首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22361篇
  免费   717篇
各国政治   886篇
工人农民   507篇
世界政治   451篇
外交国际关系   1672篇
法律   5361篇
中国共产党   1105篇
中国政治   3448篇
政治理论   1694篇
综合类   7954篇
  2024年   18篇
  2023年   80篇
  2022年   161篇
  2021年   277篇
  2020年   545篇
  2019年   317篇
  2018年   391篇
  2017年   441篇
  2016年   454篇
  2015年   453篇
  2014年   1416篇
  2013年   1926篇
  2012年   1704篇
  2011年   1477篇
  2010年   1407篇
  2009年   1521篇
  2008年   1739篇
  2007年   1614篇
  2006年   1474篇
  2005年   1409篇
  2004年   1325篇
  2003年   1042篇
  2002年   816篇
  2001年   633篇
  2000年   308篇
  1999年   73篇
  1998年   10篇
  1997年   5篇
  1996年   3篇
  1995年   5篇
  1994年   4篇
  1993年   3篇
  1992年   6篇
  1991年   1篇
  1990年   2篇
  1987年   3篇
  1985年   2篇
  1984年   7篇
  1983年   3篇
  1982年   2篇
  1981年   1篇
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
71.
清代的因案修例,即基于某一司法案件对《大清律例》中的相关条例进行修改。这是清代司法实践中一种常见的法现象。《大清律例通考》《读例存疑》等考证类释本和《驳案汇编》《刑案汇览》等描述类案例集,分别以法律文本备注和刑事案例陈述的形式,记载了因案修例的诸多实例。结合因案修例的各方面特征来看,它属于清代法律的一种司法创制机制,带有典型的传统中国特色。清代统治者通过此种机制从司法案件中抽象出成文法则,进而实现法律文本稳定性与适应性的均衡。对于当前我国的案例指导制度,因案修例有着重要的启示意义,其对明确案例指导制度的发展路径和方向,以及完善“由案到法”的衔接机制、指导性案例的审核机制、类案判断机制、指导性案例的退出机制等,具有积极的可借鉴之处。  相似文献   
72.
Although policymakers stress the importance of education in promoting peace, little research examines the ways that schools prepare students affected by conflict to participate in the restoration of peace in their political community. Post-conflict societies experience severe challenges in strengthening political processes and social cohesion. This paper discusses citizenship education at a school run by a non-governmental organization near Monrovia, Liberia, examining the implemented curriculum in an 8th grade civics classroom. The paper details the ways that young people expressed civic critiques within the classroom, and provides a counterstory to narratives of harsh and violent educational environments in the region. This classroom was a space where students and their teacher engaged in talk about contentious issues: students discussed corruption and injustice, and highlighted the relationship between economic and political power. I argue that if the goal of education is to produce engaged, effective citizens, teachers should have pedagogic support to confront the differences between the implemented curriculum and students’ lived experiences. Peace education in such contexts must include equipping students to seek justice. Furthermore, because possibilities for civic education are embedded in students’ local and national contexts, current global civic education initiatives must be adaptive to local realities.  相似文献   
73.
通过对指数报告进行统计数据和测试题目两个层面的分析,可以发现司法改革方案需要注意的几个问题:司法改革方案的整体性、配套性、正当性、有效性的改革方向和更多的具体课题,应充分考虑地方性的特殊因素,确保司法改革方案的讨论、确定程序的参与性。  相似文献   
74.
为了应对海上航道安全威胁,南海各方经过努力形成了航道安全保障法律机制。该机制具有一定有效性,但也存在许多局限性,如合作机制的软法性导致遵约和履约行为的非拘束性、合作机制固有的妥协性与弱惩戒性损害其权威性、合作机制的原则性影响权利义务的确定性、合作机制的独立性受限于国际势力干预性,以及合作机制的公共物品属性影响其实效性。这些局限需要南海各方协同以破解制度困境:构建软硬法有机联系的合作法律机制;完善航道安全保障法律机制的内在构成要素;协同努力确保合作法律机制的独立性;强化南海各方有效合作的“选择性诱因”机制。  相似文献   
75.
在韩国,对金钱债权1的执行主要分为两个阶段,即对债权的押留阶段和现金化阶段。在金钱债权的押留阶段,韩国主要利用押留命令限制第三债务人对债务人清偿,同时禁止债务人对该债权的处分和领受。在金钱债权的现金化阶段,韩国主要利用推寻命令和转付命令对被押留债权进行现金化,将被押留债权转化为金钱,用所得价款清偿执行债务人的债务。我们需要利用比较研究的方法,研究和借鉴韩国关于金钱债权执行制度的法律规定和相关实务经验,不断完善我国关于债权执行制度的相关规定。  相似文献   
76.
