首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   999篇
  免费   30篇
各国政治   64篇
工人农民   21篇
世界政治   70篇
外交国际关系   408篇
法律   179篇
中国共产党   7篇
中国政治   42篇
政治理论   116篇
综合类   122篇
  2024年   2篇
  2023年   4篇
  2022年   1篇
  2021年   17篇
  2020年   30篇
  2019年   50篇
  2018年   56篇
  2017年   58篇
  2016年   39篇
  2015年   41篇
  2014年   60篇
  2013年   340篇
  2012年   32篇
  2011年   19篇
  2010年   19篇
  2009年   38篇
  2008年   34篇
  2007年   26篇
  2006年   25篇
  2005年   34篇
  2004年   34篇
  2003年   30篇
  2002年   29篇
  2001年   6篇
  2000年   4篇
  1998年   1篇
排序方式: 共有1029条查询结果,搜索用时 31 毫秒
111.
The French intervention in Mali in early 2013 emphasizes that the decision-makers in Paris, Brussels, and Washington considered the establishment of the radical Islamist regime in Northern Mali a threat to their security interests. The widespread instability including the rise of radical Islamist groups in Somalia was perceived as a threat to western interests. It is the core argument of the paper if western powers decide to provide security in Africa, they will be inclined to use proxy instead of deploying own troops. Security provision by proxy in African means that African troops are doing the actual fighting and peacekeeping on the ground while western powers basically pay the costs, the logistics, and the training of local African troops. The paper concludes that the African Union Mission in Somalia (AMISOM) in Somalia and The African-led International Support Mission to Mali (AFISMA) in Mali are proxies for the USA and the European Union.  相似文献   
112.
Security governance has featured prominently in recent debates about fragmentation, informalization, and privatization in the increasingly diverse field of security policy. It has inspired much valuable research. Yet, there are not just very different conceptual understandings of security governance; there is also a lack of clarity regarding its empirical manifestations and normative connotations. After a decade of research, the special issue therefore puts security governance to the test and scrutinizes its analytical and political pitfalls and potentials. This editorial briefly reviews the rise of security governance, identifies central conceptual, empirical, and normative challenges that need to be addressed, and introduces the individual contributions to this special issue.  相似文献   
113.
The articles in this special issue are drawn from papers presented at a conference titled Critical Terrorism Studies: Practice, Limits and Experience. The conference was organised by the Critical Studies on Terrorism Working Group of the British International Studies Association (BISA). The event was supported by both a BISA workshop grant and by Loughborough University’s Centre for the Study of International Governance (CSIG) and was held at Loughborough University from 9–10 September 2013. The conference aimed to explore what we know about terrorism and counterterrorism and importantly to ask how we know it. Reflecting the recent “materialist”, “everyday”, “experiential” and “narrative” turns in the fields of International Relations (IR), Geography and Cultural Theory, the event brought together scholars and practitioners to reflect on practices of research and knowledge production in Critical Terrorism Studies and related fields. The articles in this special issue reflect those aims.  相似文献   
114.
This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone‐actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone‐actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone‐actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone‐actor terrorists were socially isolated. Lone‐actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone‐actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article.  相似文献   
115.
崔文玉 《法律科学》2014,(6):173-180
低税率和少管制是吸引国际投资者的重要因素。经过两次金融危机,韩国政府对企业重组税制进行了重大修改,降低了税率,减少了管制,从而提升了韩国企业的国际竞争力。我国企业重组税制存在缺陷,为应对金融危机、提高企业竞争力、引进外资等,我国应放宽跨国性企业重组、完善企业重组中的反避税政策、整合相关法律规定,简化和优化税制等。  相似文献   
116.
以平民为目标,严重危害社会安全、破坏国际秩序的恐怖主义,是基于政治动机而使用暴力手段的现象,始于18世纪,20世纪以后演变为有组织的犯罪.当前,恐怖主义已从国内发展到国际,是国际社会安全的主要威胁之一.它是经济、政治、民族和宗教等各种矛盾的综合产物,有着深刻的历史背景,因而单纯地用军事手段不能彻底地解决问题.在当今世界,有效地防范和惩治恐怖主义,需要世界各国间的国际合作,尤其是推行打击恐怖主义的国际法律合作.进一步完善打击恐怖主义的国内法律机制,充分发挥已有的国际公约、国际组织和国际合作方式在打击恐怖主义方面的作用,缔结全面统一的打击恐怖主义的全球性国际公约.  相似文献   
117.
作为一种极端的解构力量,恐怖主义对于国际秩序的威胁和损害不仅在于通过制造恶性事件以破坏国际社会的安全稳定,更在于借助销蚀主流价值而削弱国际秩序的观念基础。因此,国际社会有必要将评估和应对恐怖主义的社会解构纳入反恐治理的基本范畴。其中,以“伊斯兰国”组织为代表的恐怖主义力量进行社会解构的行为策略,可以分为以动摇当代领土政治、颠覆主流生命伦理和创设替代政治秩序为主要构成的重释再造,以动员恐怖袭击、滋长恐怖气氛和催生仇恨敌对为主要构成的“木马”植入,以“黑色经济”“黑色宣传”和“黑色技术”为主要构成的反向利用。目前,国际社会的反恐路径注重结合预防恐怖主义的内向防御逻辑与打击恐怖主义的外向进攻逻辑。沿着这一思路,国际社会可以综合采取加强反恐实践中的逆向战略、修正反恐叙事中的敌意话语和联通反恐治理中的不同系统等多种举措以应对恐怖主义的社会解构。  相似文献   
118.
Gender inequality has been empirically linked to the incidence of terrorism, as a motivator for women’s involvement in terrorism, and political and social violence more generally. Although these studies demonstrate that advances in gender equality on average decrease terrorism, it is unclear how these influences translate to individual nations or conflicts. Because Turkey has witnessed consistent but unequal regional advances in gender equality, it provides an ideal setting to examine how these developments have influenced terrorist violence. Analyzing data from Turkey’s 81 provinces from 2000–2013, this study finds important regional differences in the influence of gender equality on terrorism.  相似文献   
119.
The regulatory regionalism approach has increasingly claimed that a new mode of regional governance is emerging globally. Regional policy regimes, developed in broad social and economic territorial areas, affect the internal transformation of the state. The authors plan to provide comprehensive empirical evidence about the emergence of worldwide regulatory regionalism by identifying how regulatory agencies have diffused very successfully within the regional level in recent decades. The paper aims to identify, using an original methodological design, the ways in which such diffusion of agencies occurred, as this may have theoretical relevance for the study of regulatory regionalism. The authors' hypothesis suggests that transnational political interactions in each regional cluster triggered agency diffusion, contributing to the development of the regulatory state within the countries of each region. To test this hypothesis, the authors employed a data set of regulatory agencies including the OECD (Organisation for Economic Co-operation and Development), and most Asian and Latin American countries (+59) from 1950 to 2007, for 15 sectors related to finance, risks, utility and competition. Bayesian data analysis was used to estimate the parameters of interest.  相似文献   
120.
This article focuses on the transnational project, led by Turkish Independent Industrialists and Businessmen Association (Müsiad), of crafting a community of Islamic businessmen. The Arab Springs opened new opportunities to further this project, especially in Tunisia and Egypt where Islamist groups rose to power after 2011. In both countries, Müsiad supported the creation of two Islamic business associations, exporting its own organizational model. Examining this circulation process, we question the classical dichotomy between economic and advocacy transnational networks. We also show how this transnational activism is constrained by divergent domestic patterns of relationships between Islamists, business and states in each country.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号