首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   44720篇
  免费   1227篇
各国政治   722篇
工人农民   1189篇
世界政治   370篇
外交国际关系   1064篇
法律   13510篇
中国共产党   2416篇
中国政治   6071篇
政治理论   2323篇
综合类   18282篇
  2024年   20篇
  2023年   117篇
  2022年   353篇
  2021年   491篇
  2020年   804篇
  2019年   372篇
  2018年   374篇
  2017年   385篇
  2016年   480篇
  2015年   582篇
  2014年   2187篇
  2013年   2540篇
  2012年   2848篇
  2011年   2974篇
  2010年   2872篇
  2009年   3077篇
  2008年   3324篇
  2007年   3588篇
  2006年   3812篇
  2005年   3656篇
  2004年   3500篇
  2003年   2705篇
  2002年   2108篇
  2001年   1547篇
  2000年   808篇
  1999年   184篇
  1998年   33篇
  1997年   35篇
  1996年   15篇
  1995年   23篇
  1994年   24篇
  1993年   9篇
  1992年   9篇
  1991年   8篇
  1990年   17篇
  1989年   16篇
  1988年   8篇
  1987年   14篇
  1986年   6篇
  1985年   3篇
  1984年   6篇
  1983年   6篇
  1982年   5篇
  1980年   1篇
  1978年   1篇
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
821.
侵权责任与违约责任是两类基本的民事责任。我国《民法通则》专设“民事责任”一章 ,不仅就两类责任的共性问题作出了阐述 ,而且对两类责任分别作出了规定。然而由于民事责任的复杂性 ,民事违法行为性质的多重性 ,使这两类责任常常发生竞合。本文试图通过对一个典型案例的分析 ,揭示违约责任与侵权责任的概念及其构成要件 ,确定侵权责任与违约责任竞合的标准 ,以期对民事立法和司法实践有所贡献。  相似文献   
822.
Based on the limited effectiveness of state laws, and lack of harmonization at international level a number of states started to introduce policies to block access to Internet content and websites deemed illegal which are situated outside their legal jurisdiction. However, blocking policies are not always subject to due process principles, decisions are not necessarily taken by the courts of law, and often administrative bodies or Internet hotlines run by the private sector decide which content or website should be subject to blocking. Therefore, increasingly, the compatibility of blocking action is questioned with regards to the fundamental right of freedom of expression. This article assesses significant developments at the pan-European level with regards to the development, and implementation of Internet content blocking policies. Adaptation of content blocking policies from certain member states of both the European Union and the Council of Europe will be used to assess the nature and implementation of access blocking policies. It will be argued that there could be a breach of Article 10 of the European Convention on Human Rights if blocking measures or filtering tools are used at state level to silence politically motivated speech on the Internet.  相似文献   
823.
Abstract: Tool mark identification relies on the premise that microscopic imperfections on a tool’s working surface are sufficiently unique and faithfully transferred to enable a one‐to‐one association between a tool and the tool marks it creates. This paper presents a study undertaken to assess the validity of this premise. As part of this study sets of striated tool marks were created under different conditions and on different media. The topography of these tool marks was acquired and the degree of similarity between them was quantified using well‐defined metrics. An analysis of the resulting matching and nonmatching similarity distributions shows nearly error‐free identification under most conditions. These results provide substantial support for the validity of the premise of tool mark identification. Because the approach taken in this study relies on a quantifiable similarity metric, the results have greater repeatability and objectivity than those obtained using less precise measures of similarity.  相似文献   
824.
