首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   273篇
  免费   27篇
各国政治   27篇
工人农民   8篇
世界政治   16篇
外交国际关系   20篇
法律   137篇
中国政治   2篇
政治理论   89篇
综合类   1篇
  2024年   1篇
  2023年   2篇
  2022年   1篇
  2021年   5篇
  2020年   5篇
  2019年   9篇
  2018年   12篇
  2017年   21篇
  2016年   21篇
  2015年   10篇
  2014年   10篇
  2013年   36篇
  2012年   17篇
  2011年   11篇
  2010年   8篇
  2009年   11篇
  2008年   11篇
  2007年   22篇
  2006年   14篇
  2005年   12篇
  2004年   17篇
  2003年   5篇
  2002年   8篇
  2001年   6篇
  2000年   5篇
  1999年   2篇
  1998年   3篇
  1997年   5篇
  1996年   1篇
  1995年   1篇
  1993年   1篇
  1992年   1篇
  1989年   1篇
  1988年   1篇
  1987年   1篇
  1985年   1篇
  1984年   1篇
  1973年   1篇
排序方式: 共有300条查询结果,搜索用时 26 毫秒
291.
Despite the growing awareness of mass marketing fraud (MMF) in the financial abuse of vulnerable older people, little empirical research has been undertaken in this area. This paper is one of the first to consider the perspectives of a range of professionals who work with victims of mass marketing fraud and financial crime. MMF is a growing threat in the financial abuse of older people, and is increasingly recognised as a concern for professionals involved in supporting and safeguarding vulnerable older people. This paper considers the themes emerging from a small exploratory qualitative study into the perspectives of professionals working to safeguard those at risk of MMF and considers some of the complexities involved in tackling MMF. This involves consideration of the techniques used to groom and lure victims in plausible looking frauds, and the factors that serve to reinforce their sustained involvement in such activity.  相似文献   
292.
Since 9/11, several states have initiated military conflicts in the name of fighting terrorism. However, studies indicate that the costs of terrorism are insignificant compared to the damage created by war. This raises the question: Why do states initiate costly wars when the risk posed by terrorism appears marginal? This study presents two explanations. First, we argue that while terrorists frequently fail to achieve their strategic objectives, terrorists can accomplish tactical objectives and may transition to insurgencies by seizing control of pockets of territory. States may respond by initiating preventive wars to stop terrorists from consolidating control over their strategically valuable territories (e.g., resource‐rich areas). Second, rival states may opportunistically exploit terrorist violence by declaring that the government is a “weak state.” This allows rivals to seize portions of the government's territory under the cover of fighting terror. We test these hypotheses using post–Cold War African dyads from 1990 to 2006.  相似文献   
293.
In this article, we are interested in the extent to which federalism is able to deal with peripheral protest through shared rule channels. Shared rule as a key dimension of federal states has not thus far received adequate academic attention. Empirically, we analyse the use of all cantonal initiatives in Switzerland over the past 25 years as a particular instrument of shared rule, subsequently focusing on two peripheral regions with successful regionalist parties, Ticino and Geneva. We find that regionalist parties contribute towards radicalizing peripheral demands in search of attention from the centre. This leads to the mainstreaming of peripheral demands by pulling other parties along. We conclude that shared rule properly designed gives even the most peripheral regions a voice in national decisions, but that regionalist parties may also use shared rule instruments to mobilize their electorate at home to fight their non-regionalist competitors.  相似文献   
294.
The public's approval of Congress is at an all time low. The parties seem to have taken the legislative process hostage for their own electoral gain. Whereas traditional arguments about congressional dysfunction focus on polarized voting coalitions or outputs – particularly legislation – in this article we highlight congressional information processing and how it has changed in this highly partisan era. By coding congressional hearings according to the kind of information on which they focus, we find that members of Congress are receiving one‐sided information to a greater degree and are spending less time learning about potential solutions. We use these results to make numerous recommendations for improving how Congress gathers its information.  相似文献   
295.
The ongoing and almost record‐breaking hiatus in devolved government in Northern Ireland has brought the sustainability of the region's Assembly into sharp focus. As parties in Northern Ireland consider their options for restoring (and possibly reforming) the devolved institutions, this article takes stock of the Northern Ireland Assembly's merits and demerits. It is argued that, amidst the public's understandable exasperation with the current stalemate, it is easy to forget that the Assembly operated for a decade without suspension (2007–2017) and performed some functions reasonably well. This, of course, is not to detract from the institution's serious shortcomings, though it is argued that the worst of these could be mitigated via institutional reform. Crucially, institutional inertia is not an option. Should parties fail to address the need for institutional reform, commentators may well be right to question whether the Assembly is worth restoring.  相似文献   
296.
Republicans hold that people are dominated merely in virtue of others' having unconstrained abilities to frustrate their choices. They argue further that public officials may dominate citizens unless subject to popular control. Critics identify a dilemma. To maintain the possibility of popular control, republicans must attribute to the people an ability to control public officials merely in virtue of the possibility that they might coordinate their actions. But if the possibility of coordination suffices for attributing abilities to groups, then, even in the best case, countless groups will be dominating because it will be possible for their members to coordinate their actions with the aim of frustrating others' choices. We argue the dilemma is apparent only. To make our argument, we present a novel interpretation of the republican concept of domination with the help of a game‐theoretic model that clarifies the significance of collective action problems for republican theory.  相似文献   
297.
298.
We have analyzed the two hypervariable regions HVS-I and HVS-II of 200 Finnish male individuals for forensic purposes. The distribution of the haplotypes within Finland was determined by the geographical knowledge of the donors' maternal ancestors. In our population sample, we identified 135 different mtDNA haplotypes. Different mtDNA sequences were further divided to haplogroups using the EMPOP software. The most common haplogroups were H (40.0%) and U (27.5%). Subgroup U5b, which contains earlier described "Saami motif", consisted majority (65.5%) of the sample in the U haplogroup. Analysis of the mtDNA sequence hypervariable regions I and II showed that the mtDNA diversity within the Finnish population sample was comparable to other European populations and uniformly distributed. This is contrary to the Y-STR "minimal haplotype" diversity, which in Finland is lower than in any of the other European populations studied so far.  相似文献   
299.
Mitochondrial DNA sequences of the control region's two hypervariable regions HVS-I and HVS-II were determined for 213 unrelated west Eurasian individuals from northeast Germany (Mecklenburg). A total of 174 different mtDNA haplotypes were found, 25 of which were shared by more than 1 individual. The most frequent haplotypes were 263G-309.1C-315.1C, found in seven individuals, 263G-309.1C-309.2C-315.1C, found in six individuals and 263G-315.1C, found in five individuals. These sequences are also the most common haplotypes in other published European data sets. The sequence polymorphisms consisting of 150 polymorphic nucleotide positions were compared with other European databases. The genetic diversity and random match probability were calculated. Our results corroborate certain features which are characteristic for west Eurasian mtDNA population samples.  相似文献   
300.
The Military Commissions Act of 2006 represents the United States’most recent effort to establish a forum to try detainees capturedin its ‘Global War on Terrorism’. This article brieflyexplores the Act's use of the term ‘unlawful enemy combatant’to define both subject matter jurisdiction as well as the potentialsource of criminal liability. The article highlights the term'sabsence from the positive law of war as well as confusion overits legal significance in United States domestic law. Examiningthe relationship between status and protections under the lawof war, the authors conclude the Act's use of the term ‘unlawfulenemy combatant’ reflects legal convenience more thanan objective assessment of the existing laws and customs ofwar.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号