首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16499篇
  免费   525篇
各国政治   1084篇
工人农民   687篇
世界政治   1284篇
外交国际关系   710篇
法律   9658篇
中国共产党   2篇
中国政治   177篇
政治理论   3286篇
综合类   136篇
  2020年   226篇
  2019年   260篇
  2018年   374篇
  2017年   406篇
  2016年   411篇
  2015年   322篇
  2014年   385篇
  2013年   1980篇
  2012年   403篇
  2011年   489篇
  2010年   385篇
  2009年   387篇
  2008年   441篇
  2007年   423篇
  2006年   435篇
  2005年   361篇
  2004年   384篇
  2003年   414篇
  2002年   306篇
  2001年   606篇
  2000年   560篇
  1999年   488篇
  1998年   238篇
  1997年   180篇
  1996年   181篇
  1995年   165篇
  1994年   184篇
  1993年   168篇
  1992年   273篇
  1991年   300篇
  1990年   289篇
  1989年   269篇
  1988年   294篇
  1987年   308篇
  1986年   304篇
  1985年   282篇
  1984年   266篇
  1983年   265篇
  1982年   170篇
  1981年   154篇
  1980年   147篇
  1979年   216篇
  1978年   164篇
  1977年   132篇
  1976年   119篇
  1975年   134篇
  1974年   131篇
  1973年   132篇
  1972年   107篇
  1971年   113篇
排序方式: 共有10000条查询结果,搜索用时 62 毫秒
1.
2.
ABSTRACT

Since the late 20th century, the federal government has regulated colleges’ and universities’ handling of campus sexual and gender-based violence (CSGBV). Although the arc of history has bent toward establishing greater protections for victims of such violence, new proposed regulation by the U.S. Department of Education under the Trump administration focuses more heavily on ensuring due process rights for students accused of CSGBV. Most recently, in November 2018, U.S. Secretary of Education, Betsy DeVos submitted a proposed rule change to the regulation of Title IX of the Education Amendments of 1972. This article provides the historical context for this most recent proposed federal regulation of CSGBV and discusses the criticism of this proposal that, if it is implemented, students would become less safe in the ivory tower.  相似文献   
3.
ABSTRACT

Copyright is inherently intertwined with the development of technology and none more so than the advent of the Internet and sharing technologies. More recently, social media platforms have become the latest challenge for copyright law and policy. This article builds on the literature that recognises the underlying conflict between copyright and social networking sites (SNSs); namely that the basic implication of copyright is the restriction of copying, whereas the ethos of social networking is the promotion of sharing. In particular, this article focuses on the disparity between the restricted acts of copying and communication to the public under copyright law and the encouragement of sharing on SNS Instagram. In doing so, it contextualises the debate surrounding copyright and social media and provides an understanding of the legal implications of using Instagram. As such this paper analyses (1) the infringement of copyright protected work on Instagram, and (2) the user-agreement and licensing of copyright material on Instagram. This study concludes that the disparity between the principles of copyright and social media lead to confusion and vulnerability of users. Therefore, it is suggested that Instagram should better inform its users of the implications of sharing third-party content as well as the terms of its user agreement. This could be done by implementing a copyright strategy, which includes a notice and takedown system as well as investing in producing educational content for users. Perhaps SNSs, such as Instagram might be more motivated to take steps to recognise intellectual property rights if they were considered Internet Services Provides such as YouTube.  相似文献   
4.
Abstract

This article reports and discusses the results of a study that investigated photographic images of children in five online terrorist magazines to understand the roles of children in these groups. The analysis encompasses issues of Inspire, Dabiq, Jihad Recollections (JR), Azan, and Gaidi Mtanni (GM) from 2009 to 2016. The total number of images was ninety-four. A news value framework was applied that systematically investigated what values the images held that resulted in them being “newsworthy” enough to be published. This article discusses the key findings, which were that Dabiq distinguished different roles for boys and girls, portrayed fierce and prestigious boy child perpetrators, and children flourishing under the caliphate; Inspire and Azan focused on portraying children as victims of Western-backed warfare; GM portrayed children supporting the cause peacefully; and JR contained no re-occurring findings.  相似文献   
5.
Governments are increasingly implementing smart and digital approaches to promoting citizen participation. However, whether online participation platforms are tools that improve inclusivity in citizen participation remains underexplored. To address this gap, this article focuses on the role of recruitment messages and their effect on participation in an online participation platform by gender and age. A field experiment with a neighborhood census sample (N = 6,066) shows that online participation dips for younger and older citizens and is equal among women and men. For the age groups between 60 and 75, differences in the control and intervention recruitment messages significantly impacted participation. These findings can help public managers tailor recruitment strategies to facilitate inclusive participation and represent a first step toward learning what types of messages are effective for whom.  相似文献   
6.
In response to research demonstrating that irrelevant contextual information can bias forensic science analyses, authorities have increasingly urged laboratories to limit analysts' access to irrelevant and potentially biasing information (Dror and Cole (2010) [3]; National Academy of Sciences (2009) [18]; President's Council of Advisors on Science and Technology (2016) [22]; UK Forensic Science Regulator (2015) [26]). However, a great challenge in implementing this reform is determining which information is task-relevant and which is task-irrelevant. In the current study, we surveyed 183 forensic analysts to examine what they consider relevant versus irrelevant in their forensic analyses. Results revealed that analysts generally do not regard information regarding the suspect or victim as essential to their analytic tasks. However, there was significant variability among analysts within and between disciplines. Findings suggest that forensic science disciplines need to agree on what they regard as task-relevant before context management procedures can be properly implemented. The lack of consensus about what is relevant information not only leaves room for biasing information, but also reveals foundational gaps in what analysts consider crucial in forensic decision making.  相似文献   
7.
Abstract

Despite shared historical experience and cultural proximity, the Visegrad group (V4) struggles to institutionalise its cooperation through stable mechanisms ensuring internal cohesion and external credibility. This is especially evident in the field of security and defence, which requires a shared strategic vision, in particular, common norms regarding the legitimate use of military force. While in the 1990s the four countries exhibited solidarity and unity in their collective ambition under the narrative of the ‘Return to Europe’, their general perception of security threats and strategic culture prevents deeper integration into a security community.  相似文献   
8.
9.
ABSTRACT

Many liberals have been immodest in postulating that their own progressive, secular liberalism is the only one that can be justified in public reason. In Liberalism’s Religion, I articulate a more modest theory of liberalism and religion. While I personally endorse progressive secular liberalism, I argue that it is only one of the reasonable conceptions of liberal justice. This liberal modesty has profound, hitherto unnoticed implications for (i) the role of religious arguments in the public sphere, (ii) the legitimacy of religious establishment, and (iii) the justifiability of religious exemptions. In this article, I defend these three claims by providing replies to my critics.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号