首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1235篇
  免费   45篇
各国政治   72篇
工人农民   36篇
世界政治   78篇
外交国际关系   425篇
法律   222篇
中国共产党   9篇
中国政治   112篇
政治理论   149篇
综合类   177篇
  2024年   7篇
  2023年   3篇
  2022年   5篇
  2021年   17篇
  2020年   39篇
  2019年   67篇
  2018年   63篇
  2017年   75篇
  2016年   65篇
  2015年   41篇
  2014年   67篇
  2013年   355篇
  2012年   49篇
  2011年   35篇
  2010年   21篇
  2009年   48篇
  2008年   43篇
  2007年   39篇
  2006年   39篇
  2005年   53篇
  2004年   46篇
  2003年   46篇
  2002年   31篇
  2001年   14篇
  2000年   4篇
  1998年   2篇
  1997年   2篇
  1996年   1篇
  1988年   2篇
  1985年   1篇
排序方式: 共有1280条查询结果,搜索用时 0 毫秒
891.
《Justice Quarterly》2012,29(4):573-595
Despite the centrality of situational variables to crime theories, they remain uncommon in criminology. Based on the hypotheses drawn from the literature on situational determinants of crime, we examine whether aerial hijackings perpetrated by terrorists are situationally distinct from other aerial hijackings. We define terrorist hijackings as those that include threatened or actual use of illegal force or violence to attain a political, economic, religious or social goal through fear, coercion, or intimidation. Other aerial hijackings include those perpetrated for transportation or extortion purposes. Using a newly updated dataset, we examined 1,019 aerial hijackings that occurred around the world from 1948 to 2007, out of which we classified 122 as terrorism. Results provide strong support for the argument that situational factors measuring organizational resources distinguish terrorist from non-terrorist aerial hijackings, and partial support for the argument that situational factors measuring publicity distinguish these events.  相似文献   
892.
Following 9/11, the Department of Homeland Security established the Container Security Initiative (CSI) programme in 2002 in response to the threat from terrorist attacks involving weapons of mass destruction transported by cargo containers. This project establishes the tracking and targeting of ‘high risk’ containers and their subsequent scanning with X‐ray machines before loading onto the U.S. bound ships. To date, 44 of the world's largest ports have agreed to become CSI‐compliant, the majority of which are located in industrialised countries, while developing and least developed countries are under‐represented. CSI‐eligibility requires that ports represent a considerable volume of U.S. bound container traffic and invest in container scanning devices. Every non‐intrusive inspecting device (NII) costs several million dollars while investments in IT and existing infrastructure often triple the compliance costs. Containers originating in a CSI port are expedited through U.S. customs, representing a comparative trade barrier for exporters from non‐CSI ports. Thus, CSI acts as a tool for the U.S. to improve security, while representing a challenge to exporting countries' market access. This article provides an evaluation of the impacts this plan will have on the export competitiveness of developing countries. It reviews the potential benefits this programme offers in terms of improved trade facilitation, as well as proposing recommendations for its expansion to include developing countries. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
893.
集体记忆研究是社会学、历史学、文化人类学的一个重要课题.而近几年来,研究者不断强调人类记忆的社会性特征,重视吸收来自于社会学的记忆研究成果;深刻反思个体心理学对于记忆研究的弊端,积极促进记忆研究的文化转向;主张采纳后现代心理学思想的建构与叙事性观点,勇于借鉴后现代式的研究路径,这些做法促使集体记忆成为心理学界不可忽略的研究主题.目前,在心理学领域内,与集体记忆相关的诸多研究已经逐渐展开,但心理学研究集体记忆也存在着概念解释、方法选择以及具体操作等多方面的挑战.  相似文献   
894.
在中国女性学与高等教育体制接轨的过程中,目前有五种制度化形式已初显端倪,评价它们的优劣现在或许还为时过早。但可以预测的是:中国女性学的建制将来也绝不会按照同一种模式进行,多种建制形式并存的态势可能是中国女性学长期的现实。  相似文献   
895.
