首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5734篇
  免费   249篇
各国政治   224篇
工人农民   104篇
世界政治   165篇
外交国际关系   683篇
法律   884篇
中国共产党   176篇
中国政治   1052篇
政治理论   475篇
综合类   2220篇
  2024年   11篇
  2023年   27篇
  2022年   49篇
  2021年   70篇
  2020年   155篇
  2019年   98篇
  2018年   125篇
  2017年   187篇
  2016年   146篇
  2015年   152篇
  2014年   380篇
  2013年   543篇
  2012年   345篇
  2011年   337篇
  2010年   325篇
  2009年   385篇
  2008年   375篇
  2007年   404篇
  2006年   362篇
  2005年   376篇
  2004年   384篇
  2003年   281篇
  2002年   194篇
  2001年   190篇
  2000年   58篇
  1999年   16篇
  1998年   4篇
  1997年   2篇
  1995年   2篇
排序方式: 共有5983条查询结果,搜索用时 31 毫秒
991.
The viability of the thesis that liberalization and democracy foster peace, security and development is at stake. The main critique is that more liberties and elections lead to more conflict and abuses of power. There are three principal responses to this critique. The liberal argument calls for improving the democratic institutions; the institutions first thesis prioritizes strengthening the rule of law and state capacity over democracy; whilst the transformation argument proposes using fledgling democracy to foster gradually more favourable relations of power and popular capacity towards more substantial democracy. This article analyses the relevance of these theses to the remarkable dynamics of peace-building in Aceh, from the introduction of Indonesian democracy in 1998, the impact of the tsunami in 2004 and the Helsinki peace agreement in 2005 to the general elections in 2009. The study concludes that the liberal argument is congruous with the democratic opportunities for peace, while the institutions first and the transformation arguments give prominence to the dynamics that made peace-building possible but also difficult. While the institutions first argument responds to these difficulties by resorting to power sharing, the transformation thesis proposes more citizen participation coupled with interest and issue group representation.  相似文献   
992.
The removal of Ben Ali's regime in Tunisia signalled the start of the Arab Spring. The abrupt nature of the regime change raises questions about why it happened in the way it did. This article examines the contextual factors that precipitated the regime change through the lens of political security. The aim is to examine how political insecurity in society led to the emergence of opposition sufficiently organized to unseat Ben Ali. The paper develops a framework to consider how the loss of legitimacy by the regime opened the space for opposition. Attempts to restrict opposition failed to address underlying claims, leaving the way open for the opposition to unite following the self-immolation of Mohammed Bouazizi.  相似文献   
993.
Ersel Aydinli 《Democratization》2013,20(6):1144-1164
In considering the future of budding Middle Eastern democracies, past experience and scholarship show that a possible outcome for even the most “successful” ones is some form of imperfect democracy. Based within the literature on democratic transitions and hybrid regimes, this article explores possible factors leading to such outcomes. It focuses in particular on reform/security dilemmas, and the resulting evolution of dual state structures, in which an unelected and often authoritarian state establishment coexists with democratic institutions and practices, for example, in countries like Russia, Iran, or Pakistan. Much of the literature views such duality as an impasse, and thus considers these countries as trapped within this “hybridness” – discouraging news both for currently defined “hybrid regimes” and for countries like Egypt and Tunisia, which are now launching democratization processes. To better understand the nature and evolution of such regimes, this article looks at the case of Turkey, first tracing the rise and consolidation of the Turkish inner state, generally equated with the Turkish armed forces. It then looks at the apparent diminishing and integration of the inner state through pacts and coalitions among both civilian and military elements, and calls into question whether the pessimistic view of permanent illiberalness is inevitable.  相似文献   
994.
In a democracy, legislatures are not only stages for performances by elected representatives; they are also stages for performances by other players in the public sphere. This article argues that while many legislatures are designed and built as spaces for the public to engage with politics, and while democratic norms require some degree of access, increasingly what are termed “purposive publics” are being superseded by groups who are only publics in an aggregative, accidental sense. The article begins with a conceptual analysis of the ways in which legislatures can be thought of as public spaces, and the in-principle access requirements that follow from them. It then draws on interviews and observational fieldwork in eleven capital cities to discover whether the theoretical requirements are met in practice, revealing further tensions. The conclusions are that accessibility is important; is being downgraded in important ways; but also that access norms stand in tension with the requirement that legislatures function as working buildings if they are to retain their symbolic value. The article ends with two “modest proposals”, one concerning the design of the plazas in front of legislatures, the other concerning a role for the wider public in legislative procedure.  相似文献   
995.
