首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1235篇
  免费   45篇
各国政治   72篇
工人农民   36篇
世界政治   78篇
外交国际关系   425篇
法律   222篇
中国共产党   9篇
中国政治   112篇
政治理论   149篇
综合类   177篇
  2024年   7篇
  2023年   3篇
  2022年   5篇
  2021年   17篇
  2020年   39篇
  2019年   67篇
  2018年   63篇
  2017年   75篇
  2016年   65篇
  2015年   41篇
  2014年   67篇
  2013年   355篇
  2012年   49篇
  2011年   35篇
  2010年   21篇
  2009年   48篇
  2008年   43篇
  2007年   39篇
  2006年   39篇
  2005年   53篇
  2004年   46篇
  2003年   46篇
  2002年   31篇
  2001年   14篇
  2000年   4篇
  1998年   2篇
  1997年   2篇
  1996年   1篇
  1988年   2篇
  1985年   1篇
排序方式: 共有1280条查询结果,搜索用时 0 毫秒
871.
The purpose of this paper is threefold. First, it seeks to give expression to the trends of an important debate that has not been formally articulated among anarchist theorists, namely whether or not the concept ‘citizenship’ can be meaningfully salvaged and repurposed. While many anarchist theorists have gestured at such a debate, the dimensions of this discourse have not been clarified. Secondly, in identifying the features of this debate, this paper seeks to show that citizenship can be meaningfully rehabilitated by the anarchist left. And finally, this essay seeks to provide some preliminary reasons why anarchist theories of citizenship may provide a fruitful partnership with theorists of citizenship today, especially those engaging in critical citizenship studies.  相似文献   
872.
873.
The PKK, a violent group seeking secession in southeastern Turkey through the use of terror and guerilla methods, has evolved through different strategic and pragmatic phases in pursuing its goal. Ocalan, the incarcerated leader, classified the PKK's objectives into four deliberate strategic periods and commenced the final period of Strategic Lunge in March 2010 (for establishing de-facto autonomy). To compare these periods to PKK's real evolution, this article reviewed the entire process of the PKK (1973–2012) through analysis of resolutions from PKK congresses/conferences and the characteristics of PKK violence (e.g., target status, incident type/location, form, and purpose). This study argues that as opposed to Ocalan's assessment, PKK moves—particularly after 1994—are based on emergent (ex-post) pragmatic shifts rather than predetermined (ex-ante) strategic plans, as verified by analysis of the nature/form of PKK violence. It also argues that the PKK's pragmatic moves permeated even into its ideology and declared goal. Contrary to Ocalan's four-stage strategic periods, the PKK's initial manifesto indicates a three-stage Maoist strategy for reaching its goal. However, the PKK's military attempt to reach the third stage in 1991 failed due to conditions that were not sufficient for realization of the third stage of Maoist strategy. As a result, the PKK quit pursuing military victory after acknowledging its defeat in 1994; instead, since it still possessed the ability to initiate violence, it strategically employed (and ceased) violence to supplement its campaign of political compromise and negotiation.  相似文献   
874.
Although much has been written about how and why individuals become terrorists, very little research has focused on why individuals choose not to become involved in political violence. Some assume that these non-radicalized individuals simply have not had the same life experiences as terrorists. Yet one only has to explore areas of conflict, such as the Gaza Strip, northwest Pakistan, or the southern Philippines, to wonder why more individuals have not joined local militant groups. This article presents a conceptual model ofnon-radicalization in an attempt to move the discussion forward on this topic. It argues that it is impossible to understand radicalization pathways, or design policies to preempt them, without a complementary knowledge ofwhy individuals resist the influence ofviolent extremism.  相似文献   
875.
解放后、尤其是近些年来在我国几代文物考古工作者的辛勤劳动下,我国高句丽考古的发现与研究取得了很大成果,主要集中于都城、山城、墓葬及出土的遗物几方面。通过这些发现和研究,为我们探讨高句丽的社会历史、文化特点及其与周邻地区、尤其与中原地区的联系提供了重要实物资料。  相似文献   
876.
This study discusses different media strategies followed by the Islamic State in Iraq and Syria (ISIS). In particular, the study attempts to understand the way ISIS’s video game that is called “Salil al-Sawarem” (The Clanging of the Swords) has been received by the online Arab public. The article argues that the goal behind making and releasing the video game was to gain publicity and attract attention to the group, and the general target was young people. The main technique used by ISIS is what I call “troll, flame, and engage.” The results indicate that the majority of comments are against ISIS and its game, though most of the top ten videos are favorable towards the group. The sectarian dimension between Sunnis and Shiites is highly emphasized in the online exchanges, and YouTube remains an active social networking site that is used by ISIS followers and sympathizers to promote the group and recruit others.  相似文献   
877.
While terrorism produces certainty that the ‘other’ intends to do harm, and chronic uncertainty about the potential for terrorist attack, trust requires the negotiation of uncertainty. This paper begins with a review of the existing literature on trust and terrorism, as a point of departure for analysing the usefulness of thinking about trust as the negotiation of uncertainty. The four substantive sections that follow examine the 1981 Hunger strikes, the beginnings of political dialogue, the construction of cross-border institutions, and the potential for developing emotional trust in the Northern Irish context. In each of the areas, the development of a rudimentary trust has hinged on the destabilisation of mutually exclusive identity categories, defined in conflictual opposition to the ‘other’, and the opening of a space for the construction of multiple and overlapping identities and the negotiation between them.  相似文献   
878.
Reflexive approaches not only maintain that representations of danger are socially constructed but also that they relate with political behaviour. Representations of terrorism, for instance, are argued to constitute that danger in distinct ways and thus to make certain counterterror policies possible. This article challenges this popular association of reflexive security studies with constitutive effects. It argues that constitutive argumentation advances an insufficiently tangible argument of effect, and that this conceptual weakness derives from both a problematic foundational social theory and a premature rejection of causation. Drawing on the social theory of Margaret Archer and Roy Bhaskar and a differentiated notion of causation, the article advances a “dialectical causal” framework for the analysis of representations of danger instead. Applying it to contemporary Swiss terrorism politics, the article shows how this framework improves on constitutive argumentation in disentangling the political powers involved in the production and enactment of representations of danger.  相似文献   
879.
880.
Montreal's Summer Olympics in 1976 was a turning point in Olympic history: it was the Games' first highly visible security operation. It was also a transformative moment in the history of security planning in Canada: preparations for the games contributed to shifting the Security Services' focus from communism towards domestic and international terrorism. The following article documents, for the first time, the scope of this operation. It is based on five years of requests and appeals under the federal Access to Information Act, which led to the release of over fifty thousand pages of Royal Canadian Mounted Police documents. I argue that security for the Montreal Olympics was based largely on imagined threats. In addition, I argue that security costs for the Montreal Olympics were high but modest as compared to the overall budget. Nonetheless, Montreal set a precedent for high security costs that have since become the standard for hosting the Olympics. Finally, I argue that the Montreal Olympics had long-term implications for policing in Canada. The scale of the operation produced new resources and inter-agency links that were only made possible as a result of hosting the games.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号