全文获取类型
收费全文 | 975篇 |
免费 | 34篇 |
专业分类
各国政治 | 149篇 |
工人农民 | 44篇 |
世界政治 | 85篇 |
外交国际关系 | 131篇 |
法律 | 184篇 |
中国共产党 | 32篇 |
中国政治 | 53篇 |
政治理论 | 102篇 |
综合类 | 229篇 |
出版年
2023年 | 8篇 |
2022年 | 3篇 |
2021年 | 6篇 |
2020年 | 36篇 |
2019年 | 30篇 |
2018年 | 40篇 |
2017年 | 50篇 |
2016年 | 34篇 |
2015年 | 47篇 |
2014年 | 35篇 |
2013年 | 147篇 |
2012年 | 60篇 |
2011年 | 54篇 |
2010年 | 65篇 |
2009年 | 45篇 |
2008年 | 42篇 |
2007年 | 50篇 |
2006年 | 47篇 |
2005年 | 62篇 |
2004年 | 32篇 |
2003年 | 40篇 |
2002年 | 30篇 |
2001年 | 20篇 |
2000年 | 18篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1995年 | 1篇 |
1991年 | 1篇 |
1985年 | 1篇 |
排序方式: 共有1009条查询结果,搜索用时 15 毫秒
981.
Reviewed by Raffaello Pantucci 《Terrorism and Political Violence》2013,25(3):474-476
Recent years have witnessed a significant increase in the amount of counterterrorism legislation worldwide. The commonly held assumption behind the adoption of counterterrorism legislation links it to the terrorist threat in a state. However, little research has focused on empirically testing reasons driving states to legislate. This article addresses this void by analyzing the puzzle of why states choose to adopt new terrorism-specific legislation. The article presents empirical analysis of the probability of states to legislate before and after September 11, 2001, and is based on a new database of counterterrorism legislation. The findings reveal that before September 11, state decisions to adopt new legislation correlated with the number of terrorist organizations operating in their territory. Since September 11, however, the most significant predictors for the adoption of new legislation have become the existence of previous counterterrorism legislation and the participation of a state in the War on Terror. 相似文献
982.
杨迪忠 《中共桂林市委党校学报》2013,(3):57-61
2012年以来,灵渠“申遗”备受广西特别是兴安人民的关注,经过共同努力,已经取得了重新进入《中国世界文化遗产预备名单》的阶段性重大成果。《桂林国际旅游胜地建设发展规划纲要》得到国家发改委批复,标志着桂林发展已经上升到国家战略,灵渠申遗也迎来了千载难逢的大好机遇。灵渠“申遗”与桂林国际旅游胜地建设可谓密不可分,相互促进,将会取得多赢效应。 相似文献
983.
China and Japan's policies towards Africa in the 1990s have converged, ostensibly around enhanced economic interaction with the continent based on the premise of integrating the continent into the global economy. At the same time, both countries view Africa as a useful buttress to their respective political and diplomatic goals in the international system. Connected to this and in order to garner support for their agendas, both countries promote themselves as possessing specific pro-South identities. This identity is premised around the notions of ‘non-Westernness’ and, in the case of China, in resistance to the North's hegemony. Yet paradoxically, by pursuing their respective policies in Africa, both states act to further deepen the penetration of the West into Africa. The inherent contradictions in Chinese and Japanese policies towards Africa raises questions as to the long-term viability of the current agendas being pursued by the two countries in Africa. 相似文献
984.
Central Eastern Europe (further CEE) has been thoroughly reconstructed during nearly a quarter of century since the fall of the Berlin wall and the end of the cold war. The CEE countries turned to the West for economic and technological advancement, for political and administrative models as well as for protection. The authors coming from eight different countries look at the place and role of the former member states of the Warsaw Pact in the new European and international constellation. This concept of CEE includes most pro-western states of the former ‘Eastern block’: the four countries of Central Europe (Poland, the Czech Republic, Slovakia and Hungary) and the Baltic states (Lithuania, Latvia and Estonia). There were many tumultuous political developments in and around the region within the last decade, and especially during the last five years when the financial crisis started to take its toll. While the Atlantic link of Central and Eastern Europe is still strong, many commentators have pointed out its wearing strategic meaning. The balance between the focus on the USA and the EU has shifted in favour of Europe. However, this shift has rather been an incomplete one due to the region's own political and economic problems. The aim of this special issue is to analyse the new constellation by looking at the CEE countries themselves, at their ability to react and adapt, produce sound political strategies and act on as national actors: through bilateral ties, regional co-operation, NATO and the EU. Also, the main external actors - the USA, Russia and Germany - are looked at as they directly influence the way how the CEE countries shape their policies. 相似文献
985.
