand their innovative capabilities. The strategic importance of the university technology to the firm, however,
can vary considerably. An exclusivity agreement is a useful tool to protect the firm’s investment and help ensure that value
is appropriated through the commercialization process. An empirical study of 66 technology transfer projects in the information
and communications technology industry reveals that licensing transactions are usually secured by some form of exclusivity
agreements when the product innovation enabled by the new university technology is new-to-the-firm or new-to-the-market and
the firm’s perception of the strategic value of the new technologies is high.
相似文献
88.
89.
The World Bank identifies two trends within the internationaltrading system: multilateral negotiations sponsored by GATT/WTObased on evolving rules grounded in non-discrimination, andbilateral and regional negotiations between nations that reducetrade barriers on a reciprocal and preferential basis. Thisarticle asks how we might enhance the global trade policy developmentprocess through interaction and coordination between these twotrade policy development systems. It seeks an understandingof the nature of bilateral trade negotiations so that we cancompare bilateral and WTO-sponsored multilateral processes.In so doing, we can observe how these two systems naturallyinteract thus enabling us to consider how that interaction maybe better designed to enhance the international trade policydevelopment system. After examining current trends in bilateraland regional trade negotiations, this article considers theopportunities and challenges of a two-track system for developingtrade policy by examining bilateral trade negotiations conductedby Australia, Singapore and the United States. The article concludeswith observations that may assist in re-framing the currentdebate over bilateral and multilateral trade negotiations andincludes recommendations for the effective management of a two-tracktrade policy development system. 相似文献
90.
North American police maintain a database to track events and information related to their involvement with the public that contain a series of electronic caution/dependency flags attached to an individual's name for internal communication. To identify persons with mental illness in a police administrative database, an algorithm was developed that was composed of (a) caution/dependency flags, (b) addresses, and (c) key search words indicative of mental illness. Based on the level of confidence of the algorithm, persons with mental illness (PMI) were then assigned to one of three categories: Definite, Probable and Possible PMI. Results for 2000 include the sociodemographic characteristics of PMI and non-PMI in the database. The mean number of contacts, types of interactions, re-involvement with a year, charges and dispositions are described. The algorithm provides a cheap, quick method to identify PMI for North American police. It enables police to monitor the effectiveness of pre-arrest diversion programs and allows researchers to analyze questions of criminalization and mental illness. 相似文献