全文获取类型
收费全文 | 44720篇 |
免费 | 1227篇 |
专业分类
各国政治 | 722篇 |
工人农民 | 1189篇 |
世界政治 | 370篇 |
外交国际关系 | 1064篇 |
法律 | 13510篇 |
中国共产党 | 2416篇 |
中国政治 | 6071篇 |
政治理论 | 2323篇 |
综合类 | 18282篇 |
出版年
2024年 | 20篇 |
2023年 | 117篇 |
2022年 | 353篇 |
2021年 | 491篇 |
2020年 | 804篇 |
2019年 | 372篇 |
2018年 | 374篇 |
2017年 | 385篇 |
2016年 | 480篇 |
2015年 | 582篇 |
2014年 | 2187篇 |
2013年 | 2540篇 |
2012年 | 2848篇 |
2011年 | 2974篇 |
2010年 | 2872篇 |
2009年 | 3077篇 |
2008年 | 3324篇 |
2007年 | 3588篇 |
2006年 | 3812篇 |
2005年 | 3656篇 |
2004年 | 3500篇 |
2003年 | 2705篇 |
2002年 | 2108篇 |
2001年 | 1547篇 |
2000年 | 808篇 |
1999年 | 184篇 |
1998年 | 33篇 |
1997年 | 35篇 |
1996年 | 15篇 |
1995年 | 23篇 |
1994年 | 24篇 |
1993年 | 9篇 |
1992年 | 9篇 |
1991年 | 8篇 |
1990年 | 17篇 |
1989年 | 16篇 |
1988年 | 8篇 |
1987年 | 14篇 |
1986年 | 6篇 |
1985年 | 3篇 |
1984年 | 6篇 |
1983年 | 6篇 |
1982年 | 5篇 |
1980年 | 1篇 |
1978年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 15 毫秒
821.
侵权责任与违约责任是两类基本的民事责任。我国《民法通则》专设“民事责任”一章 ,不仅就两类责任的共性问题作出了阐述 ,而且对两类责任分别作出了规定。然而由于民事责任的复杂性 ,民事违法行为性质的多重性 ,使这两类责任常常发生竞合。本文试图通过对一个典型案例的分析 ,揭示违约责任与侵权责任的概念及其构成要件 ,确定侵权责任与违约责任竞合的标准 ,以期对民事立法和司法实践有所贡献。 相似文献
822.
Based on the limited effectiveness of state laws, and lack of harmonization at international level a number of states started to introduce policies to block access to Internet content and websites deemed illegal which are situated outside their legal jurisdiction. However, blocking policies are not always subject to due process principles, decisions are not necessarily taken by the courts of law, and often administrative bodies or Internet hotlines run by the private sector decide which content or website should be subject to blocking. Therefore, increasingly, the compatibility of blocking action is questioned with regards to the fundamental right of freedom of expression. This article assesses significant developments at the pan-European level with regards to the development, and implementation of Internet content blocking policies. Adaptation of content blocking policies from certain member states of both the European Union and the Council of Europe will be used to assess the nature and implementation of access blocking policies. It will be argued that there could be a breach of Article 10 of the European Convention on Human Rights if blocking measures or filtering tools are used at state level to silence politically motivated speech on the Internet. 相似文献
823.
Benjamin Bachrach Ph.D. Anurag Jain M.S. Sung Jung M.S. Robert D. Koons Ph.D. 《Journal of forensic sciences》2010,55(2):348-357
Abstract: Tool mark identification relies on the premise that microscopic imperfections on a tool’s working surface are sufficiently unique and faithfully transferred to enable a one‐to‐one association between a tool and the tool marks it creates. This paper presents a study undertaken to assess the validity of this premise. As part of this study sets of striated tool marks were created under different conditions and on different media. The topography of these tool marks was acquired and the degree of similarity between them was quantified using well‐defined metrics. An analysis of the resulting matching and nonmatching similarity distributions shows nearly error‐free identification under most conditions. These results provide substantial support for the validity of the premise of tool mark identification. Because the approach taken in this study relies on a quantifiable similarity metric, the results have greater repeatability and objectivity than those obtained using less precise measures of similarity. 相似文献
824.
