全文获取类型
收费全文 | 876篇 |
免费 | 68篇 |
专业分类
各国政治 | 29篇 |
工人农民 | 21篇 |
世界政治 | 35篇 |
外交国际关系 | 66篇 |
法律 | 469篇 |
中国共产党 | 7篇 |
中国政治 | 76篇 |
政治理论 | 101篇 |
综合类 | 140篇 |
出版年
2024年 | 4篇 |
2023年 | 22篇 |
2022年 | 32篇 |
2021年 | 51篇 |
2020年 | 60篇 |
2019年 | 41篇 |
2018年 | 61篇 |
2017年 | 41篇 |
2016年 | 32篇 |
2015年 | 30篇 |
2014年 | 69篇 |
2013年 | 90篇 |
2012年 | 78篇 |
2011年 | 34篇 |
2010年 | 33篇 |
2009年 | 36篇 |
2008年 | 55篇 |
2007年 | 35篇 |
2006年 | 26篇 |
2005年 | 29篇 |
2004年 | 12篇 |
2003年 | 18篇 |
2002年 | 13篇 |
2001年 | 14篇 |
2000年 | 7篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1995年 | 1篇 |
1994年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1985年 | 2篇 |
1983年 | 3篇 |
排序方式: 共有944条查询结果,搜索用时 0 毫秒
931.
沈广应 《贵州警官职业学院学报》2014,(2):49-55
我国控辩关系失衡由来已久:规范维度上,立法滞后、保障不力;实证维度上,控方一家独大,辩方权利萎缩;观念维度上,长期权力本位,辩护权倍受歧视。新型控辩关系构建,须从参与、对话、共享三方面入手。其中,参与机制需要从制度上保证辩护人全程、全面、立体化介入诉讼;对话机制源于戴维·伯姆的对话理论,通过控辩对话消除侦控过程的思维碎片化,建立互信、强化协作;信息共享机制源于信息不对称引发的司法寻租,须构建以控方为主、辩方为补充的信息披露义务,让各方在公开透明的司法程序中公平竞技。 相似文献
932.
James C. Howell John J. Wilson Melissa H. Sickmund Nancy J. Hodges Megan Q. Howell 《Juvenile & family court journal》2017,68(4):25-42
Bashing of juvenile justice systems in the United States is commonplace. We wondered if this is justified. As a product of our everyday practice and academic assessment, this article draws attention to salutary developments on several fronts, including reduced confinement, systematic assessment of child risks and needs, including use of structured decision‐making tools, evidence based services, and construction of comprehensive service plans. Our goal is to draw attention to best practices such as these that can lead to further advancements in juvenile justice systems. 相似文献
933.
While interest in using 3D scanning technology for crime scene investigation (CSI) has grown in recent years, a number of barriers still remain that prevent its wide adoption in the criminal justice system. One such barrier comes from the lack of tools that can validate a 3D scan and verify that it has not been manipulated. While a great deal of research has gone into the detection of manipulations for 2D images, the detection of manipulations for 3D scenes has yet to be fully realized.This paper introduces a series of techniques to detect if a 3D point cloud generated from a LiDAR scan has been subsequently manipulated. These techniques exploit fundamental structures inherent in the collection and storage of these types of data. While the proposed techniques are able to detect a number of different types of manipulations, their limitations are also discussed. The goal of this work is to provide a foundation for the creation of a validation toolkit that can ensure 3D scan data is valid and unaltered. 相似文献
934.
Naval power is a crucial element of state power, yet existing naval data sets are limited to a small number of states and ship types. Here we present 147 years of naval data on all the world’s navies from 1865 to 2011. This country-year data set focuses on warships with ship-based weapons capable of using kinetic force to inflict damage on other structures or peoples. After identifying a country’s active naval forces, we create a measure of naval power based on the aggregate tonnage of the active ships. Additionally, we create count variables for ship types such as aircraft carriers or battleships. This article introduces the country-year data, describes variables of interests for use in country-year, dyadic, or systemic studies, and suggests potential questions of interest scholars could explore using the naval power data set. 相似文献
935.
