首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   328篇
  免费   19篇
各国政治   18篇
工人农民   48篇
世界政治   37篇
外交国际关系   16篇
法律   170篇
中国政治   3篇
政治理论   54篇
综合类   1篇
  2023年   3篇
  2022年   1篇
  2020年   4篇
  2019年   7篇
  2018年   13篇
  2017年   14篇
  2016年   21篇
  2015年   12篇
  2014年   10篇
  2013年   50篇
  2012年   7篇
  2011年   12篇
  2010年   5篇
  2009年   16篇
  2008年   14篇
  2007年   17篇
  2006年   14篇
  2005年   6篇
  2004年   8篇
  2003年   6篇
  2002年   7篇
  2001年   12篇
  2000年   6篇
  1999年   6篇
  1998年   5篇
  1997年   4篇
  1996年   5篇
  1995年   3篇
  1994年   4篇
  1993年   3篇
  1992年   3篇
  1991年   5篇
  1990年   2篇
  1989年   2篇
  1988年   4篇
  1987年   4篇
  1986年   2篇
  1985年   2篇
  1984年   3篇
  1983年   3篇
  1982年   2篇
  1981年   3篇
  1980年   3篇
  1979年   4篇
  1978年   3篇
  1976年   2篇
  1975年   2篇
  1974年   1篇
  1973年   1篇
  1968年   1篇
排序方式: 共有347条查询结果,搜索用时 0 毫秒
41.
Hurricane Mitch caused unprecedented destruction when it swept through Nicaragua and Honduras in October 1998. Official reports estimated that 3,332 were reported killed or missing and an estimated $1.5 billion damages were caused in Nicaragua alone. Though Mitch did not cause Nicaragua's impoverishment, the severity of its destruction revealed a deeper crisis that has been troubling Nicaragua's economy for over a decade—an economic crisis aggravated by heavy external debts and structural adjustment policies. Using feminist analysis, the case of Nicaragua is explored to consider the effects of natural disasters from a global perspective and to rethink the long-term merits of structural adjustment and foreign aid.  相似文献   
42.
With globalization and the rise of information and communications technology (ICT), the protection of intellectual protection in software and indeed foreign copyright has never been more paramount. The absence of statutory provisions in Nigeria’s main copyright legislation specifically protecting the intellectual protection in software has not helped. This article examines the Court of Appeal’s recent decision dealing with the protection of copyright in Microsoft’s software. The author is of the considered view that the approach adopted by the courts in the case is not in the overall interest of encouraging foreign ICT companies and the protection of foreign copyrights in Nigeria.  相似文献   
43.
44.
45.
The concept of integrated care has assumed growing importance on the policy agendas both in England and The Netherlands and elsewhere. It is characterized as health and health care-related social care needed by patients with multi-faceted needs. This article compares policy approaches to integrated care in England and The Netherlands. Differing political strategies and conditions for integrated care correspond to the dissimilarities in the institutional structure and culture of their health care systems. Health care systems are understood as specific national and historical configurations. We review the last decade's relevant policy processes, using the concepts of hierarchy, market and network. The state health care system in England relies mainly on hierarchical steering, thus creating tight network structures for integrated care on the local level. The Netherlands, with its health care system in a public-private mix, has set incentives for voluntary, loosely coupled and partly market-driven cooperation on the local level. Implications for success or failure are mixed in both configurations. Policy recommendations have to be tailored to each systems' characteristics.  相似文献   
46.
47.
48.
49.
An examination of self-report scales of 160 men and 76 of their partners or former partners found significant correlations between jealousy and abusiveness (for coupled dyads) or intrusiveness (for separated dyads). Jealousy was related to borderline personality and to MCMI-II measures of Post Traumatic Stress Disorder. Rejection sensitivity leading to pathological acts, such as abusiveness and intrusiveness, is seen as originating in early insecure attachment and exposure to shaming experiences.  相似文献   
50.
Extending from the organizing crime perspective, we study how legitimate world actors contribute to structuring a criminal network. This focus also underscores the facilitating role that some participants have in criminal settings. Based on a case study of an illegal drug importation network that was monitored by law-enforcement investigators over a two-year period, we find that although most legitimate actors (or non-traffickers) had nominal roles and contributed minimally to the criminal network's structure, a minority of these actors were critical to the network in two ways: (1) they were active in bringing other participants (including traffickers) into the network; and (2) they were influential directors of relationships with both non-traffickers and traffickers. The presence of such influential participants from legitimate occupational settings illustrates how upperworld figures can facilitate criminal enterprise beyond the mere contributions of legitimate status and expertise.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号