首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   258篇
  免费   13篇
各国政治   27篇
工人农民   4篇
世界政治   34篇
外交国际关系   17篇
法律   129篇
中国共产党   1篇
政治理论   57篇
综合类   2篇
  2024年   2篇
  2023年   3篇
  2022年   5篇
  2021年   6篇
  2020年   7篇
  2019年   17篇
  2018年   25篇
  2017年   16篇
  2016年   15篇
  2015年   13篇
  2014年   12篇
  2013年   33篇
  2012年   12篇
  2011年   10篇
  2010年   13篇
  2009年   15篇
  2008年   10篇
  2007年   16篇
  2006年   8篇
  2005年   9篇
  2004年   7篇
  2003年   2篇
  2002年   2篇
  2001年   1篇
  2000年   3篇
  1999年   2篇
  1998年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1987年   1篇
  1978年   1篇
排序方式: 共有271条查询结果,搜索用时 15 毫秒
221.
Questions of dam safety and hazard potential most often do not take center-stage in contestations and articulations concerning large dams. Through a comparative study of two of Europe’s most emblematic dam disasters – Vajont (Italy) and Ribadelago (Spain) – and the ongoing conflict over the safety of the Lower Subansiri Hydroelectric Project in Northeast India, this article argues that the damage caused by dam disasters is often not unavoidable or unforeseen but instead allowed to happen. Our cases show that power relations, economic pressures and profit influence “risky” dam management decisions, often disregarding the vernacular knowledge of concerned communities and silencing critical voices that do not fit dominant narratives of modernization and progress. We posit that an essential requirement for re-politicizing the question of dam safety is to unpack the apolitical notion of “socially constructed disasters,” thinking instead about “capital-driven destructions.” By emphasizing resistance against dam projects and against dominant risk discourses across space and time, this article seeks to underline the legitimacy of past and ongoing struggles surrounding the construction of large dams.  相似文献   
222.
Ecstasy is the name given to a large group of substances known as “club drugs” traded in the form of tablets, powder and liquid that present a varied composition, including mainly 3,4-methylenedioxymethamphetamine (MDMA) and analogous substances, in addition to the growing presence of new psychoactive substances. Based on this, clandestinely produced tablets (“ecstasy tablets”) seized by police in Santa Catarina in the period from 2011 to 2017 were analyzed. During the study period, 3472 seizures occurred, which resulted in total 498,443 tablets seized. Seventy nine substances were identified. In the year 2011, about 90% of the tablets contained MDMA. This number decreased to 66.6% in 2017. On the other hand, there was an increase in the number of tablets that mainly contained synthetic cathinones, as well as tryptamine and piperazine derivatives. Police seizures in the metropolitan region of Florianópolis and on the coast prevailed over the rest of the state.  相似文献   
223.
The elections that took place in Greece and Portugal before and after the intervention of the so-called Troika allow us to examine to what extent the austerity period has affected the nature and style of electoral campaigns, especially in terms of individualisation. Our results show that campaigns in Greece and Portugal were quite different and that Greek candidates supported by the two main parties are more likely to emphasise their role. Yet the short-term impact of the crisis has been negligible, as there have been insignificant shifts in the communicative focus on the personalisation of the agendas and on the means used in the campaign after the intervention of the Troika.  相似文献   
224.
This article tests the empirical relationship between inequality and the protection of personal integrity rights using a cross-national time-series data set for 162 countries for the years 1980–2004. The data comprise measures of land inequality, income inequality, and a combined factor score for personal integrity rights protection, while the analysis controls for additional sets of explanatory variables related to development, political regimes, ethnic composition, and domestic conflict. The analysis shows robust support for the empirical relationship between income inequality and personal integrity rights abuse across the whole sample of countries as well as for distinct subsets, including non-communist countries and non-OECD countries. The hypothesized effect of land inequality is also born out by the data, although its effects are less substantial and less robust across different methods of estimation. Additional variables with explanatory weight include the level of income, democracy, ethnic fragmentation, domestic conflict, and population size. Sensitivity analysis suggests that the results are not due to reverse causation, misspecification or omitted variable bias. The analysis is discussed in the context of inequality and rights abuse in specific country cases and the policy implications of the results are considered in the conclusion.  相似文献   
225.
In this article, we describe a quasi‐experiment in which experienced incarcerated burglars (n = 56), other offenders (n = 50), and nonoffenders (n = 55) undertook a mock burglary within a virtual neighborhood. We draw from the cognitive psychology literature on expertise and apply it to offending behavior, demonstrating synergy with rational choice perspectives, yet extending them in several respects. Our principal goal was to carry out the first robust test of expertise in offenders by having these groups undertake a burglary in a fully fledged reenactment of a crime in a virtual environment. Our findings indicate that the virtual environment successfully reinstated the context of the crime showing clear differences in the decision making of burglars compared with other groups in ways commensurate with expertise in other behavioral domains. Specifically, burglars scoped the neighborhood more thoroughly, spent more time in the high‐value areas of the crime scene while traveling less distance there, and targeted different goods from the comparison groups. The level of detail in the data generated sheds new light on the cognitive processes and actions of burglars and how they “learn on the job.” Implications for criminal decision‐making perspectives and psychological theories of expertise are discussed.  相似文献   
226.
The Journal of Technology Transfer - This paper focuses on the entrepreneurial ecosystem as a set of interdependent and coordinated factors in a territory enabling entrepreneurship. To date,...  相似文献   
227.
Sexual dimorphism is a crucial characteristic of skeleton. In the last years, volumetric and surface 3D acquisition systems have enabled anthropologists to assess surfaces and volumes, whose potential still needs to be verified. This article aimed at assessing volume and linear parameters of the first metatarsal bone through 3D acquisition by laser scanning. Sixty‐eight skeletons underwent 3D scan through laser scanner: Seven linear measurements and volume from each bone were assessed. A cutoff value of 13,370 mm3 was found, with an accuracy of 80.8%. Linear measurements outperformed volume: metatarsal length and mediolateral width of base showed higher cross‐validated accuracies (respectively, 82.1% and 79.1%, raising at 83.6% when both of them were included). Further studies are needed to verify the real advantage for sex assessment provided by volume measurements.  相似文献   
228.
229.
230.
This article addresses the problem of international law enforcement within the War on Cyberterrorism. Hybrid conflicts have replaced the traditional ones, and new threats have emerged in cyberspace, which has become a virtual battlefield. Cyber threats - cybercrimes, cyberterrorism, cyberwarfare - are a major concern for Western governments, especially for the United States and the North Atlantic Treaty Organization. The international community has begun to consider cyberattacks as a form of terrorism, to which the same measures apply. Because the term “terrorism” is ambiguous and legaly undefined, there is no consensus on a definition of the derivative term “cyberterrorism”, which is left to the unilateral interpretations of states. Pretending to consider the cyberspace domain as traditional domains, and claiming to apply IHL for the sole purpose of lawfully using armed forces in contrast to cyberterrorism is a stretch. This paper addresses the question of whether or not current laws of war and international humanitarian law apply to cyber domain, and gives some recommendations on how to tackle this issue.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号