首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1097篇
  免费   52篇
各国政治   81篇
工人农民   142篇
世界政治   76篇
外交国际关系   44篇
法律   515篇
中国政治   18篇
政治理论   269篇
综合类   4篇
  2023年   4篇
  2022年   10篇
  2021年   18篇
  2020年   30篇
  2019年   43篇
  2018年   55篇
  2017年   56篇
  2016年   61篇
  2015年   28篇
  2014年   37篇
  2013年   170篇
  2012年   46篇
  2011年   41篇
  2010年   25篇
  2009年   37篇
  2008年   35篇
  2007年   45篇
  2006年   35篇
  2005年   31篇
  2004年   24篇
  2003年   30篇
  2002年   39篇
  2001年   21篇
  2000年   21篇
  1999年   16篇
  1998年   15篇
  1997年   21篇
  1996年   13篇
  1995年   16篇
  1994年   7篇
  1993年   11篇
  1992年   11篇
  1991年   5篇
  1990年   10篇
  1989年   7篇
  1988年   11篇
  1987年   6篇
  1986年   10篇
  1985年   8篇
  1984年   8篇
  1983年   6篇
  1982年   4篇
  1981年   3篇
  1979年   2篇
  1978年   2篇
  1977年   3篇
  1975年   2篇
  1973年   2篇
  1971年   2篇
  1969年   3篇
排序方式: 共有1149条查询结果,搜索用时 15 毫秒
151.
152.
The use of the Internet and new technologies now seems to permeate the entire society, affecting every aspect of daily life. Although this change is characterized by undeniable positive aspects, it simultaneously bears a number of risks which are higher especially with respect to the growing number of younger users. In fact, young people, as the most involved in cyber space, are an age group most exposed to the dangers of improper and not aware use of electronic tools. The specific aim of this research was to study unwanted online attentions (UOA) among a sample of Italian students (N?=?585, mean age?=?14.5), identifying UOA as all those behaviors carried out through the Internet and technology to annoy, disturb, offend, humiliate, intimidate, threat, harass, harm or attack others. The online questionnaire investigated the online habits of the students, the presence of UOA and the characteristics of victims and perpetrators, the perception and emotional impact of such conducts, and the victims' possible reactions. The findings offer an estimate of the prevalence of these behaviors in the population of this age group in the area considered. More importantly, the results reveal a very high involvement in technology by the students accompanied by a lack of awareness regarding the risks connected to technology use as well as a low perception of UOA. These results give evidence of the needs in terms of prevention and education instruments in order to improve the system of responses to cybervictimization among young people.  相似文献   
153.
154.
University–industry technology transfer (TT) has become increasingly institutionalized and is supported by numerous reforms and initiatives at the national, regional and university levels. Most countries have implemented a policy mix involving a range of instruments to support the commercialization of research. Still, there is no systematic evidence indicating why the mix of policy instruments differs between countries. This study offers a novel cross-national investigation of the policy mix emphasizing the level of centralization and decentralization of policy instruments. We map and analyze two specific types of public instruments aimed at addressing the so-called funding gap in TT: proof of concept programs (POCs) and university-oriented seed funds (USFs). Based on a survey across 21 European countries, we find that such instruments are widely used but are organized differently depending on the level of implementation of TT practices in the country and the specific type of instrument considered. More precisely, we find a U-shaped relationship between the use of centralized gap-funding instruments and the country’s implementation of TT practices. Moreover, the type of gap-funding instrument (POC or USF) moderates this relationship. We discuss the implications of our findings and suggest that the policy mix of gap-funding instruments evolve with the maturity of the national TT infrastructure.  相似文献   
155.
Bernie Mayer's latest book is an excellent journey into seven key dilemmas in conflict. Mayer devotes a chapter to each of the following dilemmas: Competition and Cooperation, Optimism and Realism, Avoidance and Engagement, Principle and Compromise, Emotions and Logic, Impartiality and Advocacy, and Autonomy and Community. In this review, I suggest that the book is a thorough guide through seemingly diverse and opposing conflict theories. I go through each chapter and detail how Mayer sees these concepts as interwoven instead of oppositional. He walks his readers through what have been thought of as distinctive, even opposing, approaches, theories, and concepts of conflict. The review uses points and quotes from all seven dilemmas to show the depth of Mayer's analysis and the numerous benefits to theorists and practitioners of reading and rereading his book.  相似文献   
156.
157.
158.
159.
160.
Di Gioacchino  Debora  Ginebri  Sergio  Sabani  Laura 《Public Choice》2000,105(3-4):303-321
In cases where policy makers accept ``bribes'' offered by organised lobbies or interestedparties, government decisions can be modelled as a first price menu auction. In this paper we adaptthis structure to model debt repudiation. We considera one-period model in which two generations, parents and children, are present, and debt titles are unevenlydistributed among parents. The government can repaythe debt by a combination of taxes on the children'sincome and on the outstanding debt. We excludeintergenerational conflicts, assuming that the parents'and children's objective is to maximise the utility ofthe family. In this perspective, families make offersthat relate monetary contributions to the taxstructures chosen by the government. On the hypothesisthat all interests are represented, we obtain theresult that the government is indifferent to the taxstructure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号