全文获取类型
收费全文 | 5473篇 |
免费 | 39篇 |
专业分类
各国政治 | 147篇 |
工人农民 | 120篇 |
世界政治 | 133篇 |
外交国际关系 | 730篇 |
法律 | 770篇 |
中国共产党 | 83篇 |
中国政治 | 959篇 |
政治理论 | 331篇 |
综合类 | 2239篇 |
出版年
2025年 | 20篇 |
2024年 | 38篇 |
2023年 | 34篇 |
2022年 | 46篇 |
2021年 | 57篇 |
2020年 | 133篇 |
2019年 | 86篇 |
2018年 | 113篇 |
2017年 | 156篇 |
2016年 | 124篇 |
2015年 | 139篇 |
2014年 | 336篇 |
2013年 | 449篇 |
2012年 | 320篇 |
2011年 | 301篇 |
2010年 | 289篇 |
2009年 | 378篇 |
2008年 | 365篇 |
2007年 | 391篇 |
2006年 | 364篇 |
2005年 | 333篇 |
2004年 | 347篇 |
2003年 | 266篇 |
2002年 | 191篇 |
2001年 | 175篇 |
2000年 | 47篇 |
1999年 | 10篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1995年 | 1篇 |
排序方式: 共有5512条查询结果,搜索用时 15 毫秒
991.
陈鹏飞 《湖南公安高等专科学校学报》2010,22(6)
依法对军队中失职的行政人员进行问责,是提高军事行政管理水平,增强部队战斗力的重要保证。然而现行军事行政问责法律制度却存在相关法律规定分散,制度设计陈旧,执行力度较弱等诸多问题。于是,对其进行进一步的研究具有十分重要的理论和现实意义。现从军事行政问责法律制度的历史及现状出发;进而针对存在的问题提出相关完善建议,以求对我军的法治化建设有所裨益; 相似文献
992.
社会转型期农村留守儿童安全问题探析 总被引:3,自引:0,他引:3
王克 《山西青年管理干部学院学报》2010,23(3):17-19
农村留守儿童作为社会中的边缘群体,具有有别于其他青少年群体的特征,他们在成长过程中面临着诸多安全问题。近年来,农村留守儿童安全事故频发,这些隐患应引起社会各界及相关部门的广泛关注。社会、学校、家庭都有义务采取措施,确保农村留守儿童的安全。 相似文献
993.
高校学生校外小旅店住宿安全已严重影响我国高校对学生住宿的管理,为维护学生合法利益,我国法律应明确对小旅店进行法律规范,责成有关部门对其审核监督;同时,高校要加强学生住宿的硬件设施,注入人性化管理,通过改善高校周边环境和完善学校管理来解决高校学生校外住宿问题。 相似文献
994.
Angela Daly 《Computer Law & Security Report》2018,34(3):477-495
This article argues that Australia's recently-passed data breach notification legislation, the Privacy Amendment (Notifiable Data Breaches) Act 2017 (Cth), and its coming into force in 2018, makes an internationally important, yet imperfect, contribution to data breach notification law. Against the backdrop of data breach legislation in the United States and European Union, a comparative analysis is undertaken between these jurisdictions and the Australian scheme to elucidate this argument. Firstly, some context to data breach notification provisions is offered, which are designed to address some of the problems data breaches cause for data privacy and information security. There have been various prominent data breaches affecting Australians over the last few years, which have led to discussion of what can be done to deal with their negative effects. The international context of data breach notification legislation will be discussed, with a focus on the United States and European Union jurisdictions, which have already adopted similar laws. The background to the adoption of the Australia legislation will be examined, including the general context of data privacy and security protection in Australia. The reform itself will be then be considered, along with the extent to which this law is fit for purpose and some outstanding concerns about its application. While data breach notification requirements are likely to be a positive step for data security, further reform is probably necessary to ensure strong cybersecurity. However, such reform should be cognisant of the international trends towards the adoption of data security measures including data breach notification, but lack of alignment in standards, which may be burdensome for entities operating in the transnational data economy. 相似文献
995.