Katja Björklund Ph.D. Helinä Häkkänen‐Nyholm Ph.D. Lorraine Sheridan Ph.D. Karl Roberts Ph.D. Asko Tolvanen Ph.D. 《Journal of forensic sciences》2010,55(4):1008-1014
Abstract: Stalking behavior and victim–stalker relationship are often the principal known factors in a stalking case. Thus, they are of great importance when trying to identify factors contributing to stalking duration. The present study aims to identify distinct subgroups of stalking victims based on measures of behavioral stalking dimensions. These victim subgroups, stalking dimensions, and victim–stalker relationship are examined in relation to stalking duration. Using a sample of 137 university students, latent profile analysis (LPA) revealed five distinct victim subgroups based on stalker behavior dimensions: surveillance, low‐profile, social lurker, wide scope, and baseline stalkers. The subgroups were significantly related to stalking duration and explained a considerable amount of the variance along with the stalking dimensions and victim–stalker relationship. Connections to stalking literature and utility of person‐orientated methods in stalking research are discussed. 相似文献
825.
Randi J. O'Donnell 《Family Court Review》2010,48(2):362-379
There are more than half a million children in foster care in the United States. Some of these children are adopted into loving families, but many are considered hard to adopt and never find a permanent family. Research suggests that the outlook for the teens who exit or age out of foster care without a permanent home or a meaningful adult relationship is bleak. They are more likely to face homelessness, joblessness, drug addiction, early pregnancy, mental health problems, and prison time. With such grim statistics, states should explore every possible permanent family resource for youth in foster care. This Note proposes that, in limited circumstances, it is in the best interest of the child to vacate a final order of termination and reinstate parental rights. It calls for states to adopt a model state statute based on the five state statutes currently in place that already allow for the reinstatement of parental rights. 相似文献
826.
827.
NICOLE RAFTER 《犯罪学》2010,48(2):339-355
Two recent American Society of Criminology presidential addresses have identified as a key problem the fact that criminology lacks a history. In this address, I ask why criminology (in contrast to closely related fields) has generated so few studies of its past; I also identify some results of this failure and discuss why intellectual fields need a sense of their origins and development. History molds individual and collective identities; it lays a foundation for sociologies of knowledge; it encourages reflexivity, teaches us where our ideas came from, and gives us a sense of where we are going. To encourage historical work, I propose an overall framework for understanding the evolution of criminology, reaching back to the late eighteenth century and continuing into the present. My overall framework is that of scientific modernism, within which I identify the following three primary phases: exploratory modernism, confident modernism, and agonistic modernism. In conclusion, I suggest ways to stimulate histories of science in the field of criminology. 相似文献
828.
“微软黑屏事件”引发了众多的社会思考,实质上这是一种滥用软件技术保护措施对于用户计算机信息系统安全的损害行为,此种企业“私力救济”型非法制裁个人用户的行为在过去20年内屡次发生,微软公司的行为只是再一次引发了社会的广泛关注。严重的软件技术保护措施滥用行为具有严重的社会危害性,应当由刑法对其进行评价。对于现行刑法体系下如何应对和制裁软件技术保护措施滥用行为,并从刑法面前人人平等层面上来思考信息资料保护体系上的平等原则,进而思考将滥用软件技术保护措施的行为单独入罪化的可能性,有着现实意义。 相似文献
829.
《联合国全程或者部分海上国际货物运输合同公约》是国际社会为推进国际货物运输法的统一而作的又一次努力。结合这一统一化运动,分析国际货物运输法统一化的动因、悖论、成果的局限性以及中国在这一过程中所起的作用,并对国际货物运输法统一化给予客观的评价。 相似文献
830.
在介绍第三方物流的概念的基础上,分析第三方物流经营人的法律身份及制定现代物流特别法的必要性与存在的困难,探讨第三方物流纠纷的处理思路,即依次确定合同的性质,确定第三方物流经营人的法律身份,确定争议适用的法律等,并介绍第三方物流纠纷的解决途径。 相似文献