首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1164篇
  免费   57篇
各国政治   83篇
工人农民   42篇
世界政治   110篇
外交国际关系   104篇
法律   523篇
中国政治   9篇
政治理论   341篇
综合类   9篇
  2023年   8篇
  2022年   5篇
  2021年   15篇
  2020年   22篇
  2019年   26篇
  2018年   50篇
  2017年   51篇
  2016年   43篇
  2015年   32篇
  2014年   45篇
  2013年   183篇
  2012年   23篇
  2011年   37篇
  2010年   25篇
  2009年   34篇
  2008年   40篇
  2007年   60篇
  2006年   60篇
  2005年   26篇
  2004年   31篇
  2003年   32篇
  2002年   35篇
  2001年   25篇
  2000年   27篇
  1999年   27篇
  1998年   22篇
  1997年   21篇
  1996年   10篇
  1995年   17篇
  1994年   11篇
  1993年   17篇
  1992年   21篇
  1991年   17篇
  1990年   7篇
  1988年   7篇
  1987年   5篇
  1986年   6篇
  1985年   11篇
  1984年   10篇
  1983年   6篇
  1982年   6篇
  1980年   7篇
  1979年   5篇
  1978年   5篇
  1976年   6篇
  1975年   4篇
  1972年   4篇
  1971年   5篇
  1969年   4篇
  1966年   6篇
排序方式: 共有1221条查询结果,搜索用时 15 毫秒
1.
2.
Unwanted sexual attention (UWSA) encompasses unsolicited verbal comments, gestures, stares, and other noncontact behaviors made regarding one's sexuality and physical appearance. The present study examined the correlates and impact of such UWSA perpetrated toward girls by family members. The first objective of the study was to explore whether family climate is associated with intrafamilial UWSA. This included looking at three types of dysfunctional parenting styles (unaffectionate, unavailable, and patriarchal) as well as exploring the co-occurrence of UWSA by adult and child relatives. The second objective was to then measure the impact of such intrafamilial UWSA on childhood emotional health, after controlling for parenting style and the experience of more traditional forms of child sexual abuse (CSA). Of the 296 university women (mean age = 19) who participated in the study, 70% (N = 206) reported UWSA from a family member prior to age 18. Whereas each dysfunctional parenting style was related to presence of UWSA, a simultaneous multiple regression analysis indicated that two of the parenting styles, patriarchal and parental unavailability, also predicted frequency of nonphysical UWSA within the family. Presence of UWSA from a child relative was significantly correlated with presence of UWSA from an adult relative. Additionally, a hierarchical multiple regression, entering the three parenting styles simultaneously in the first step, childhood sexual abuse in the second step, and familial UWSA in the last step, indicated that the frequency of UWSA by family members significantly predicted poorer childhood mental health when controlling for the other variables. Overall, results indicate that while the specific parenting styles which co-occur with UWSA may be detrimental in their own right, the impact of UWSA on girls appears to be above and beyond that of either parenting styles or CSA. Clinical implications are discussed.  相似文献   
3.
On appeal, the High Court of Hong Kong affirmed the defendant'sconviction on three charges of attempting to distribute an infringingcopy of a copyright work via a peer-to-peer online file-sharingprogram (BitTorrent).  相似文献   
4.
5.
This article considers the claim in the government's White Paper, Justice for All , to put victims and witnesses at the heart of the criminal justice system and argues that there is an unresolved tension within the paper between instrumentalist crime control concerns and intrinsic concerns for the rights of victims and witnesses. It is argued that many of the proposals now contained in the latest Criminal Justice Bill are so preoccupied with rebalancing the system away from offenders that they risk doing injustice to defendants with little tangible benefit to victims and witnesses in terms of rights and remedies.  相似文献   
6.
7.
This article explores the concept of authorisation in relationto the possible liability of manufacturers and suppliers oftechnology if, and when, their technology is used by purchasersor other users to infringe copyright. Cases over the last 30years brought by copyright owners or holders against the manufacturersand suppliers of technology which has the potential to infringecopyright are examined, as well as the differing copyright lawsin Australia and the United States relating to the authorisationof copyright infringement. The article concludes with a discussionon the current legal approaches to authorisation and on possiblefuture approaches.  相似文献   
8.
9.
We consider the problem of drawing inferences within a legal framework when a person is a suspect for two separate offences. Although we are primarily concerned with scientific evidence the issue inevitably arises as to how that evidence interacts with other, non-scientific evidence. We show that, in this particular context, the evidence can be conveniently classified into three categories that concern, respectively: the first crime only; the second crime only; and evidence that relates to similarities between the two crimes. Two case examples are considered and we consider DNA, fibres and eyewitness evidence. These are viewed from the perspective of a prosecutor who has to decide whether or not to charge a suspect with one or both crimes. Graphical sensivity analyses are presented which have features that are not intuitively obvious.  相似文献   
10.
TTABlog By John L. Welch Archived back to November 2004, USAhttp://www.thettablog.blogspot.com   John L. Welch, an attorney at Foley Hoag LLP, has an excellentblog focusing on the procedures and decisions of the UnitedStates Patent and Trademark Office's (USPTO) Trademark Trialand Appeal Board (TTAB, or Board).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号