Joseph V. DeMarco 《Computer Law & Security Report》2018,34(4):908-911
Robust cyber-resilience depends on sound technical controls and testing of those controls in combination with rigorous cyber-security policies and practices. Increasingly, corporations and other organizations are seeking to test all of these, using methods more sophisticated than mere network penetration testing or other technical audit operations. More sophisticated organizations are also conducting so-called “Red Team” exercises, in which the organization tasks a small team of highly skilled and trained individuals to try to gain unauthorized access to physical and logical company assets and information. While such operations can have real value, they must be planned and conducted with great care in order to avoid violating the law or creating undue risk and reputational harm to the organization. This article explores these sometimes tricky issues, and offers practical risk-based guidance for organizations contemplating these types of exercises. 相似文献
996.
Łukasz Fijałkowski 《Third world quarterly》2013,34(9):1670-1688
AbstractThe aim of this article is to explain the internal conditions of military security in a non-European context. It utilises securitisation as the theoretical perspective and investigates Iranian and Indonesian case studies to explore how the perception of internal threats and vulnerabilities determines the approaches to military security. It begins with a reiteration of securitisation theory assumptions, followed by clarifying the understanding of security in non-Western contexts. The case studies focus on the conditions which facilitate securitisation, including the nature of securitising actors, assumed concepts of security, and securitisation processes and their outcomes. The analysis indicates a necessity for several alterations in securitisation theory to realise its full potential. Civil–military relations in Asian states differ from those in the West, as both Iran and Indonesia show a high degree of military involvement in political affairs. Military security also becomes securitised as a result of internal political rivalries. The perception of threats is a tool in the struggle to extend the capabilities of security agencies or retain influences. 相似文献
997.
李颖峰 《山东警察学院学报》2013,25(3):125-131
有组织犯罪是指3人或3人以上,为了获取非法经济利益而形成一定的组织,以组织体的形式实施特定或不特定犯罪的犯罪现象。在我国大陆法律语境下,有组织犯罪可以划分为普通犯罪集团犯罪、黑社会性质组织犯罪以及黑社会组织犯罪。 相似文献
998.
专家证据以其“意见性”和“科学性”吸引了法庭基于维护事实认定独立性忧虑的可采性标准的研究。这一研究对象以实行对抗制庭审模式,存在大量相关证据判例的美国证据规则最具典型性,通过对弗赖伊案、多伯特案以及《联邦证据规则》相关条款的解读、分析及其演进脉络的疏理和反思,探讨蕴含在美国专家证据可采性标准变化规律中的理性因素和思辨精神。对比我国鉴定意见在适用现状和理论研究中的不足,反思我国缺乏鉴定意见科学性评判标准的问题本质,推动相关研究。 相似文献
999.
《Global Crime》2013,14(3-4):329-350
The State, which during the three and a half centuries since the Treaty of Westphalia (1648) has been the most important and the most characteristic of all modern institutions, appears to be declining or dying. In many places, existing states are either combining into larger communities or falling apart; in many places, organizations that are not states are challenging them by means fair or foul. On the international level, we seem to be moving away form a system of separate, sovereign, legally equal, states towards less distinct, more hierarchical, and in many ways more complex political structures. Inside their borders, it seems that many states will soon no longer be able to protect the political, military, economic, social and cultural life of their citizens. These developments are likely to lead to upheavals as profound as those that took humanity out of the middle ages and into the modern world. Whether the direction of change is desirable, as some hope, or undesirable, as others fear, remains to be seen. 相似文献
1000.
《Global Crime》2013,14(3-4):561-582
The thousands of large and small private security establishments operating around the world today continue to expand in number, diversity, and capability. Government oversight is often lacking, and the impact on local, national and regional security and stability may be substantial. In the most troubled areas, the pockets of security provided by private security regimens provide may mean the difference between a failed state and one that is at least faltering. However, the advantages of “private security firm cover” quickly became evident to criminals and groups with terrorist agendas as well. This assessment addresses numerous cases from around the world of private security establishments that were either formed for—or otherwise turned to—the pursuit of criminal or terrorist purposes. The stated jihadist intent to infiltrate such companies underscores the need for law enforcement and intelligence attention to the recruiting, affiliations and activities of these security enterprises. 相似文献