Different from the perspective of traditional national security, human security is an essential component of non-traditional security. Human security is influenced by multi-dimensional factors. Human security will be threatened if one or more of these dimensional factors get twisted. Such threats, once accumulated to a certain level, may trigger a confl ict. While some factors may have a low correlation with confl ict, some other factors may have a multiplying effect in triggering the confl ict. Further, confl ict may be triggered by a single factor or multiple factors. Poor governance may lead to escalation of confl icts. Deep understanding of triggering effects and their correlation with confl icts is essential to addressing the root causes and the management of conflicts effectively. Concepts of human security, state responsibility of protection and neo-interventionism have been developed in succession. Though the people-centered security framework draws global attention, it should be recognized that there is no international consensus on an optimal type of governance. However, according to the Charter of the United Nations, the primary responsibilities of human security protection should be rested on the government of a state. The principle of sovereignty remains the fundamental principle of international relations, which should be the guiding principle for addressing human security issues.  相似文献   
77.
明治维新后,伴随着近代学校教育制度的诞生,日本的社会教育也应运而生。本研究不仅考证了社会教育在日本的由来,确认了社会教育乃日本明治以后出现的特有的教育形态;并从教化型、民主型、终身型等三方面厘清了日本不同历史时期学者对社会教育的多元界定;而且对日本的社会教育和社会事业、社会政策、国家教育、国民教育、家庭教育、学校教育、终身教育、终身学习、成人教育、社区教育等相关概念的区别与联系进行了辨析。在此基础上,归纳了日本社会教育概念的五个特征,即丰富多样性、暧昧模糊性、服务主体性、法律健全性、实践追求性等。  相似文献   
78.
随着网络空间的迅速扩张及其对社会各领域的全面渗透,网络空间不断增长的财富、战略价值以及世界经济社会运行对网络空间的深度依赖,使网络空间整体安全问题的重要性日益凸显,网络安全已成为国际社会面临的又一全球性公共问题。网络安全问题虽然属于国家安全范畴内的非传统安全领域,但国家对于安全的偏好没有改变,对安全追求的逻辑路径依旧。从理论的角度看,由于体系压力以及国家对于安全的追求,国家会选择制衡的战略,但在现实中,制衡经常缺位或迟到。受到非传统安全环境影响,地缘战略中分而治之、领土补偿、加强军备、联盟以及平衡手的存在等制衡方式和作用、意义同时发生了变化。细分到网络安全领域,沟通机制的不同、威慑效果不同、行为体的多样、行为判断的困难等特殊性,导致在网络安全领域,国家选择追随或合作将成为更优选择。  相似文献   
79.
Scholars concerned with the formation of states, specifically the relationship between state formation and war, hold one of two positions. Some agree with Charles Tilly’s historiological conclusion that war is decisive for the establishment of stateness and specify key concepts, in order to explain presumed discrepancies between past and present. Others point towards the international sphere in its current form and advocate a ‘war breaks states’ perspective. This paper argues that both standpoints neglect the ‘sub-national’ level. While proponents of the ‘war breaks states’ thesis are missing para-sovereign zones of rule, supporters of the ‘war makes states’ approach take a juridical view of statehood and focus on ‘state strength’. The failed states paradigm guiding contemporary security and development policy hinders an adequate analysis of the actual situation on the ground. Discussing the shortcomings of failed states approaches and state formation theorising, the paper proposes a conceptualisation in terms of socio-political variation instead of a mere dichotomisation of order. Some conclusive questions are raised, indicating future research directions linked to the historical sociology of state formation.  相似文献   
80.
Android operating system has the highest market share in 2014; making it the most widely used mobile operating system in the world. This fact makes Android users the biggest target group for malware developers. Trend analyses show large increase in mobile malware targeting the Android platform. Android's security mechanism is based on an instrument that informs users about which permissions the application needs to be granted before installing them. This permission system provides an overview of the application and may help gain awareness about the risks. However, we do not have enough information to conclude that standard users read or digital investigators understand these permissions and their implications. Digital investigators need to be on the alert for the presence of malware when examining Android devices, and can benefit from supporting tools that help them understand the capabilities of such malicious code. This paper presents a permission-based Android malware detection system, APK Auditor that uses static analysis to characterize and classify Android applications as benign or malicious. APK Auditor consists of three components: (1) A signature database to store extracted information about applications and analysis results, (2) an Android client which is used by end-users to grant application analysis requests, and (3) a central server responsible for communicating with both signature database and smartphone client and managing whole analysis process. To test system performance, 8762 applications in total, 1853 benign applications from Google's Play Store and 6909 malicious applications from different sources were collected and analyzed by the system developed. The results show that APK Auditor is able to detect most well-known malwares and highlights the ones with a potential in approximately 88% accuracy with a 0.925 specificity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号