This thematic analysis examines the applicability of Gustavo Correa's constructs of horizontal and vertical honour with regard to prestige as reflected in 21 statements by Osama Bin Laden (OBL) between 2002 and 2008. The relevance of Correa's theory pivots upon whether the individual is considered as the primary locus of honour, as Correa seemed to imply. There was limited support and substantial disconfirming evidence under this condition. Correa's theory appears more applicable to honour when the Ummah rather than OBL's person is considered as the primary locus of honour, with the individual's prestige a derivative of group membership. Under this condition, supported hypotheses derived from the theory include honour being rooted in divinity; vertical and horizontal aspects of honour being mutually constitutive; vertical honour being established with the creation of the Ummah through rank (insofar as the Ummah is presumed precedent above all non-Muslims), competition (including warfare) and functioning as an ideology hierarchically differentiating Muslims from non-Muslims; horizontal honour being gendered (with domination by non-Muslims situating the Ummah in a feminised position). A notable limitation of the theory is that it does not predict or account for the geospatial reification of group honour, whereby the establishment, defence, violation and exoneration of Islamic honour is discussed in terms of establishment, defence, invasion and forceful expulsion of non-Muslims from Islamic territory. Implications of honour are discussed with regard to the Islamist geospatial dichotomy of Islamic versus non-Islamic territories, efforts to encourage disengagement from terrorism and de-radicalisation within non-Islamic settings, legitimisation of complex phenomena such as jihad or suicide bombing according to frameworks of martyrdom and realistic efforts to win hearts and minds within the Islamic world.  相似文献   
996.
Privacy by Design is now enjoying widespread acceptance. The EU has recently expressly included it as one of the key principles in the revised data protection legal framework. But how does Privacy by design and data anonymisation work in practise? In this article the authors address this question from a practical point of view by analysing a case study on EU Financial Intelligence Units (“FIUs”) using the Ma3tch technology as additional feature to the existing exchange of information via FIU.NET decentralised computer network. They present, analyse, and evaluate Ma3tch technology from the perspective of personal data protection. The authors conclude that Ma3tch technology can be seen as a valuable example of Privacy by Design. It achieves data anonymisation and enhances data minimisation and data security, which are the fundamental elements of Privacy by Design. Therefore, it may not only improve the exchange of information among FIUs and allow for the data processing to be in line with applicable data protection requirements, but it may also substantially contribute to the protection of privacy of related data subjects. At the same time, the case study clearly shows that Privacy by Design needs to be supported and complemented by appropriate organisational and technical procedures to assure that the technology solutions devised to protect privacy would in fact do so.  相似文献   
997.
网络流行语往往与社会重大公共事件相伴相生,折射出深刻的社会背景,一定程度地反映了我国社会转型期人们的心理状况,对网络舆论的走向起着推波助澜的作用。网络流行语具有触发性、速成性、反讽性、易煽动性和短暂性等特征,具有正负两方面的社会效应。公安机关作为代表国家行使公安职权和履行公安职责的国家机关,应积极关注网络流行语的动态,把握网络流行语的形成特点及产生发展规律,切实转变工作方式,畅通公众沟通渠道,坚持公平、公正、公开原则,正确引导网络舆论。  相似文献   
998.
加强公安机关执法规范化建设是践行"三项建设"的重要环节。目前我国公安机关在执法工作中仍存在着执法理念不正确、执法程序不规范、执法素质不高、执法监督不到位等问题。从比较法的视角,从执法理念、规章制度、警队管理、执法监督四个方面介绍我国香港地区警察规范化执法的基本状况,通过比较分析,为我国内地公安机关执法规范化建设的未来发展提供宝贵的经验借鉴。  相似文献   
999.
社会主义核心价值观明确了国家、社会、公民三个层面的价值目标、价值取向、价值准则,培育和弘扬社会主义核心价值观,关系国家长治久安和社会和谐稳定。网络信息时代,社会主义核心价值观与网络信息安全密切相关,从国家层面来看,网络信息安全是维护国家意识形态的技术保障,有助于巩固社会主义核心价值观的主导地位。从社会层面来看,网络信息安全是维护社会和谐稳定的有效路径,有助于发挥社会主义核心价值观的引领作用。从个体层面来看,网络信息安全是保障公民网络信息权利的基本前提,有助于扩大社会主义核心价值观的认同空间。  相似文献   
1000.
近年来,我国渔船在毗邻朝韩海域进行越界捕捞活动成为了影响中朝、中韩海域安全稳定的焦点问题,也是困扰我边境管理工作的重难点问题。公安边防部门作为渔船民管理的主管部门,为有效地预防和制止越界捕捞活动,应针对边防管理工作中存在的问题,结合部队的实际情况,从根本上预防和制止越界捕捞行为,有力地维护毗邻朝韩海域的安全与稳定,促进毗邻朝韩海域海洋经济可持续发展。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号