全文获取类型
收费全文 | 22361篇 |
免费 | 717篇 |
专业分类
各国政治 | 886篇 |
工人农民 | 507篇 |
世界政治 | 451篇 |
外交国际关系 | 1672篇 |
法律 | 5361篇 |
中国共产党 | 1105篇 |
中国政治 | 3448篇 |
政治理论 | 1694篇 |
综合类 | 7954篇 |
出版年
2024年 | 18篇 |
2023年 | 80篇 |
2022年 | 161篇 |
2021年 | 277篇 |
2020年 | 545篇 |
2019年 | 317篇 |
2018年 | 391篇 |
2017年 | 441篇 |
2016年 | 454篇 |
2015年 | 453篇 |
2014年 | 1416篇 |
2013年 | 1926篇 |
2012年 | 1704篇 |
2011年 | 1477篇 |
2010年 | 1407篇 |
2009年 | 1521篇 |
2008年 | 1739篇 |
2007年 | 1614篇 |
2006年 | 1474篇 |
2005年 | 1409篇 |
2004年 | 1325篇 |
2003年 | 1042篇 |
2002年 | 816篇 |
2001年 | 633篇 |
2000年 | 308篇 |
1999年 | 73篇 |
1998年 | 10篇 |
1997年 | 5篇 |
1996年 | 3篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 3篇 |
1992年 | 6篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1987年 | 3篇 |
1985年 | 2篇 |
1984年 | 7篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 1篇 |
排序方式: 共有10000条查询结果,搜索用时 109 毫秒
71.
清代的因案修例,即基于某一司法案件对《大清律例》中的相关条例进行修改。这是清代司法实践中一种常见的法现象。《大清律例通考》《读例存疑》等考证类释本和《驳案汇编》《刑案汇览》等描述类案例集,分别以法律文本备注和刑事案例陈述的形式,记载了因案修例的诸多实例。结合因案修例的各方面特征来看,它属于清代法律的一种司法创制机制,带有典型的传统中国特色。清代统治者通过此种机制从司法案件中抽象出成文法则,进而实现法律文本稳定性与适应性的均衡。对于当前我国的案例指导制度,因案修例有着重要的启示意义,其对明确案例指导制度的发展路径和方向,以及完善“由案到法”的衔接机制、指导性案例的审核机制、类案判断机制、指导性案例的退出机制等,具有积极的可借鉴之处。 相似文献
72.
Laura Quaynor 《Journal of Peace Education》2015,12(1):15-36
Although policymakers stress the importance of education in promoting peace, little research examines the ways that schools prepare students affected by conflict to participate in the restoration of peace in their political community. Post-conflict societies experience severe challenges in strengthening political processes and social cohesion. This paper discusses citizenship education at a school run by a non-governmental organization near Monrovia, Liberia, examining the implemented curriculum in an 8th grade civics classroom. The paper details the ways that young people expressed civic critiques within the classroom, and provides a counterstory to narratives of harsh and violent educational environments in the region. This classroom was a space where students and their teacher engaged in talk about contentious issues: students discussed corruption and injustice, and highlighted the relationship between economic and political power. I argue that if the goal of education is to produce engaged, effective citizens, teachers should have pedagogic support to confront the differences between the implemented curriculum and students’ lived experiences. Peace education in such contexts must include equipping students to seek justice. Furthermore, because possibilities for civic education are embedded in students’ local and national contexts, current global civic education initiatives must be adaptive to local realities. 相似文献
73.
通过对指数报告进行统计数据和测试题目两个层面的分析,可以发现司法改革方案需要注意的几个问题:司法改革方案的整体性、配套性、正当性、有效性的改革方向和更多的具体课题,应充分考虑地方性的特殊因素,确保司法改革方案的讨论、确定程序的参与性。 相似文献
74.
为了应对海上航道安全威胁,南海各方经过努力形成了航道安全保障法律机制。该机制具有一定有效性,但也存在许多局限性,如合作机制的软法性导致遵约和履约行为的非拘束性、合作机制固有的妥协性与弱惩戒性损害其权威性、合作机制的原则性影响权利义务的确定性、合作机制的独立性受限于国际势力干预性,以及合作机制的公共物品属性影响其实效性。这些局限需要南海各方协同以破解制度困境:构建软硬法有机联系的合作法律机制;完善航道安全保障法律机制的内在构成要素;协同努力确保合作法律机制的独立性;强化南海各方有效合作的“选择性诱因”机制。 相似文献
75.
周丹 《陕西行政学院学报》2015,(1):85-88
在韩国,对金钱债权1的执行主要分为两个阶段,即对债权的押留阶段和现金化阶段。在金钱债权的押留阶段,韩国主要利用押留命令限制第三债务人对债务人清偿,同时禁止债务人对该债权的处分和领受。在金钱债权的现金化阶段,韩国主要利用推寻命令和转付命令对被押留债权进行现金化,将被押留债权转化为金钱,用所得价款清偿执行债务人的债务。我们需要利用比较研究的方法,研究和借鉴韩国关于金钱债权执行制度的法律规定和相关实务经验,不断完善我国关于债权执行制度的相关规定。 相似文献
76.
