全文获取类型
收费全文 | 328篇 |
免费 | 19篇 |
专业分类
各国政治 | 18篇 |
工人农民 | 48篇 |
世界政治 | 37篇 |
外交国际关系 | 16篇 |
法律 | 170篇 |
中国政治 | 3篇 |
政治理论 | 54篇 |
综合类 | 1篇 |
出版年
2023年 | 3篇 |
2022年 | 1篇 |
2020年 | 4篇 |
2019年 | 7篇 |
2018年 | 13篇 |
2017年 | 14篇 |
2016年 | 21篇 |
2015年 | 12篇 |
2014年 | 10篇 |
2013年 | 50篇 |
2012年 | 7篇 |
2011年 | 12篇 |
2010年 | 5篇 |
2009年 | 16篇 |
2008年 | 14篇 |
2007年 | 17篇 |
2006年 | 14篇 |
2005年 | 6篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 7篇 |
2001年 | 12篇 |
2000年 | 6篇 |
1999年 | 6篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 5篇 |
1995年 | 3篇 |
1994年 | 4篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 5篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 4篇 |
1986年 | 2篇 |
1985年 | 2篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 3篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 3篇 |
1976年 | 2篇 |
1975年 | 2篇 |
1974年 | 1篇 |
1973年 | 1篇 |
1968年 | 1篇 |
排序方式: 共有347条查询结果,搜索用时 0 毫秒
41.
Cynthia Chavez Metoyer 《国际研究展望》2001,2(4):401-415
Hurricane Mitch caused unprecedented destruction when it swept through Nicaragua and Honduras in October 1998. Official reports estimated that 3,332 were reported killed or missing and an estimated $1.5 billion damages were caused in Nicaragua alone. Though Mitch did not cause Nicaragua's impoverishment, the severity of its destruction revealed a deeper crisis that has been troubling Nicaragua's economy for over a decade—an economic crisis aggravated by heavy external debts and structural adjustment policies. Using feminist analysis, the case of Nicaragua is explored to consider the effects of natural disasters from a global perspective and to rethink the long-term merits of structural adjustment and foreign aid. 相似文献
42.
Cynthia Onyinyechi Igodo 《Commonwealth Law Bulletin》2018,44(2):227-236
With globalization and the rise of information and communications technology (ICT), the protection of intellectual protection in software and indeed foreign copyright has never been more paramount. The absence of statutory provisions in Nigeria’s main copyright legislation specifically protecting the intellectual protection in software has not helped. This article examines the Court of Appeal’s recent decision dealing with the protection of copyright in Microsoft’s software. The author is of the considered view that the approach adopted by the courts in the case is not in the overall interest of encouraging foreign ICT companies and the protection of foreign copyrights in Nigeria. 相似文献
43.
44.
45.
The concept of integrated care has assumed growing importance on the policy agendas both in England and The Netherlands and elsewhere. It is characterized as health and health care-related social care needed by patients with multi-faceted needs. This article compares policy approaches to integrated care in England and The Netherlands. Differing political strategies and conditions for integrated care correspond to the dissimilarities in the institutional structure and culture of their health care systems. Health care systems are understood as specific national and historical configurations. We review the last decade's relevant policy processes, using the concepts of hierarchy, market and network. The state health care system in England relies mainly on hierarchical steering, thus creating tight network structures for integrated care on the local level. The Netherlands, with its health care system in a public-private mix, has set incentives for voluntary, loosely coupled and partly market-driven cooperation on the local level. Implications for success or failure are mixed in both configurations. Policy recommendations have to be tailored to each systems' characteristics. 相似文献
46.
47.
48.
49.
Donald G. Dutton Cynthia van Ginkel Monica A. Landolt 《Journal of family violence》1996,11(4):411-423
An examination of self-report scales of 160 men and 76 of their partners or former partners found significant correlations between jealousy and abusiveness (for coupled dyads) or intrusiveness (for separated dyads). Jealousy was related to borderline personality and to MCMI-II measures of Post Traumatic Stress Disorder. Rejection sensitivity leading to pathological acts, such as abusiveness and intrusiveness, is seen as originating in early insecure attachment and exposure to shaming experiences. 相似文献
50.
Extending from the organizing crime perspective, we study how legitimate world actors contribute to structuring a criminal network. This focus also underscores the facilitating role that some participants have in criminal settings. Based on a case study of an illegal drug importation network that was monitored by law-enforcement investigators over a two-year period, we find that although most legitimate actors (or non-traffickers) had nominal roles and contributed minimally to the criminal network's structure, a minority of these actors were critical to the network in two ways: (1) they were active in bringing other participants (including traffickers) into the network; and (2) they were influential directors of relationships with both non-traffickers and traffickers. The presence of such influential participants from legitimate occupational settings illustrates how upperworld figures can facilitate criminal enterprise beyond the mere contributions of legitimate status and expertise. 相似文献