Theodor Tudoroiu 《Contemporary Politics》2013,19(3):304-320
Using the Regional Security Complex Theory and developing its regime-related dimension, this article analyses the involvement of external powers in Arab Spring conflicts. Libya, Syria and Bahrain are used as case studies showing that Western support for the incumbent regime or for its adversaries was not based on a choice between democracy and authoritarianism. Rather, it was motivated by a pattern of amity and enmity inherited from the Cold War period. The surprising survival of this pattern was due to the three authoritarian regimes’ inability to reform; to the ensuing preservation of their Cold War era perception in the West; and to Russia's new availability as an external patron. Consequently, the article argues that the Arab Spring can be perceived as the last, belated episode of the Cold War. However, its political consequences put an end to the last features inherited from the pre-1989 period and open a new Middle Eastern era. 相似文献
986.
《Journal of immigrant & refugee studies》2013,11(3-4):69-82
SUMMARY Caribbean immigrants were among those transfixed by the destruction and human suffering caused by the World Trade Center tragedy. An emergent cliché is that life will never be the same after September 11th. This study explores the issues that impact the health and well-being of English-speaking Caribbean immigrants and challenges social workers to reassess their intervention with immigrant populations in the Post 9/11 era. 相似文献
987.
Jianhua Zhang M.D. Yu Shao M.M. Zhiqiang Qin M.D. Ningguo Liu M.D. Donghua Zou M.D. Ping Huang M.D. Ph.D Yijiu Chen M.D. 《Journal of forensic sciences》2013,58(2):540-543
This case concerns a sudden death of a patient with Chiari I malformation. A 17‐year‐old female was seen unconscious then fell off a motorbike during the vehicle acceleration. The girl was confirmed dead on the way to hospital, being previously asymptomatic and with a clean medical record. Autopsy findings showed an extremely extra‐long cerebellar tonsillar herniation in the left side and unexplained multiple small cavities in cerebral hemispheres. Microscopic findings revealed loss and abnormal migration of the Purkinje cells, as well as capillary congestion in the herniated tonsil. The cause and mechanisms of this sudden death are considered as the cardiopulmonary dysfunction and arrest resulted from compression of the medulla and cervical cord, which was induced by both the positional insult and minor head trauma. In addition, this study stresses the importance of cervical cord examination in the case of unexpected sudden death following road accidents. 相似文献
988.
Ronald W. DeBry Ph.D. Evan S. Wong B.S. Trevor Stamper Ph.D. Clifford Cookman B.S. Gregory A. Dahlem Ph.D. 《Journal of forensic sciences》2013,58(1):73-78
Abstract: Correct species identification is critical when dipteran larvae are used for inference of the postmortem interval. To facilitate DNA‐based identification of forensically important flies of the genus Lucilia in the continental United States, we develop a vouchered reference collection and DNA sequence database. A total of 122 specimens were collected for nine of the 10 species of Lucilia reported to occur in the continental United States. Using the polymerase chain reaction and DNA sequencing, data were obtained for an 1100‐bp region of the mitochondrial gene encoding cytochrome oxidase I (COI). We consider a species suitable for DNA‐based identification if it is exclusively monophyletic in >95% of bootstrap pseudoreplicate phylogenetic analyses. Seven of the nine species meet that criterion. Two species (Lucilia coeruleiviridis and Lucilia mexicana) share COI sequence and cannot be distinguished using our reference database. We conclude that DNA‐based identification is likely to be successful for the other seven species. 相似文献
989.
Mary N. Orgel 《Contemporary Justice Review》2013,16(1):35-45
In this essay, I describe an excursion I made to castle ruins while doing field research on the Spanish anarchist movement. I offer some insights into the processes through which I was able to discover and construct the past in which that castle was built. To do so combined the conventional participant-observer approach used in anthropological research with the Spanish practice of excursionismo , albeit in its radicalized anarchist form. I also relied on the heuristic character of the flaneur that was advocated by culture historian Walter Benjamin. Such an approach allows an observer to linger over historic sites in order to more closely examine what these sites commonly mean, what they mean to some members of the local community, and what else they could mean. Excursionismo is a valuable methodology for rescuing the personal as well as global histories of the past while engaging in what I call "historical loitering with contemporary intent." 相似文献
990.
Over the last twenty years, the prison system, border controls, crime prevention programmes, anti‐terror measures and private security companies have expanded within Europe. This article discusses some of the implications. It will be argued that we are witnessing a paradigmatic shift in the manner in which state‐sanctioned force is employed. The distinction between what is criminal, to be dealt with by the justice system, and what creates a ‘perception of security’—formerly to be dealt with by social policy—is being eroded at both macro‐ (‘war on terror’) and micro‐ (‘public order’) levels. The rule of law is giving way to a security mentality, where force is employed on the basis of risk assessments. Social problems are re‐interpreted as security threats, and met with measures recreating the original threats. This gives the policy field a distinctive rationality of its own. 相似文献