全文获取类型
收费全文 | 1440篇 |
免费 | 101篇 |
专业分类
各国政治 | 101篇 |
工人农民 | 81篇 |
世界政治 | 114篇 |
外交国际关系 | 125篇 |
法律 | 635篇 |
中国政治 | 8篇 |
政治理论 | 474篇 |
综合类 | 3篇 |
出版年
2023年 | 16篇 |
2022年 | 12篇 |
2021年 | 19篇 |
2020年 | 46篇 |
2019年 | 57篇 |
2018年 | 74篇 |
2017年 | 94篇 |
2016年 | 88篇 |
2015年 | 50篇 |
2014年 | 75篇 |
2013年 | 241篇 |
2012年 | 55篇 |
2011年 | 57篇 |
2010年 | 62篇 |
2009年 | 67篇 |
2008年 | 53篇 |
2007年 | 48篇 |
2006年 | 37篇 |
2005年 | 38篇 |
2004年 | 34篇 |
2003年 | 39篇 |
2002年 | 42篇 |
2001年 | 25篇 |
2000年 | 30篇 |
1999年 | 23篇 |
1998年 | 15篇 |
1997年 | 21篇 |
1996年 | 10篇 |
1995年 | 9篇 |
1994年 | 5篇 |
1993年 | 9篇 |
1992年 | 12篇 |
1991年 | 6篇 |
1990年 | 5篇 |
1989年 | 7篇 |
1988年 | 4篇 |
1987年 | 5篇 |
1986年 | 3篇 |
1985年 | 7篇 |
1984年 | 4篇 |
1983年 | 6篇 |
1982年 | 3篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1978年 | 2篇 |
1977年 | 4篇 |
1971年 | 2篇 |
1970年 | 2篇 |
1968年 | 2篇 |
1934年 | 1篇 |
排序方式: 共有1541条查询结果,搜索用时 15 毫秒
941.
Matthew P. Dearing 《冲突和恐怖主义研究》2013,36(12):1079-1103
In an era where female suicide terrorism is on the rise in conflict regions such as the Middle East, the North Caucasus, and South Asia, why has Afghanistan been largely immune to this trend? Why do some violent groups use female suicide terrorism and others avoid it? This is a critical question for policy makers and analysts attempting to understand a dangerous terrorist phenomenon and how it may evolve in Afghanistan. During the anti-Soviet jihad, narratives were woven of men and women marching through the mountains of Nuristan to “offer their blood for the Islamic revolution like red tulips at springtime.” But today, women are wholly absent from the Taliban and their jihad in Afghanistan. This article analyzes, in particular, the absence of women in Taliban martyrdom operations. There are three primary findings from this study that explain the low propensity for female suicide bombers in Afghanistan. First, a permissive social and geographic environment in Afghanistan gives insurgents freedom of mobility and a resistance capacity characterized by a reduced necessity for female suicide bombers; second, the capacity of a fiercely conservative culture restricts female participation in both Afghan society and within insurgent organizations; and third, the pronounced absence of a female culture of martyrdom limits women from participation in insurgent actions and narratives. 相似文献
942.
This study sought to identify the extent to which claims about the probable characteristics of offenders in ‘offender profiles’ were based on substantive arguments. Because Toulmin's (1958) philosophy of argument has been demonstrated as a useful way of breaking down arguments into their constituent parts (Burleson, 1979) we examined the extent to which profiles contained grounds, warrants, backing and rebuttals to support or refute various claims about offenders. Twenty-one profiles, representing a range of ‘profiling styles’, were obtained from a variety of sources. All of these had been used in major criminal investigations either in the UK or internationally. Of the nearly 4,000 claims made, nearly 80% were unsubstantiated. That is, they contained no grounds, warrant, backing or rebuttal. Moreover, less than 31% of the claims were falsifiable. We argue that (a) this demonstrates the need for a careful, systematic evaluation of profiling advice (b) Toulmin's structure is one useful method for evaluating such material and for providing a possible framework for such advice. 相似文献
943.
The role of emotional and other affective states as causes and consequences of sexual offending is emerging as an important area for theoretical analysis and for empirical research. In this paper we focus on whether affective and emotional states serve as causal antecedents for sexual offending. Firstly, we identify five sources of evidence relating to whether emotion is causal. We conclude that the evidence broadly supports the notion that a causal relationship exists, at least for some offenders. We then address attempts to identify mechanisms to explain how such effects are mediated. Finally we discuss the implications of this work for therapeutic interventions with sex offenders. 相似文献
944.
