首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2069篇
  免费   32篇
各国政治   191篇
工人农民   6篇
世界政治   64篇
外交国际关系   261篇
法律   253篇
中国共产党   17篇
中国政治   92篇
政治理论   234篇
综合类   983篇
  2024年   1篇
  2023年   8篇
  2022年   21篇
  2021年   44篇
  2020年   50篇
  2019年   23篇
  2018年   30篇
  2017年   34篇
  2016年   36篇
  2015年   39篇
  2014年   98篇
  2013年   204篇
  2012年   112篇
  2011年   133篇
  2010年   123篇
  2009年   169篇
  2008年   154篇
  2007年   168篇
  2006年   166篇
  2005年   106篇
  2004年   115篇
  2003年   81篇
  2002年   79篇
  2001年   70篇
  2000年   36篇
  1999年   1篇
排序方式: 共有2101条查询结果,搜索用时 62 毫秒
41.
This article juxtaposes two of the most influential yet under-studied America watchers within the top echelon of the Chinese Communist Party (CCP), Wang Huning and Zheng Bijian. To be sure, the two have indelibly shaped CCP attitudes, yet surprisingly enough, although Zheng has been written about extensively in the English language, Wang has hitherto largely remained outside academics’ purview. This article also aims, in passing, to explore linkages between Wang and Zheng ideas and those of other well- known America watchers like Liu Mingfu and Yan Xuetong. The comparison offers clues as to the extent to which the current advisory shaping CCP thinking on the US differs from the previous generation, and as to whether CCP thinking is un-American or anti-American in essence. The conclusions ties the study together by arguing, based on Wang and Zheng's views, that New Confucianism may shape Chinese society in the future  相似文献   
42.
This article investigates South Korean views on how to deal with the two major security issues regarding North Korea: its nuclear threat and regime instability. In this Special Section, the article analyzes the ongoing debate in South Korea over the government's policy toward North Korea in regard to these two issues. It argues that uncertainties about these two major issues are shaping the regional order in East Asia. In particular, the different levels of cooperation between South Korea and the United States may affect the regional security order in East Asia. In analyzing policy options available to South Korea, the riskiest option would be to employ early preemptive attacks and accelerate the collapse of North Korea given the security dilemma-driven action?reaction in East Asia. Given that the role of China has become the most crucial factor in dealing with North Korea, the most promising strategy would be to reinforce guarantees of extended nuclear deterrence and prompt a soft-landing unification.  相似文献   
43.
老挝在长达200余年的毒品种植历史上,其禁毒政策亦随着政治、经济因素的变动而经历了缺失时期、初步制定与忽视时期、重视与完善时期三个不同历史时期的演变,而经济因素始终左右着老挝禁毒政策的制定与实行。  相似文献   
44.
苏联解体后,中亚地区的安全问题一直成为国际舆论关注的焦点。20世纪90年代,中亚地区在国际社会和相关大国的协助下实现了无核化,并与中国、俄罗斯等国成功解决边境地区军事安全问题。当以军事威胁为主的传统安全问题大大缓解后,中亚地区的非传统安全问题就突出地呈现在各国政府面前。中亚地缘结构的特殊性,决定了非传统安全因素生成的跨国性和地区性,仅凭个别国家能力很难有效治理。而中亚各民族国家曲折的发展历史,尤其是苏联时期遗留下来错综复杂的关系,制约着地区各国建立起有效的地区治理机制,致使中亚地区非传统安全问题一直存在、发酵、升温。这一趋势如仍不能引起中亚各国和国际社会予以足够重视并采取有效措施,势必成为威胁地区安全的重要隐患。独立25年来,中亚各国高度警惕宗教极端主义和国际恐怖主义渗透和蔓延的危险,积极参与国际合作打击毒品走私、跨国犯罪等联合行动,"典型意义"上的非传统安全因素得到有效治理。但存在于各国高度关注之外的民族关系、人口膨胀、生态恶化等"非典型意义"上的非传统安全因素仍然不断积累,并正在对地区安全形势产生负面影响。  相似文献   
45.
人口结构、就业形态、新时代的健康政策与脱贫攻坚任务、技术发展等宏观环境,为“十四五”时期医疗保障的发展提供了机遇也提出了挑战。立足“十一五”到“十三五”医疗保障从无到有、从制度全民覆盖到实践全民覆盖、待遇水平持续提升、各项机制跨越式发展等发展脉络,“十四五”时期医疗保障的发展思路应定位于守正、发展与创新。第一,坚守公平共享与切实保障的发展理念;第二,回应健康需求与不平衡、不充分的医保制度现状,在待遇保障、筹资机制、支付方式、基金监管等方面补短板、强弱项;第三,直面新形势的新挑战,在新业态人员参保、大病保障、医疗保障与公共卫生资金统筹衔接等方面实现创新与突破。目标是在“十四五”时期实现一个全民享有、公平适度、法治规范、高效便捷、协同联动的医疗保障制度。  相似文献   
46.
