首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1159篇
  免费   82篇
各国政治   87篇
工人农民   53篇
世界政治   94篇
外交国际关系   128篇
法律   493篇
中国政治   5篇
政治理论   380篇
综合类   1篇
  2023年   12篇
  2022年   9篇
  2021年   15篇
  2020年   38篇
  2019年   50篇
  2018年   65篇
  2017年   83篇
  2016年   86篇
  2015年   41篇
  2014年   58篇
  2013年   199篇
  2012年   47篇
  2011年   48篇
  2010年   48篇
  2009年   60篇
  2008年   48篇
  2007年   41篇
  2006年   30篇
  2005年   32篇
  2004年   32篇
  2003年   33篇
  2002年   29篇
  2001年   19篇
  2000年   16篇
  1999年   14篇
  1998年   10篇
  1997年   17篇
  1996年   10篇
  1995年   6篇
  1994年   2篇
  1993年   5篇
  1992年   4篇
  1991年   3篇
  1990年   2篇
  1989年   4篇
  1988年   2篇
  1987年   3篇
  1986年   2篇
  1985年   1篇
  1984年   3篇
  1983年   1篇
  1982年   4篇
  1980年   1篇
  1979年   2篇
  1978年   2篇
  1977年   1篇
  1974年   1篇
  1971年   1篇
  1970年   1篇
排序方式: 共有1241条查询结果,搜索用时 0 毫秒
881.
882.
The United Nations Security Council (UNSC) is the foremost international body responsible for the maintenance of international peace and security. Members vote on issues of global importance and consequently receive perks—election to the UNSC predicts, for instance, World Bank and IMF loans. But who gets elected to the UNSC? Addressing this question empirically is not straightforward as it requires a model that allows for discrete choices at the regional and international levels; the former nominates candidates while the latter ratifies them. Using an original multiple discrete choice model to analyze a dataset of 180 elections from 1970 to 2005, we find that UNSC election appears to derive from a compromise between the demands of populous countries to win election more frequently and a norm of giving each country its turn. We also find evidence that richer countries from the developing world win election more often, while involvement in warfare lowers election probability. By contrast, development aid does not predict election.  相似文献   
883.
From which evaluative base should we develop public policies designed to promote wellbeing among different cultural groups in different circumstances? This article attempts to advance an objective, universal theory of cultural evaluation grounded in a eudaemonistic account of human wellbeing. The approach evaluates cultures on the success with which they enable societies to promote the wellbeing of individuals through provision of needs and capabilities within their given, determinate circumstances. This provides the basis for a normative functionalism capable of identifying and explaining cultural deficits.  相似文献   
884.
Starting from the premise that campaigns ought to have informational benefits for voters this study examines the characteristics of Senate electoral campaigns and their ability to facilitate “correct voting” as first described by Lau and Redlawsk (1997) Lau, Richard R. &; Redlawsk, David P. (1997) Voting correctly. American Political Science Review, 91(3), pp. 585599. doi: 10.2307/2952076[Crossref], [Web of Science ®] [Google Scholar]. Here, the political values and beliefs of voters are measured from the 1990 and 1992 Senate Election Studies to assess how far such beliefs match to their state's Senate candidates. The variation within Senate campaigns allows for a wider range of hypotheses to be tested about the conditions under which voting correctly occurs compared with prior studies that have focused on presidential elections. The findings are important in that they show a lower incidence of correct voting in Senate elections than in presidential races. However, this is moderated by individual knowledge, ideological sophistication, and a higher level of campaign intensity, all of which increase correct voting. The implications lend support to the normative value of campaigns in American politics.  相似文献   
885.
Information warfare represents a threat to American national security and defense. There are two general methods in which a terrorist might employ an information terrorist attack: (1) when information technology (IT) is a target, and/or (2) when IT is the tool of a larger operation. The first method would target an information system for sabotage, either electronic or physical, thus destroying or disrupting the information system itself and any information infrastructure (e.g., power, communications, etc.) dependent upon it. The second would manipulate and exploit an information system, altering or stealing data, or forcing the system to perform a function for which it was not meant (such as spoofing air traffic control). A perennial dilemma of combating terrorism in a democratic society is finding the right balance between civil liberties and civil security. The special problems associated with IT are examined. The US national security establishment needs to use a flexible, integrated response to counter information terrorists ‐ one which employs information warfare tactics tailored to counter gray‐area phenomena, but which also pools resources from ‘conventional’ counter‐terrorism and law enforcement authorities.  相似文献   
886.

