首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   143篇
  免费   6篇
各国政治   21篇
工人农民   2篇
世界政治   26篇
外交国际关系   20篇
法律   50篇
政治理论   30篇
  2023年   1篇
  2022年   3篇
  2021年   2篇
  2020年   13篇
  2019年   6篇
  2018年   12篇
  2017年   11篇
  2016年   12篇
  2015年   4篇
  2014年   5篇
  2013年   27篇
  2012年   7篇
  2011年   2篇
  2010年   3篇
  2009年   3篇
  2008年   2篇
  2007年   5篇
  2005年   3篇
  2004年   3篇
  2003年   1篇
  2002年   4篇
  2001年   5篇
  2000年   1篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   1篇
  1991年   3篇
  1990年   1篇
  1988年   3篇
  1987年   2篇
排序方式: 共有149条查询结果,搜索用时 0 毫秒
21.
22.
The global palm oil value chain has grown in complexity; stakeholder relationships and linkages are increasingly shaped by new public and private standards that aim to ameliorate social and environmental costs while harnessing economic gains. Regulatory initiatives in the emerging policy regime complex struggle to resolve sector‐wide structural performance issues: pervasive land conflicts, yield differences between companies and smallholders, and carbon emissions arising from deforestation and peatland conversion. Identifying opportunities for more effective governance of the palm oil value chain and supply landscapes, this paper explores disconnects, complementarities, and antagonisms between public regulations and private standards, looking at the global, national, and subnational policy domains shaping chain actors’ conduct. Greater complementarities have emerged among transnational instruments, but state regulation disconnects persist and antagonisms prevail between national state regulations and transnational private standards. Emerging experimental approaches, particularly at subnational level, aim to improve coordination to both enhance complementarities and resolve disconnects.  相似文献   
23.
With the recent drastic shifts in societies, thinking styles, and most importantly, the degree of online‐and‐offline exposure, it is easy for the young and developing mind to fall prey to radical or extremist ideas. Radical organizations direct their recruiting efforts toward those who have yet to reach adolescence and are incapable of forming well‐informed and educated decisions. Since it is in human nature to target the weak and the vulnerable, these organizations look for dissatisfied, isolated and friendless young people. They are especially allured when these organizations promise to get them all they lack. As there have been incidents recently reported on young students' involvement in terror activities, the study proposes alternatives to prevent them from falling prey to radical thoughts. The proposed alternatives are judged through TOPSIS (Technique of Order Preference Similarity to the Ideal Solution) and the ideal alternative is singled out after mathematical calculation. Out of the five proposed alternatives, the study, through TOPSIS analysis, proposes that parents may be trained to handle their children in order to keep them from radical thoughts. In addition to the ideal alternative, the study also suggests that the government take preventive measures to curb the evil of radicalism.  相似文献   
24.
This paper evaluates the impacts of fiscal consolidation programmes and their composition on the growth rate of national income for Indian economy. More specifically the study tries to address two questions that is, composition of consolidation and its resultant impact on growth rate of income and the relative desirability of alternative sources of deficit financing that is, internal versus external borrowing. The study employed time series data from 1990–1991 to 2017–2018 and used the technique of ordinary least square and generalized method of moments. The study finds that, in long run, fiscal consolidation need not be necessarily recessionary in nature. Moreover, the composition of consolidation was found to have a significant impact. The study could not extend empirical support in favour of back‐loaded (spending financed) consolidation design as has been established for advanced economies. Moreover the study could not establish the negative impacts of revenue funded (both tax and non‐tax) fiscal consolidation on the growth rate of economy. The study documented that it is desirable to target expenditures such as subsidies, transfers and interest payments to infuse more discipline. A judicious mixture of both spending cuts and revenue increase may be a better strategy to consolidate in order to have better returns. The study highlighted that the external source of deficit financing is always costlier against the internal borrowings. The study noted that it is imperative on part of policymakers to shift their focus from quantity to the quality of deficits and the resultant consolidation programmes.  相似文献   
25.