Abstract: Stalking behavior and victim–stalker relationship are often the principal known factors in a stalking case. Thus, they are of great importance when trying to identify factors contributing to stalking duration. The present study aims to identify distinct subgroups of stalking victims based on measures of behavioral stalking dimensions. These victim subgroups, stalking dimensions, and victim–stalker relationship are examined in relation to stalking duration. Using a sample of 137 university students, latent profile analysis (LPA) revealed five distinct victim subgroups based on stalker behavior dimensions: surveillance, low‐profile, social lurker, wide scope, and baseline stalkers. The subgroups were significantly related to stalking duration and explained a considerable amount of the variance along with the stalking dimensions and victim–stalker relationship. Connections to stalking literature and utility of person‐orientated methods in stalking research are discussed.  相似文献   
825.
There are more than half a million children in foster care in the United States. Some of these children are adopted into loving families, but many are considered hard to adopt and never find a permanent family. Research suggests that the outlook for the teens who exit or age out of foster care without a permanent home or a meaningful adult relationship is bleak. They are more likely to face homelessness, joblessness, drug addiction, early pregnancy, mental health problems, and prison time. With such grim statistics, states should explore every possible permanent family resource for youth in foster care. This Note proposes that, in limited circumstances, it is in the best interest of the child to vacate a final order of termination and reinstate parental rights. It calls for states to adopt a model state statute based on the five state statutes currently in place that already allow for the reinstatement of parental rights.  相似文献   
826.
李训虎 《法学研究》2010,(2):156-173
中国的司法实践对证据的证明力表现出异乎寻常的关注,呼唤证明力规则、创造证明力规则并实践证明力规则。然而,当下的证据法学界对证明力规则往往持一种简单化的批判态度,其对于证明力规则的理性总结与学理思考相较于司法实务界倾注的努力不相适应。在以证明力为导向的证据法中,证明力规则的产生是一种必然。在证明力规则问题上,中国证据法学者在理论层面缺乏主体意识,但法律条文以及司法实践却显示了相当程度的主体性并保持了韧性。  相似文献   
827.
NICOLE RAFTER 《犯罪学》2010,48(2):339-355
Two recent American Society of Criminology presidential addresses have identified as a key problem the fact that criminology lacks a history. In this address, I ask why criminology (in contrast to closely related fields) has generated so few studies of its past; I also identify some results of this failure and discuss why intellectual fields need a sense of their origins and development. History molds individual and collective identities; it lays a foundation for sociologies of knowledge; it encourages reflexivity, teaches us where our ideas came from, and gives us a sense of where we are going. To encourage historical work, I propose an overall framework for understanding the evolution of criminology, reaching back to the late eighteenth century and continuing into the present. My overall framework is that of scientific modernism, within which I identify the following three primary phases: exploratory modernism, confident modernism, and agonistic modernism. In conclusion, I suggest ways to stimulate histories of science in the field of criminology.  相似文献   
828.
“微软黑屏事件”引发了众多的社会思考,实质上这是一种滥用软件技术保护措施对于用户计算机信息系统安全的损害行为,此种企业“私力救济”型非法制裁个人用户的行为在过去20年内屡次发生,微软公司的行为只是再一次引发了社会的广泛关注。严重的软件技术保护措施滥用行为具有严重的社会危害性,应当由刑法对其进行评价。对于现行刑法体系下如何应对和制裁软件技术保护措施滥用行为,并从刑法面前人人平等层面上来思考信息资料保护体系上的平等原则,进而思考将滥用软件技术保护措施的行为单独入罪化的可能性,有着现实意义。  相似文献   
829.
《联合国全程或者部分海上国际货物运输合同公约》是国际社会为推进国际货物运输法的统一而作的又一次努力。结合这一统一化运动,分析国际货物运输法统一化的动因、悖论、成果的局限性以及中国在这一过程中所起的作用,并对国际货物运输法统一化给予客观的评价。  相似文献   
830.
在介绍第三方物流的概念的基础上,分析第三方物流经营人的法律身份及制定现代物流特别法的必要性与存在的困难,探讨第三方物流纠纷的处理思路,即依次确定合同的性质,确定第三方物流经营人的法律身份,确定争议适用的法律等,并介绍第三方物流纠纷的解决途径。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号