首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   54篇
  免费   4篇
工人农民   4篇
世界政治   5篇
外交国际关系   4篇
法律   16篇
政治理论   29篇
  2023年   1篇
  2021年   2篇
  2020年   2篇
  2019年   6篇
  2018年   4篇
  2016年   4篇
  2015年   1篇
  2014年   3篇
  2013年   7篇
  2012年   2篇
  2011年   1篇
  2010年   2篇
  2008年   1篇
  2007年   1篇
  2006年   3篇
  2005年   2篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1998年   2篇
  1994年   1篇
  1993年   2篇
  1990年   1篇
  1982年   1篇
  1968年   1篇
排序方式: 共有58条查询结果,搜索用时 968 毫秒
1.
2.
I present a model of the interaction between a government, a terrorist organization, and potential terrorist volunteers in which, as a result of an endogenous choice, individuals with low ability or little education are most likely to volunteer to join the terrorist organization. However, the terrorist organization screens the volunteers for quality. Consequently, the model is consistent with two seemingly contradictory empirical findings. Actual terrorist operatives are not poor or lacking in education. And yet lack of economic opportunity and recessionary economies are positively correlated with terrorism. The model also endogenizes the effect of government counterterrorism on mobilization. Government crackdowns have competing effects on mobilization: they decrease the ability of terrorists to carry out effective attacks (making mobilization less attractive), and they foment ideological opposition to the government and impose negative economic externalities (making mobilization more attractive). This provides conditions under which government crackdowns increase or decrease mobilization.  相似文献   
3.
We elucidate a powerful yet simple method for deriving comparative statics conclusions for a wide variety of models: Monotone Comparative Statics ( Milgrom and Shannon 1994 ). Monotone comparative static methods allow researchers to extract robust, substantive empirical implications from formal models that can be tested using ordinal data and simple nonparametric tests. When these methods apply, they can replace a diverse range of more technically difficult mathematics (facilitating richer, more realistic models), assumptions that are hard to understand or justify substantively (highlighting the political intuitions underlying a model's results), and a complicated set of methods for extracting implications from models. We present an accessible introduction to the central monotone comparative statics results and a series of practical tools for using these techniques in applied models (with reference to original sources, when relevant). Throughout we demonstrate the techniques with examples drawn from political science .  相似文献   
4.
5.
The Practice of Law as an Obstacle to Justice: Chinese Lawyers at Work   总被引:1,自引:0,他引:1  
This article helps strengthen our comparative and theoretical understanding of lawyers as gatekeepers to justice by analyzing the screening practices of lawyers in a non-Western context. The explanation for Chinese lawyers' aversion to representing workers with labor grievances focuses on their own working conditions, on the organization of their legal labor, and on their evaluations of the moral character of prospective clients. By linking the screening practices of Chinese lawyers to their socioeconomic insecurity and to popular stereotypes informing and legitimating their screening decisions, this article identifies institutional and cultural obstacles not only to the official justice system but also to cause lawyering. After establishing motives for screening clients, this article then demonstrates lawyers' screening methods: by defining legal reality in strategic and often misleading ways, lawyers use the law as a weapon against the interests of the individuals who seek their help.  相似文献   
6.
7.
8.
We examine the impact on parties and candidates of Japan's new electoral rules, first used in the 1996 House of Representatives election. We argue that the Japanese rules, which not only permit dual candidacy but also allow votes cast in the single member district (SMD) portion of the race to allocate proportional representation (PR) seats to dual candidates, effectively defeat the purposes of electoral reform. The new arrangement transforms PR representatives into locally-based politicians who will rely on personalistic rather than party-based or programmatic campaigning, effectively converts single-member districts back into the multi-member districts of the past, enhances incumbency advantage, and will push the ratio of candidates to seats down as low or even lower than before.  相似文献   
9.
Of all of the criticisms leveled against Rousseau's practical political writings few have been as pervasive as the charge of intentional utopianism. Over the years this charge has not gone entirely unanswered but, for the most part, the scholarly response has been to identify these works' realism solely in terms of Rousseau's desire to educate a corrupt Europe morally. In this essay, I reexamine the question of utopianism in Considérations sur le Gouvernement de Pologne and Projet pour la Corse to argue that the most egregiously fanciful or eccentric recommendations in these works actually demonstrate evidence of the philosopher's practicality and seriousness about constitutional reform in Poland and Corsica. To appreciate this realism though, readers must turn to Rousseau's opaque remarks about opinion's relationship to the laws in the Lettre à d'Alembert and other writings.  相似文献   
10.
Parallel to the advancements in information and communication technologies, certain risks and security problems also arise, one of which is the authentication problem. In order to control who can have access to information sources, it is of utmost importance to develop an advanced authentication mechanism. It is through this mechanism that one can protect personal information, and prevent unauthorized access to the information or services provided. Likewise, this mechanism can block unauthorized persons to change or release information that is not public. All the work being undertaken in this field can be named as access control. The concept of authentication is among those concepts that have been studied for a long time in Turkey in the context of rapidly growing e-transformation efforts. In the process of e-transformation, the transformation circle is completed by first defining the concept of modeling business processes, followed by the formation of automation process, and lastly, providing services in electronic medium.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号