首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   866篇
  免费   35篇
各国政治   35篇
工人农民   61篇
世界政治   99篇
外交国际关系   66篇
法律   416篇
中国政治   8篇
政治理论   209篇
综合类   7篇
  2023年   4篇
  2022年   7篇
  2021年   4篇
  2020年   35篇
  2019年   28篇
  2018年   36篇
  2017年   30篇
  2016年   29篇
  2015年   39篇
  2014年   28篇
  2013年   140篇
  2012年   23篇
  2011年   23篇
  2010年   38篇
  2009年   26篇
  2008年   26篇
  2007年   20篇
  2006年   28篇
  2005年   29篇
  2004年   31篇
  2003年   25篇
  2002年   17篇
  2001年   20篇
  2000年   30篇
  1999年   16篇
  1998年   18篇
  1997年   12篇
  1996年   8篇
  1995年   10篇
  1994年   9篇
  1993年   9篇
  1992年   7篇
  1991年   5篇
  1990年   9篇
  1989年   13篇
  1988年   10篇
  1987年   9篇
  1986年   5篇
  1985年   5篇
  1984年   10篇
  1983年   5篇
  1982年   4篇
  1981年   2篇
  1980年   3篇
  1979年   4篇
  1978年   2篇
  1977年   2篇
  1975年   2篇
  1974年   2篇
  1969年   2篇
排序方式: 共有901条查询结果,搜索用时 15 毫秒
781.
782.
Since 1990 financial frauds have been associated with pseudo-states in thePacific Islands, particularly the Dominion of Melchizedek. The relative success of these schemes can be understood in terms of (i) the general atmosphere of overconfidence about financial dealings that prevailed during the decade to early 2000, (ii) Melchizedek's creation of opportunities for a growing mutually supportive network of fraudsters, (iii) this pseudo-state's identification with a rising global tide of secession and indigenous self-determination through its increasing involvement in a variety ofethnic nationalist movements in Oceania that have been connected with questionable financial dealings, and (iv) the attractiveness of its developing postmodern personality as a libertarian cyber-state. The article concludes by seeing Melchizedek's facilitation of financialfrauds as a challenge to recent libertarian thinking about the law of cyberspace and the anticipated neo-medieval world-system.  相似文献   
783.
784.
Economic Change and Restructuring - We provide new insights into the relationship between foreign investment and the labour productivity of domestic firms in the Vietnamese manufacturing industry....  相似文献   
785.
Abstract

This paper describes a practical courtroom tool that provides insight in face recognition accuracy as a function of distance and illumination. Subjects were shown 3/4 target portraits with an exposition time of 12 seconds, immediately followed by a target-absent or target-present lineup of six full-face portraits. Subjects were asked to identify the target. Seven distances (3 to 40 meter) and nine illumination levels (0.3 to 3000 lux) were used which resulted in a 7?9 matrix, with in the cells a hit score and a false alarm score. From these rough data several other measures were derived, like d-prime, diagnostic value and some idealised scores. The scores represent the upper margins of recognition accuracy with the memory component reduced to a minimum. The results clearly indicate a systematic increase of recognition performance with decreasing distance and increasing illumination. The end result is a practical rule of thumb, the Rule of Fifteen: Even in ideal conditions the desired diagnostic value of 15 is reached at not more than 15 meters, not less than 15 lux.  相似文献   
786.
Research Summary Most analysts of the causes of the contemporary credit crunch have concluded that the supervising agencies failed in their duties. The same is true for studies of several major fraud scandals, including the Madoff affair and the Dutch construction fraud. The remedy seems immediately obvious: more and better regulation and supervision. However, this line of reasoning seems somewhat simplistic by ignoring the question of how illegal activities can remain hidden for many years from supervising agencies, victims, and bystanders. This research article argues that the problem also lies in the successful concealment of illegal activities by the perpetrators and in the presence of silence in their social environment. Policy Implications The cases analyzed in this article suggest that financial misconduct also could be controlled by breaking the conspiracies of silence. The strengthening of supervision is unlikely to be effective without simultaneous efforts to encourage people to speak out and to give them incentives to want to know and to tell the truth.  相似文献   
787.
Two lines of critiques have developed in reference to broken windows theory: (1) Concentrated disadvantage appears to be more intricately linked with disorder than the theory allows for; and (2) There is concern that disorder and crime lack discriminant validity in that people do not actually distinguish between the two. The present study integrated these two perspectives by examining whether concentrated disadvantage—including disorder itself—affects the extent to which people view disorder and crime as separate problems. Multivariate models showed that people who believe their neighborhood to be more disorderly were more likely to make distinctions between disorder and crime. Theoretical recommendations for future tests of broken windows theory are presented and the policy implications for order maintenance policing programs are discussed.  相似文献   
788.
789.
790.
Abstract

Plagiarism is one of the most serious offences in the academic world. It has occurred as long as there have been teachers and students, but the recent growth of the Internet has made the problem much worse. Recent studies indicate that approximately 30% of all students may be plagiarising on every written assignment they complete. The “information technology revolution” is almost always presented as having cataclysmic consequences for education. In post‐secondary circles, perhaps the most commonly apprehended cataclysm is “Internet plagiarism”. Academics at all British universities and colleges can now test students’ work for cheating using the anti‐plagiarism program Turnitin. The program, run by the Joint Information Systems Committee and thought to be the first national system of its kind, offers free advice and a plagiarism detection service to all further education institutions in the UK. This article will try to: first, define exactly what plagiarism is; second, give examples and reports on samples of the new plagiarism detection software; and finally suggest strategies that lecturers can use before turning to the new software.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号