One of the more recent developments in historiography has been the emergence of 'new imperial history'. The articles within this special edition of the History of the Family offer examples of how some historians have dealt with the histories of both empires and families. 相似文献
945.
Carmen Corbett Vaneeta Patel Matthew Erikson Caroline Friendship 《Journal of Sexual Aggression》2013,19(1):31-39
The violent reconvictions of a sample of sexual offenders discharged from prison between 1992 and 1996 (who had not been reconvicted of a sexual offence) were examined. The hypothesis was that a proportion of these violent reconvictions would have a sexual motivation. The sample consisted of 104 adult male sexual offenders for whom detailed information regarding their violent reconviction was available. The sample was categorized according to the motivation of the violent reconviction. It was found that a proportion of the violent reconvictions were sexually motivated (12%) and that some of these had resulted from an original charge for a sexual offence. Significant differences were found between the sexual motivation and violent motivation group on the number of criminal history and victim characteristic variables. It was concluded that, in the case of sexual offenders, violent convictions might mask the true motivation of the offence. 相似文献
946.
Eugene L. Wright 《Criminal Justice Studies》2013,26(1):133-138
In response to the 9/11 terrorist attacks and the bus and train bombings in England and Spain that followed, the New York City Police Department (NYPD) developed the ‘Container Inspection Program’ which ‘focuses on backpacks and containers large enough to hold explosives, [and to] ideally discourage subway riders from carrying backpacks and large bags in the subway system’. This paper analyzes the NYPD Container Inspection Program. 相似文献
947.
The shock of war is thought to be closely associated with the growth of the state, in the United States and elsewhere. Yet each proposal to significantly expand state power in the United States since September 11 has been resisted, restrained, or even rejected outright. This outcome—theoretically unexpected and contrary to conventional wisdom—is the result of enduring aspects of America's domestic political structure: the separation of powers at the federal level between three co-equal and overlapping branches, the relative ease with which interest groups access the policy-making process, and the intensity with which executive-branch bureaucracies guard their organizational turf. These persistent aspects of u.s. political life, designed by the nation's founders to impede the concentration of state power, have substantially shaped the means by which contemporary guardians of the American state pursue “homeland security.” War does make the state, but not as it pleases. Theoretical approaches to state building should recognize that domestic political institutions mediate between the international shock of war and domestic state building. 相似文献
948.
Matthew G. Devost Brian K. Houghton Neal Allen Pollard 《Terrorism and Political Violence》2013,25(1):72-83
Information warfare represents a threat to American national security and defense. There are two general methods in which a terrorist might employ an information terrorist attack: (1) when information technology (IT) is a target, and/or (2) when IT is the tool of a larger operation. The first method would target an information system for sabotage, either electronic or physical, thus destroying or disrupting the information system itself and any information infrastructure (e.g., power, communications, etc.) dependent upon it. The second would manipulate and exploit an information system, altering or stealing data, or forcing the system to perform a function for which it was not meant (such as spoofing air traffic control). A perennial dilemma of combating terrorism in a democratic society is finding the right balance between civil liberties and civil security. The special problems associated with IT are examined. The US national security establishment needs to use a flexible, integrated response to counter information terrorists ‐ one which employs information warfare tactics tailored to counter gray‐area phenomena, but which also pools resources from ‘conventional’ counter‐terrorism and law enforcement authorities. 相似文献
949.
950.
Matthew Longo & Ellen Lust 《Democratization》2013,20(2):258-285
This article examines the role of armed parties in democratization. Usually considered volatile and thus excluded from the democratic process, we argue instead that in certain circumstances, armed parties can have a productive role in elections aimed at democratization – most notably by contributing to the balance of power between incumbents and opposition, both before, during and after elections. An in-depth analysis of the 2006 Palestinian elections, placed in comparative context, shows how arms affect the calculus of voters, opposition elites, and incumbents to make elections more competitive and democracy more likely. The article then directly addresses the objection that postponing disarmament fosters civil war, arguing rather that postponing disarmament may actually help promote peaceful, democratic outcomes of states emerging from civil war. It concludes by discussing the implication of the analysis for the study of democratization and for policies aimed at democracy promotion. 相似文献