Different from the perspective of traditional national security, human security
is an essential component of non-traditional security. Human security is influenced by
multi-dimensional factors. Human security will be threatened if one or more of these
dimensional factors get twisted. Such threats, once accumulated to a certain level, may
trigger a confl ict. While some factors may have a low correlation with confl ict, some other
factors may have a multiplying effect in triggering the confl ict. Further, confl ict may be
triggered by a single factor or multiple factors. Poor governance may lead to escalation
of confl icts. Deep understanding of triggering effects and their correlation with confl icts
is essential to addressing the root causes and the management of conflicts effectively.
Concepts of human security, state responsibility of protection and neo-interventionism
have been developed in succession. Though the people-centered security framework draws
global attention, it should be recognized that there is no international consensus on an
optimal type of governance. However, according to the Charter of the United Nations, the
primary responsibilities of human security protection should be rested on the government
of a state. The principle of sovereignty remains the fundamental principle of international
relations, which should be the guiding principle for addressing human security issues. 相似文献
77.
明治维新后,伴随着近代学校教育制度的诞生,日本的社会教育也应运而生。本研究不仅考证了社会教育在日本的由来,确认了社会教育乃日本明治以后出现的特有的教育形态;并从教化型、民主型、终身型等三方面厘清了日本不同历史时期学者对社会教育的多元界定;而且对日本的社会教育和社会事业、社会政策、国家教育、国民教育、家庭教育、学校教育、终身教育、终身学习、成人教育、社区教育等相关概念的区别与联系进行了辨析。在此基础上,归纳了日本社会教育概念的五个特征,即丰富多样性、暧昧模糊性、服务主体性、法律健全性、实践追求性等。 相似文献
78.
随着网络空间的迅速扩张及其对社会各领域的全面渗透,网络空间不断增长的财富、战略价值以及世界经济社会运行对网络空间的深度依赖,使网络空间整体安全问题的重要性日益凸显,网络安全已成为国际社会面临的又一全球性公共问题。网络安全问题虽然属于国家安全范畴内的非传统安全领域,但国家对于安全的偏好没有改变,对安全追求的逻辑路径依旧。从理论的角度看,由于体系压力以及国家对于安全的追求,国家会选择制衡的战略,但在现实中,制衡经常缺位或迟到。受到非传统安全环境影响,地缘战略中分而治之、领土补偿、加强军备、联盟以及平衡手的存在等制衡方式和作用、意义同时发生了变化。细分到网络安全领域,沟通机制的不同、威慑效果不同、行为体的多样、行为判断的困难等特殊性,导致在网络安全领域,国家选择追随或合作将成为更优选择。 相似文献
79.
Karl Adalbert Hampel 《Third world quarterly》2015,36(9):1629-1648
Scholars concerned with the formation of states, specifically the relationship between state formation and war, hold one of two positions. Some agree with Charles Tilly’s historiological conclusion that war is decisive for the establishment of stateness and specify key concepts, in order to explain presumed discrepancies between past and present. Others point towards the international sphere in its current form and advocate a ‘war breaks states’ perspective. This paper argues that both standpoints neglect the ‘sub-national’ level. While proponents of the ‘war breaks states’ thesis are missing para-sovereign zones of rule, supporters of the ‘war makes states’ approach take a juridical view of statehood and focus on ‘state strength’. The failed states paradigm guiding contemporary security and development policy hinders an adequate analysis of the actual situation on the ground. Discussing the shortcomings of failed states approaches and state formation theorising, the paper proposes a conceptualisation in terms of socio-political variation instead of a mere dichotomisation of order. Some conclusive questions are raised, indicating future research directions linked to the historical sociology of state formation. 相似文献
80.
Android operating system has the highest market share in 2014; making it the most widely used mobile operating system in the world. This fact makes Android users the biggest target group for malware developers. Trend analyses show large increase in mobile malware targeting the Android platform. Android's security mechanism is based on an instrument that informs users about which permissions the application needs to be granted before installing them. This permission system provides an overview of the application and may help gain awareness about the risks. However, we do not have enough information to conclude that standard users read or digital investigators understand these permissions and their implications. Digital investigators need to be on the alert for the presence of malware when examining Android devices, and can benefit from supporting tools that help them understand the capabilities of such malicious code. This paper presents a permission-based Android malware detection system, APK Auditor that uses static analysis to characterize and classify Android applications as benign or malicious. APK Auditor consists of three components: (1) A signature database to store extracted information about applications and analysis results, (2) an Android client which is used by end-users to grant application analysis requests, and (3) a central server responsible for communicating with both signature database and smartphone client and managing whole analysis process. To test system performance, 8762 applications in total, 1853 benign applications from Google's Play Store and 6909 malicious applications from different sources were collected and analyzed by the system developed. The results show that APK Auditor is able to detect most well-known malwares and highlights the ones with a potential in approximately 88% accuracy with a 0.925 specificity. 相似文献