Recent tragedies such as Hurricane Katrina, 9/11, and the 2008 Sichuan Earthquake have revealed a need for methods to evaluate and plan for the impact of extreme events on critical infrastructure. In particular, awareness has been raised of the threat that a major disruption will lead to cascading failures that cross boundaries between interdependent infrastructure sectors, greatly magnifying human and economic impacts. To assist in planning for such extreme events, researchers are developing modeling tools to aid in making decisions about how best to protect critical infrastructures. We present some of the capabilities of this modeling approach as well as some of the challenges faced in developing such applications based on our experience with the Critical Infrastructure Protection Decision Support System (CIPDSS) model, developed for use by the Department of Homeland Security. A set of disruptions to road and telecommunication infrastructures is implemented in CIPDSS and the modeled disruptions to the original infrastructure as well as cascading effects on other infrastructure sectors are discussed. These simulations provide insights into the potential of this approach.  相似文献   
896.
An abundant empirical literature on corruption relying on survey research has emerged since the mid‐1990s. The predominant line of inquiry concerns perceptions of corruption with respect to institutions and processes. Another, separate line of inquiry that has enjoyed less attention concerns reports about individuals’ participation in corruption. These two dimensions of corruption, however, are typically conflated, leading to error and confusion. This article explores the relationship between the two and seeks to differentiate the two. Using data at the country and individual levels, analysis shows how the two may be only weakly related to one another – though causality remains unclear – and respond to distinct sets of determinants and generate distinct outcomes. The analysis underlines the need to specify the findings in the literature: that the causes and consequences of corruption relate more to ‘perceived’ corruption rather than actual corruption.  相似文献   
897.
The first ever UK National Security Strategy statement reflect shifts in perspective on the nature of security concerns and the character of risks and threats in an era of globalisation. However, the UK National Security Strategy itself is a major disappointment. It fails as an attempt to conceive of a genuine strategy. It also fails to engage explicitly and fully with key imperatives for UK security policy, such as Islamist terrorism and the emerging power of China. However, the UK National Security Strategy, despite being weak and disappointing, offers important new bearings on where the National Security Strategy and the government's means to security policy should go from here, identifying areas to strengthen and develop national security structures.  相似文献   
898.
进行反恐怖主义研究必须弄清楚恐怖主义的基本范畴,这些基本范畴包括恐怖主义的正当性和概念界定,然而实际情况却是问题丛生。恐怖主义的正当性问题是一个价值判断问题,不同的评价主体由于所处位置及论说语境不同,会作出截然不同的判断。而恐怖主义的概念界定差异则是由不同学科的定义重点不同所导致的,其定义的主要方法包括政治学、语义学和法律学三种方法。关于恐怖主义基本范畴的分析,最终目的还是要归于问题本身的解决。在具体分析恐怖主义时,人们一般习惯于套用“文明冲突论”或“现代性”的范式。这两种理论都有其依据,也有其缺陷,而沟通理性在此之外提供了一条新路径。  相似文献   
899.
威胁我国安全的恐怖主义特点分析   总被引:1,自引:0,他引:1  
恐怖主义对我国的威胁日益突出,对国家安全、社会稳定和人民生命财产安全构成了严重危害。威胁的主要来源,一是国际恐怖势力和极端组织实施的恐怖活动;二是境内外民族分裂势力实施的恐怖活动;三是邪教组织实施的恐怖活动;四是黑社会等严重刑事犯罪组织和其他极端分子实施的恐怖活动。威胁我国安全的恐怖主义除了具有一般恐怖主义的政治性、暴力性、刑事违法性等共同特征以外,还具有主体结构多元、国际背景复杂、宗教色彩浓厚、组织运作联合、方式手段诡秘、发展态势趋强等突出特点。  相似文献   
900.
Throughout U.S. history, the military has played a role in the lives of a large proportion of the U.S. population. However, little research has focused on this topic, particularly in criminology. This study seeks to determine whether military service changes an individual's criminal behavior and/or whether the military provides another setting for the continuation of prior behavior. To address these questions, this study uses Wolfgang's 1945 Philadelphia birth cohort and Shannon's 1949 Racine, Wisconsin birth cohort data sets. Statistical methods were used to account for potential differences in selection and the presence of unobserved heterogeneity. Results suggest that military service reduces later offending in general. However, there is no significant effect of service on later violent behavior.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号