Foreign Relations of the United States, 1964–1968, vol. XXX, China (United States Government Printing Office: Washington, 1998).  相似文献   
887.
The shock of war is thought to be closely associated with the growth of the state, in the United States and elsewhere. Yet each proposal to significantly expand state power in the United States since September 11 has been resisted, restrained, or even rejected outright. This outcome—theoretically unexpected and contrary to conventional wisdom—is the result of enduring aspects of America's domestic political structure: the separation of powers at the federal level between three co-equal and overlapping branches, the relative ease with which interest groups access the policy-making process, and the intensity with which executive-branch bureaucracies guard their organizational turf. These persistent aspects of u.s. political life, designed by the nation's founders to impede the concentration of state power, have substantially shaped the means by which contemporary guardians of the American state pursue “homeland security.” War does make the state, but not as it pleases. Theoretical approaches to state building should recognize that domestic political institutions mediate between the international shock of war and domestic state building.  相似文献   
888.

The delicate security balance in the Taiwan Strait is threatened on several fronts. In Taiwan, democratization has placed Taiwan independence as one of the most salient issues in its domestic politics, and the rise of the pro-independence Democratic Progressive Party to power has created uncertainty regarding Taiwan's future policy on the Taiwan independence-unification issue. In this paper, we investigate whether external factors such as China's military threat and the United States' security commitment to Taiwan can affect the development of the Taiwan independence movement. An interesting finding from our analysis is approximately one-third of the people in Taiwan can agree simultaneously on two seemingly contradictory issues: to unite with China if China becomes democratic and to declare independence if China will not use force and peace can be maintained. Voters in Taiwan with conditional preferences create opportunities for China and the United States to formulate foreign policy that will restrain Taiwan's drive toward independence.  相似文献   
889.
In an era where female suicide terrorism is on the rise in conflict regions such as the Middle East, the North Caucasus, and South Asia, why has Afghanistan been largely immune to this trend? Why do some violent groups use female suicide terrorism and others avoid it? This is a critical question for policy makers and analysts attempting to understand a dangerous terrorist phenomenon and how it may evolve in Afghanistan. During the anti-Soviet jihad, narratives were woven of men and women marching through the mountains of Nuristan to “offer their blood for the Islamic revolution like red tulips at springtime.” But today, women are wholly absent from the Taliban and their jihad in Afghanistan. This article analyzes, in particular, the absence of women in Taliban martyrdom operations. There are three primary findings from this study that explain the low propensity for female suicide bombers in Afghanistan. First, a permissive social and geographic environment in Afghanistan gives insurgents freedom of mobility and a resistance capacity characterized by a reduced necessity for female suicide bombers; second, the capacity of a fiercely conservative culture restricts female participation in both Afghan society and within insurgent organizations; and third, the pronounced absence of a female culture of martyrdom limits women from participation in insurgent actions and narratives.  相似文献   
890.
Scholars of political communication have long examined newsworthiness by focusing on the news choices of media organizations (Lewin, 1947 Lewin, K. 1947. Frontiers and group dynamics. Human Relations, 1: 143153. [Crossref], [Web of Science ®] [Google Scholar]; White, 1950 White, D. M. 1950. The “gate keeper”: A case study in the selection of news. Journalism Quarterly, 27: 383390. [Web of Science ®] [Google Scholar]; Sigal, 1973 Sigal, L. V. 1973. Reporters and officials, Lexington, MA: Heath.  [Google Scholar]; Gans, 1979 Gans, H. J. 1979. Deciding what's news, New York: Vintage Books.  [Google Scholar]). However, in recent years these traditional arbiters of the news have increasingly been joined or even supplanted in affecting the public agenda by “new media” competitors, including cable news, talk radio, and even amateur bloggers. The standards by which this new class of decision makers evaluates news are at best only partially explained by prior studies focused on professional journalists and organizations. In this study, we seek to correct this oversight by content analyzing five online news sources—including wire services, cable news, and political blog sites—in order to compare their news judgments in the months prior to, and immediately following, the 2006 midterm election. We collected all stories from Reuters' and AP's “top political news” sections. We then investigated whether a given story was also chosen to appear on each wire's top news page (indicating greater perceived newsworthiness than those that were not chosen) and compared the wires' editorial choices to those of more partisan blogs (from the left: DailyKos.com; from the right: FreeRepublic.com) and cable outlets (FoxNews.com). We find evidence of greater partisan filtering for the latter three Web sources, and relatively greater reliance on traditional newsworthiness criteria for the news wires.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号