首页 | 官方网站   微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8758篇
  免费   301篇
政治法律   9059篇
  2023年   178篇
  2021年   84篇
  2020年   121篇
  2019年   170篇
  2018年   202篇
  2017年   244篇
  2016年   253篇
  2015年   205篇
  2014年   226篇
  2013年   1030篇
  2012年   270篇
  2011年   248篇
  2010年   222篇
  2009年   236篇
  2008年   255篇
  2007年   255篇
  2006年   251篇
  2005年   238篇
  2004年   255篇
  2003年   242篇
  2002年   217篇
  2001年   248篇
  2000年   245篇
  1999年   191篇
  1998年   121篇
  1997年   104篇
  1996年   85篇
  1995年   99篇
  1994年   100篇
  1993年   103篇
  1992年   134篇
  1991年   135篇
  1990年   137篇
  1989年   133篇
  1988年   109篇
  1987年   116篇
  1986年   132篇
  1985年   152篇
  1984年   117篇
  1983年   115篇
  1982年   88篇
  1981年   79篇
  1980年   73篇
  1979年   65篇
  1978年   73篇
  1975年   65篇
  1974年   76篇
  1973年   71篇
  1972年   50篇
  1969年   48篇
排序方式: 共有9059条查询结果,搜索用时 15 毫秒
1.
Qualitative interviews with one hundred defendants in Dutch criminal cases examine whether perceived procedural justice is a relevant concern for defendants, and, if so, which procedural justice components they refer to. The study provides a point of epistemological departure from the quantitative studies dominating the field, as it assessed which components of procedural justice (if any) respondents put forward themselves rather than asking about predetermined procedural justice components. The large majority of respondents mentioned procedural justice issues themselves, and six components were at the core of their procedural justice perceptions: (1) information on which decisions are based, (2) interpersonal treatment, (3) due consideration, (4) neutrality, (5) voice, and (6) accuracy. Although these procedural justice components largely correspond with the literature, respondents thus mentioned some components more often, and others less often, than the literature would suggest. In particular, neutrality plays an important role in the Dutch legal context examined here.  相似文献   
2.
This article examines the effects of negotiation practices, such as coercion and contract formality, on how suppliers and customers perceived the resulting business relationship. We conducted a purchasing negotiation simulation with students in a classroom setting in which participants competed for resources in a mock supply-chain context. The participants were surveyed at key stages of the ongoing negotiation in order to measure their behaviors as a customer–supplier relationship developed. The data were used to test several hypotheses developed from the marketing and purchasing literature. The hypotheses were analyzed using structural equation modeling.
Results demonstrated that the use of coercive techniques by negotiators during negotiation had a negative effect on satisfaction. In addition, the findings showed that, as expected, negotiators entering a negotiation with a cooperative orientation would tend to avoid the use of coercive practices during negotiation. The cooperative orientation also exhibited an unexpected positive effect on the formalization of the design of the contract between the parties. This study contributes to the current knowledge base focusing on the creation of agreements between companies and will, we hope, encourage the integration of suppliers and customers in an operating context within a supply-chain setting.  相似文献   
3.
Acute myoglobinuria as a fatal complication of heroin addiction   总被引:3,自引:0,他引:3  
A fatal case of myoglobinuria complicating heroin addiction is described. Clinically the patient had no overt symptoms of rhabdomyolysis. Pathologists should be alerted to this rare complication in heroin addicts who die of no apparent cause. The antimyoglobin immunoperoxidase technique is useful in confirming the diagnosis.  相似文献   
4.
Conclusion With the passage of the Administrative Dispute Resolution Act, the stage was set for innovation and change in federal agencies. Now, part way into the five-year life of the Act, a new administration has the potential to encourage even wider use of ADR at the federal level, providing still more examples from which to develop a clearer sense of best practice. Additional funds, both for ACUS and individual agencies, are vital to providing the level of experimentation, innovation, and documentation needed to ensure success.MIT ProfessorLawrence E. Susskind is director of the MIT-Harvard Public Disputes Program, 512 Pound Hall, Harvard Law School, Cambridge, Mass. 02138.Eileen F. Babbitt is associate director of the Public Disputes Program.Phyllis N. Segal is a practicing mediator with Endispute, Incorporated.The authors would like to acknowledge the federal dispute resolution specialists who contributed greatly to our work by providing interviews and materials for this article: Cathy Costantino of FDIC; David Batson of EPA; John Settle and Ron Walczak of HHS; David Drabkin of DLA; Jim Jones of DOL; Sheldon Guttman of FCC; Charles Pou of ACUS; Jeff Domber of GSA; and Diane Liff of DOT.  相似文献   
5.
This research note critically evaluates conventional methods for allocating homicides with an unknown victim/offender relationship to meaningful categories, and it proposes an alternative approach. We argue that conventional methods are based on a problematic assumption, namely, that the missing data mechanism is “ignorable.” As an alternative to these methods, we propose an imputation algorithm derived from a log‐multiplicative model that does not require this assumption. We apply this technique to estimate levels of homicides disaggregated by victim/offender relationship using the Federal Bureau of Investigation's Supplementary Homicide Report (SHR) data for 1996 and 1997, and we compare the resulting estimates with those obtained from the application of conventional procedures. Our results yield a larger proportion of stranger homicides than are obtained from the conventional methods.  相似文献   
6.
A New Use for Practitioners in Teaching Negotiation   总被引:1,自引:1,他引:0  
This article examines the role that practitioners as guest lecturers have traditionally played in the teaching of negotiation. The authors argue that, as seen from the perspective of student learning, this traditional role has not utilized the practitioner's expertise and experience to an optimal degree. Because of this, they have redesigned the role of the practitioner as guest lecturer in their negotiation course. They describe this new role in some detail. Their goal is to encourage students to understand how and why integrative negotiation techniques can work beyond the classroom in what students call the "real world."  相似文献   
7.
During the past few decades traditional state‐centred governing arrangements have been critiqued and replaced by alternative modes of governance. Higher education is one of the public sectors where such shifts in governance have been seen. As a consequence of the reshuffling of authority and responsibilities across the different levels in Dutch higher education, universities as organizations have become important foci of attention in the system’s coordination. The main question addressed in this article is to what extent we can speak of an organizational transformation of Dutch universities. Based on conceptual ideas from researchers such as Greenwood and Hinings (1996), Ferlie et al. (1996) , and Brunsson and Sahlin‐Andersson (2000) , we use a framework that focuses attention on the concepts of the construction of identity, hierarchy and rationality to systematically analyse the various aspects of transformations of professional organizations.  相似文献   
8.
Drawing on the strategic surprise, warning-response, and foreign policy literature, this article argues that the September 11 terror attacks should be regarded as a strategic surprise and examines a number of key factors that contributed to vulnerability and inhibited vigilance. Three broad explanatory "cuts" derived from the literature—psychological, bureau-organizational, and agenda-political—are deployed to sift through the rapidly expanding empirical record in an effort to shed light on the processes and contextual factors that left the United States vulnerable to the attacks. The article aims to improve our understanding of generic processes and practices that enhance or detract from vulnerability and vigilance.  相似文献   
9.
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号