兰江  姜文玉 《南亚东南亚研究》2021,(2):16-36,152,153
2017年美日印澳四方安全对话重启以来,马拉巴尔2020军演是美日印澳四国首次举行的联合军演。马拉巴尔2020军演折射出美日印澳四国针对中国的意愿及合作新进展。美日印澳四方安全合作是美国印太战略的基础和牵制中国崛起的重要机制,在近几年持续获得进展。美日印澳四国在安全领域加强合作,对四国与中国双边关系产生深远影响。马拉巴尔2020军演后,原本紧张的中印及中澳关系继续恶化。美国进一步推动与中国的竞争。美日印澳四国不但在安全领域针对中国,还营造不利于中国的国际舆论。拜登上台后,美日印澳四方安全合作继续强化。拜登比特朗普更重视与盟友合作,借由与日印澳三国磋商推动美日印澳四方安全合作机制化和常态化并走向准军事联盟。美日印澳四国明确表示不会在政治与安全领域停止针对中国,但是在经贸领域基于自身利益考量将改善对华关系。美日印澳四方安全合作升级对中国安全环境及国家利益构成严重威胁。拜登政府正在强化针对中国的印太地区多边安全架构。美国试图在外交层面让中国陷入孤立态势,在安全层面对中国形成战略包围。拜登政府的美日印澳四方安全合作构想将让中国面临更加复杂的外交局面,更加险恶的安全态势。  相似文献   
47.
O’Donnell analyses the confluence of Islamophobia and anti-government conspiracy theory in the works of the far-right think tank, the Center for Security Policy (CSP). He argues that, rather than only being a contemporary form of the religious and racialized demonologies that code ‘Islam’ as being the constitutive outside of ‘the ‘West—irrational, religious and authoritarian versus rational, secular and democratic—Islamophobic conspiracism should also be examined in the context of anxieties over the erosion of personal and state sovereignty under neoliberalization. Mobilizing an Islamophobic demonology that constructs ‘Muslims’ as inassimilable to ‘American’ subjectivity, the CSP's Islamophobic conspiracism projects this construction of absolute alterity on to American social and state systems. In doing so, O’Donnell contends, Islamophobic conspiracism takes neoliberalization's estrangement of the state and its citizens to its logical conclusion, transfiguring the societal processes that impact on the freedom of the individual—notably the state and civil society—into something inassimilable to that individual's claims to self-ownership and self-mastery.  相似文献   
48.
从文化安全视域下,高校宗教文化热对高校马克思主义意识形态的稳固、高校科学精神的培养以及大学生对民族文化的认同存有负面影响。本文认为,高校党政领导和各职能部门应准确理解和把握党和政府的宗教理论和政策,从文化战略高度,加大科学无神论的研究和宣讲力度,弘扬优秀传统文化,以维护高校文化安全。  相似文献   
49.
观念认同对地区秩序建构有着重要意义。观念认同建构行为体的身份和利益,进而改变或影响行为体的行为,在地区秩序建构中起到了"路线图"和"粘合剂"的作用。地区行为体之间的观念认同决定了它们互动的形式和态度,界定了地区秩序的自我属性,框定了战后地区秩序的建构原则,因而成为建构地区秩序的重要因素之一。中国首倡的新安全观与东盟主张的地区规范产生了积极互动,推动东亚观念结构由洛克文化向康德文化演进。  相似文献   
50.
Lawful Interception (LI) of data communications is an essential tool for Law Enforcement Agencies (LEA) in order to investigate criminal activities carried out or coordinated by means of Internet. However, the ability to secretly monitor the activities of citizens also has a great impact on civil rights. Therefore, democratic societies must prevent abuse and ensure that LI is only employed in specific cases with justifiable grounds or a probable cause. Nowadays, in many countries each interception must be authorized by a wiretap warrant, usually issued by a judge. However, this wiretap warrant is merely an administrative document that should be checked by the network or service operator before enabling the monitoring of its customers, whose communications are later handed over to a LEA in plaintext. This paper proposes the idea of employing a Digital Wiretap Warrant (DWW), which further protects the civil liberties, security and privacy of LI by ensuring that monitoring devices can only be enabled with a valid DWW, and by encrypting the captured data so only the authorized LEA is able to decrypt those communications. Moreover, in the proposed DWW framework all digital evidence is securely time-stamped and signed, thus guaranteeing that it has not been tampered with, and that a proper chain of custody has been met. In particular this paper proposes how to apply the DWW concept to the lawful interception framework defined by the ETSI LI Technical Committee, and evaluates how the additional security mechanisms could impact the performance and storage costs of a LI platform.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号