首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   649篇
  免费   28篇
各国政治   39篇
工人农民   26篇
世界政治   54篇
外交国际关系   59篇
法律   297篇
中国政治   7篇
政治理论   193篇
综合类   2篇
  2023年   4篇
  2021年   4篇
  2020年   14篇
  2019年   8篇
  2018年   18篇
  2017年   16篇
  2016年   19篇
  2015年   12篇
  2014年   14篇
  2013年   82篇
  2012年   16篇
  2011年   16篇
  2010年   23篇
  2009年   16篇
  2008年   23篇
  2007年   22篇
  2006年   18篇
  2005年   19篇
  2004年   26篇
  2003年   23篇
  2002年   18篇
  2001年   15篇
  2000年   16篇
  1999年   14篇
  1998年   10篇
  1997年   9篇
  1996年   17篇
  1995年   14篇
  1994年   13篇
  1993年   10篇
  1992年   14篇
  1991年   10篇
  1990年   11篇
  1989年   9篇
  1988年   8篇
  1987年   10篇
  1986年   7篇
  1985年   13篇
  1984年   8篇
  1983年   5篇
  1982年   5篇
  1981年   8篇
  1980年   8篇
  1979年   5篇
  1978年   4篇
  1976年   2篇
  1975年   5篇
  1974年   4篇
  1971年   2篇
  1968年   2篇
排序方式: 共有677条查询结果,搜索用时 15 毫秒
51.
Confidential commercial information is an increasingly valuable commodity and commercial resource which may be inadequately protected by the traditional approach of English criminal law against misappropriation. This paper reviews the nature of the problem and some of the relevant legal issues. Notwithstanding that a global reform of the law in this area is probably not on the cards, the position advocated here is that the direct application of the criminal law is indeed an appropriate vehicle through which to deter the misappropriation of confidential commercial information. However, the scope of any new law must be carefully circumscribed - if it is drawn too wide, the law runs the danger of acting outside of the articulated rationale for criminal liability and endangering other legitimate interests (particularly in the cyberspace context). If it is drawn too narrow, any new law may very well prove ineffective. It is suggested that there are a number of difficulties, both doctrinal and practical, that must be resolved prior to enacting new legislation in this area. Some observations are presented upon the more critical issues for those interested in the implications of law reform in this area for cyberspace.  相似文献   
52.
Two studies were undertaken to examine parental influences on autonomy and identity development. In Study 1, 262 adolescents in seventh and eleventh grades were given Kurtines's autonomy measure, Simmons's identity measure, and Elder's questions regarding the adolescents' perceptions of their parents' autocratic, democratic, or permissive parenting styles. Study 2 was a replication with 168 subjects. Across both studies it was found that sex-role socialization is more influential for automony development than is either level of parental power or age. Both age and father's use of democracy were the most influential variables on identity development.Received Ph.D. from the University of Minnesota. Major interests are adolescent social cognition and social development.Major interests are adolescent social cognition and social development.Major interests are adolescent social cognition and social development.Received Ph.D. from the University of Cincinnati. Major interests are cognitive development and theories of personality.  相似文献   
53.
54.
55.
56.
57.
What We Have Learned About Teaching Multiparty Negotiation   总被引:1,自引:1,他引:0  
This article grows out of our experience teaching an advanced course on multiparty negotiation. The main question underlying the course is: “How can experts in two‐party negotiations make themselves effective multiparty negotiators?” In this article, we describe what and how we taught, what we think worked, and what we decided to change after the first year of teaching.  相似文献   
58.
This article is a contribution to the occasional series dealing with a major book that influenced the author. Previous contributors include Stewart Macaulay, John Griffith, William Twining, Carol Harlow, Geoffrey Bindman, Harry Arthurs, André-Jean Arnaud, Alan Hunt, and Michael Adler.  相似文献   
59.
Intense controversy surrounds the interpretation of national survey and census data on employment trends in rural Java. The analysis of exclusionary labour arrangements developed in this paper helps resolve this controversy. It also sheds light on the mechanisms that underlie different labour arrangements, and the ways in which these mechanisms are connected with wider political and economic forces.  相似文献   
60.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号