26.
Long regarded as an embodiment of tolerant Islam and peacefully co-existing with modernisation within a multi-ethnic and multi-religious society, Malaysia unexpectedly aroused much attention as a potential breeding ground for Muslim radicals in the aftermath of catalytic events which pitted the West against the Muslim world. Malaysian Muslims are said to be susceptible to Middle Eastern-originated radicalism, as exemplified in interlocking transnational contacts and agendas sowed between increasingly globalised Muslim networks adept in exploiting latest trappings of modernity. This article urges readers to engage in deeper reflection on the local dynamics of Malaysia's Islamisation process, in order to arrive at a more nuanced understanding of challenges posed by politically engaged Muslims in Malaysia. It is argued that, belying the regime's profession of a progressive Islam known as Islam Hadhari, Malaysia under Abdullah Ahmad Badawi's Premiership witnessed an abrupt escalation of inter-religious tension which not only threatened to disrupt communal harmony and nation-building, but also posed a security risk. The origins of such instability could arguably be located to the peculiar manner in which politically-laden Islam is applied by the regime, in particular by its home-nurtured Islamic bureaucracy.  相似文献   
27.
Local Area Agreements (LAAs) are a mechanism for delivering improved outcomes for local people, through recasting governance relationships between central government and localities and between local agencies. This paper assesses the effectiveness of LAAs in reforming these critical relationships, drawing on research carried out in 2004–06 into the round one and two negotiations. These early negotiations highlighted the complexity of ‘central–local relations’; a coherent approach across Whitehall was hampered by differences in departmental culture and in the nature of relationships with local delivery agencies, while the new role for Government Offices was ambiguous. Nevertheless the early LAAs represented a major step forward in terms of local–central relations. Within localities, the process of developing LAAs proved challenging and highlighted governance weaknesses; however in the main participants report that partnerships have been greatly strengthened as a result. These early experiences provided rich learning, and policy has developed significantly since the pilots. At the time this research ended there was not yet any conclusive evidence on the balance of costs and benefits. However, over time LAAs have the potential to bring about a transformation in governance relationships and, in turn, the delivery of services to address cross-cutting outcomes.  相似文献   
28.
29.
This paper investigates whether computer forensic tools (CFTs) can extract complete and credible digital evidence from digital crime scenes in the presence of file system anti-forensic (AF) attacks. The study uses a well-established six stage forensic tool testing methodology based on black-box testing principles to carry out experiments that evaluate four leading CFTs for their potential to combat eleven different file system AF attacks. Results suggest that only a few AF attacks are identified by all the evaluated CFTs, while as most of the attacks considered by the study go unnoticed. These AF attacks exploit basic file system features, can be executed using simple tools, and even attack CFTs to accomplish their task. These results imply that evidences collected by CFTs in digital investigations are not complete and credible in the presence of AF attacks. The study suggests that practitioners and academicians should not absolutely rely on CFTs for evidence extraction from a digital crime scene, highlights the implications of doing so, and makes many recommendations in this regard. The study also points towards immediate and aggressive research efforts that are required in the area of computer forensics to address the pitfalls of CFTs.  相似文献   
30.
The present study aims at understanding the application of Internet of Things (IoT) in online food retailing, influencing purchase frequency of ready‐to‐eat food products. The research is empirical in nature in which an internet based consumer survey was conducted to collect 329 valid responses on PAN India basis. This research comprehensively investigated, shortlisted, and finally selected the factors of consumer involvement and decision making using IoT in online food retailing. The binary logistic regression model revealed that the factors relative advantage, best deals, availability and information, consumer satisfaction, and channel efficiency significantly influences the consumer purchase frequency for ready‐to‐eat food products at various stages in online food retailing. The understanding, extrapolation, and proper management of these factors will help online food retail players in implementing IoT enable services effectively in their retail formats to gain consumer confidence.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号