全文获取类型
收费全文 | 145篇 |
免费 | 8篇 |
专业分类
各国政治 | 9篇 |
工人农民 | 25篇 |
世界政治 | 11篇 |
外交国际关系 | 10篇 |
法律 | 66篇 |
中国政治 | 2篇 |
政治理论 | 30篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 5篇 |
2020年 | 6篇 |
2019年 | 4篇 |
2018年 | 14篇 |
2017年 | 15篇 |
2016年 | 14篇 |
2015年 | 7篇 |
2014年 | 8篇 |
2013年 | 17篇 |
2012年 | 5篇 |
2011年 | 5篇 |
2010年 | 4篇 |
2009年 | 10篇 |
2008年 | 4篇 |
2007年 | 6篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2004年 | 2篇 |
2003年 | 1篇 |
2000年 | 1篇 |
1998年 | 4篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1995年 | 1篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1989年 | 1篇 |
1987年 | 1篇 |
1983年 | 1篇 |
1981年 | 1篇 |
排序方式: 共有153条查询结果,搜索用时 15 毫秒
111.
Gabriela KennedySarah Doyle Brenda LuiAuthor Vitae 《Computer Law & Security Report》2009,25(3):297-304
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
112.
Richard Doyle 《Public administration review》2011,71(1):34-44
In response to widespread perceptions of problems associated with congressional earmarks, reform efforts began in late 2006 and continued through 2010. This essay summarizes those problems, explains the distribution of earmarks within Congress, and documents their rise and relative fall between 1991 and 2010 using government and public interest group databases. The author explains and critiques earmark reform policies, including congressional rules, initiatives taken by the congressional appropriations committees, and reforms pursued by the George W. Bush and Barack Obama administrations. Congressional rules and committee‐initiated reforms have been most effective, resulting in significant improvements in earmark transparency and accountability. The number and dollar value of earmarks first dropped noticeably in fiscal year 2007 after an earmark moratorium, and then stabilized as reforms were implemented. It is premature to conclude that these levels will continue or that reforms will alter the policy content of earmarks or their distribution among members of Congress. 相似文献
113.
In 1993, after 38 years of single-party control, more than 20% of Japan’s ruling Liberal Democratic Party (LDP) House of Representatives members left the party to form new alternatives and create an anti-LDP coalition government. However, despite substantial popular support, the new parties attracted few subnational politicians. The effect of this lack of subnational party switching was substantial since the relatively small pool of subnational defectors meant that the new parties had difficulty forming the strong subnational bases of support that would help them to compete with the LDP in the future. In this paper, we consider why so few subnational politicians were willing to switch to these new party alternatives. Using case studies and conditional logit analysis of party affiliation pattern among prefectural assembly members in Japan, we find that party switching was most common among subnational politicians who had powerful patrons who had also left the LDP and had maintained especially good access to central government largesse. We also find that subnational politicians from urban areas, which depend less upon central government pork, were considerably less likely to switch parties, than their rural counterparts. 相似文献
114.
115.
Caitlin Ambrozik 《冲突和恐怖主义研究》2013,36(12):1044-1068
ABSTRACTIn the United States, despite federal efforts to empower communities to form local governance networks to develop and implement collaborative countering violent extremism (CVE) programs, local CVE governance networks are rare. Why do CVE governance networks emerge within only some communities? I argue that three factors—interest in CVE, capacity to participate, and facilitation—determine the prospects for the emergence of a CVE governance network within a community. The article uses a matching technique to identify and compare the community stakeholder responses to CVE in two communities—Houston, TX and Columbus, OH. Survey research of stakeholders who participated in Houston and stakeholders most likely to participate in Columbus but did not highlights the importance of the three factors. By focusing on these drivers of collaborative governance, the article provides an explanation for the lack of CVE collaboration in the United States. 相似文献
116.