With more and more attention being paid to the employment problem of university students, the employment quality and employment performance evaluation of university graduates has become a hot topic of discussion. As the evaluation of employment quality and employment performance is a multidimensional and comprehensive evaluation and difficult to measure with a single indicator, this paper establishes a set of performance evaluation index system on the basis of taking into account all stakeholders and divides them into two categories: input and output. Finally, a comprehensive evaluation index of employment performance is obtained with the use of the data envelopment analysis model. 相似文献
936.
《国际相互影响》2012,38(4):273-301
Empirical examination of individual-level survey data on national identity, in general, reveals a significant relationship between religious affiliation and an individual's international-policy preferences and that this relationship varies across Protestant denominations. Specifically, we test attitudes toward import and immigration policies, the role of international institutions, and unilateral policy actions. The empirical results indicate that individuals affiliated with conservative Protestant denominations are more likely to support positions on international issues that can be regarded as consistent with the anti-globalist right. We also find evidence of a reinforcing regional effect among conservatives in the south, and differences in the preferences of Baptist and non-Baptist African Americans. 相似文献
937.
俄罗斯电信产业近年来发展迅速,突出表现在移动通信、卫星通信、宽带服务等方面,但同时也出现了增长速度放缓、产业标准不统一、对外开放度下降等问题,尽管如此,俄罗斯志在建设欧亚数字枢纽的雄心未变。 相似文献
938.
A. Schröder K. Lorentzen E. Riiskjaer L.-O. Lundqvist 《The journal of forensic psychiatry & psychology》2016,27(4):551-568
The present study describes the quality of psychiatric care among forensic inpatients in Denmark who answered the Danish version of the Quality in Psychiatric Care–Forensic In-Patient (QPC–FIP) instrument. A sample of 143 patients (response rate 53%) from 25 of the 27 specialized forensic units in Denmark participated in the study. The patients’ ratings of the quality of care were generally high. The highest rating was found for the quality of the secluded environment and the lowest for patient participation in the care. The results showed that several factors influenced the patients’ ratings. Women rated the quality of care lower in comparison to men. Patients living together with someone before admission, patients with a lower level of education, and patients who were better informed regarding their diagnosis, who was the responsible physician, and where to complain rated the quality of care higher. We can recommend the use of the Danish version of the QPC–FIP instrument for measuring and improving the quality of care in forensic inpatient care. 相似文献
939.
Although research on terrorism has grown rapidly in recent years, few scholars have applied criminological theories to the analysis of individual‐level political extremism. Instead, researchers focused on radicalization have drawn primarily from political science and psychology and have overwhelmingly concentrated on violent extremists, leaving little variation in the dependent variable. With the use of a newly available data set, we test whether variables derived from prominent criminological theories are helpful in distinguishing between nonviolent and violent extremists. The results show that variables related to social control (lack of stable employment), social learning (radical peers), psychological perspectives (history of mental illness), and criminal record all have significant effects on participation in violent political extremism and are robust across multiple techniques for imputing missing data. At the same time, other common indicators of social control (e.g., education and marital status) and social learning perspectives (e.g., radical family members) were not significant in the multivariate models. We argue that terrorism research would benefit from including criminology insights and by considering political radicalization as a dynamic, evolving process, much as life‐course criminology treats more common forms of crime. 相似文献
940.
In November 2016, China passed its first Cybersecurity Law, aiming to strengthen cyberspace governance through a number of initiatives, including Internet operator security protection, personal information protection, special protection of critical information infrastructure, local storage of data, and security evaluation for data export. This Article discusses the major concepts and principles of the Cybersecurity Law. It also discusses the tensions and controversies inherent in the law. All in all, the Cybersecurity Law exhibits distinctive Chinese characteristics. It is premised on the concept of cyberspace sovereignty and emphasizes security over free flow of data and freedom of speech. It provides a basic legal framework for cyberspace governance in China, to be supplemented by implementing regulations in years to come. 相似文献