This article empirically investigates how the terrorist activity of September 11, 2001, was addressed by the insurance industry and government in the United States. It shows that the insurance system worked reasonably well in compensating losses suffered, albeit with various tribulations. It also demonstrates that the insurance industry, along with government as the ultimate risk manager, imaginatively reconfigured markets to continue terrorism insurance coverage in many contexts. The findings challenge many of Ulrich Beck’s contentions about catastrophe risks and insurability. At the same time, they indicate the fragility of the insurance system. Insurers’ perceptions and decisions about uncertainty – with potential for windfall profits as well as catastrophic losses – create crises in insurance availability and promote new forms of inequality and exclusion. Hence, while the insurance industry is a central bulwark against uncertainty, insurers can also play a key role in fostering it. 相似文献
117.
Dorothy Markiewicz Heather Lawford Anna Beth Doyle Natalie Haggart 《Journal of youth and adolescence》2006,35(1):121-134
Adolescents and young adults (three age groups: 12–15, 16–19, and 20–28 years) reported their use of parents, and peers to
fulfill attachment functions (proximity-seeking, safe haven, and secure base.) The use of each target figure varied with age
and attachment function. Mothers were an important source of security across this age range. They were used as secure base
consistently more than fathers or peers for all age groups, and regardless of whether or not participants had romantic partners;
but were used less for proximity and safe haven by the two older groups. Best friends were used most and more than others
as a safe haven; but were used less by young adults (vs. early adolescents) and by older adolescents with romantic partners.
Romantic partners were used most and more than others for proximity; but were used less by early adolescents than by older
participants. Fathers were selected less than other targets for all attachment functions. Those with romantic partners turned
to them more than to others, and young adults selected their romantic partners as much as friends for safe haven. Those insecurely
attached to mother turned to her less and to romantic partners more than did those securely attached. Implications for developmental
changes in adolescent attachments are discussed.
Professor of Psychology and Applied Human Sciences, Concordia University. Received PhD in social psychology from Ohio State
University. Research interests include close interpersonal relationships and adjustment.
Received MA in social/developmental psychology from Wilfrid Laurier University. Research interests include attachment and
well-being in adolescence
Received PhD in developmental psychology from Stanford University. Research interests include parenting, attachment, and adjustment
in adolescence
Received BA in Psychology (Honors) from Concordia University. Research interests include romantic relationships in adolescence 相似文献
118.
Richard B. Doyle 《Public administration review》2007,67(4):624-629
Since 1986, presidents have been required to submit an annual National Security Strategy (NSS). Recent years have seen a proliferation of national strategies of other kinds, linked in part to the NSS. The National Security Council, led by the national security advisor and employing its committee system and the interagency process, develops the NSS. The integration of all the necessary elements within the NSS involves an opaque and irregular set of rolling negotiations among national security principals. The 2006 NSS is best viewed in comparison to the 2002 version, which was issued in the immediate aftermath of 9/11. It stipulates that the United States is at war with transnational terrorism fueled by a perversion of Islam and proposes stable democracy as the primary solution, supported by aggressive efforts to control the proliferation of weapons of mass destruction and the option of taking preemptive military action. Criteria for assessing national security strategies can be process oriented or results based. 相似文献
119.
The Budget Enforcement Act of 1990, included in the controversial and comprehensive budget legislation passed by Congress in October, makes a number of significant changes in federal budgeting. It shifts the focus of the budget process from deficit reduction to spending control, provides five-year spending totals and mini-sequesters for defense, international and domestic appropriations, and puts entitlements and revenue expenditures on a pay-as-you-go basis. The Gramm-Rudman-Hollings deficit targets have been raised substantially, Social Security surpluses taken out of the deficit calculation and allowance made for further adjustments for inflation, Operation Desert Shield, and other emergency spending, minimizing the prospect for general sequestration. OMB has been given important new estimating authority and the roles of the congressional committees involved in budgeting have been altered. 相似文献
120.