首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   106篇
  免费   4篇
各国政治   12篇
工人农民   1篇
世界政治   12篇
外交国际关系   10篇
法律   48篇
政治理论   25篇
综合类   2篇
  2023年   2篇
  2022年   1篇
  2021年   2篇
  2020年   1篇
  2019年   7篇
  2018年   5篇
  2017年   4篇
  2016年   5篇
  2015年   4篇
  2014年   8篇
  2013年   12篇
  2012年   7篇
  2011年   7篇
  2010年   1篇
  2009年   4篇
  2008年   3篇
  2006年   5篇
  2005年   3篇
  2004年   4篇
  2003年   4篇
  2002年   2篇
  2001年   2篇
  2000年   1篇
  1998年   1篇
  1997年   2篇
  1996年   2篇
  1994年   1篇
  1991年   1篇
  1988年   1篇
  1981年   2篇
  1977年   3篇
  1969年   1篇
  1966年   1篇
  1965年   1篇
排序方式: 共有110条查询结果,搜索用时 15 毫秒
21.
22.
Ghana has conducted several successful elections since 1992, but the country continues to face many threats of widespread violence due to the recurrent nature of micro-level electoral violence and the existence of vulnerabilities such as political patronage, politics of exclusion, winner-takes-all electoral system and ethnic cleavages. While these factors have been used to explain the causes of electoral violence, issue framing by political elites and its connection to electoral violence have not been adequately examined. To better understand this phenomenon, this article draws on the concept of framing to underscore the argument that issue framing and reframing by political elites tend to shape micro-level electoral violence in Ghana.  相似文献   
23.
When delegating governing tasks to a coalition partner, the president would like to give a minister ample administrative powers to be able to effectively accomplish the political mission. Due to information asymmetries, the president runs the risk that this discretion might be used to pursue policy outcomes that may harm the president's preferences. This trade‐off between delegation and control is key to understanding governance strategies the president chooses to minimize agency risks and coordinate public policies. With Brazil as a case study, this article demonstrates that presidents have strategically made frequent use of junior ministers as watchdogs of coalition partners, especially when coalition allies are ideologically distant from the president's preferences. Yet neither the portfolio salience nor the president's decision to share powers with coalition partners proportionally seems to interfere in such strategic decisions.  相似文献   
24.
25.
Undoubtedly, some African states have put in place cybercrime legal frameworks and institutional policies to combat cybercrime and curtail the proliferation of the crime globally. Although the cybercrime policy implementation gap is a global problem, this paper notes that these African States have a peculiar challenge of implementation gap or lack of implementation of cybercrime legal frameworks and policies as a basis for cybercrime proliferation and this poses great concerns for internet users. Incentive is comparatively drawn from the United States of America and the United Kingdom in determining what these African governments and institutions should do towards fighting cybercrime.  相似文献   
26.
27.
Despite worries that ASEAN is becoming weak, the organization remains as strong as it ever was, given the parameters of its design. Its member countries still tightly embrace the organization's principles, the “ASEAN way.” But simple adherence to those principles can be problematic. ASEAN countries, whose national economic and political interests collide, often appeal to the same principles to back their positions. That tends to pull ASEAN in different directions. Great power policies, particularly those of China and the United States, now exacerbate the situation. At the same time, ASEAN's reliance on multilateral consensus has made it difficult to reconcile real differences among its member countries or develop unified regional responses. That can be seen in issues from the Xayaburi dam on the Mekong River to the South China Sea. The ease with which ASEAN's principles can come into conflict and its consensus-driven decision- making can become deadlocked clearly marks the limits of the “ASEAN way.”  相似文献   
28.
Traditional, persistent data-oriented approaches in computer forensics face some limitations regarding a number of technological developments, e.g., rapidly increasing storage capabilities of hard drives, memory-resident malicious software applications, or the growing use of encryption routines, that make an in-time investigation more and more difficult. In order to cope with these issues, security professionals have started to examine alternative data sources and emphasize the value of volatile system information in RAM more recently. In this paper, we give an overview of the prevailing techniques and methods to collect and analyze a computer's memory. We describe the characteristics, benefits, and drawbacks of the individual solutions and outline opportunities for future research in this evolving field of IT security.  相似文献   
29.
Many scholars have convincingly shown that policies diffuse between national and sub-national entities for several different reasons. Although diffusion processes are empirically proven, we witness two shortcomings in the discussion: First, there is a lack of comparative research across policy areas. Second, the question of why diffusion might not occur in a certain domain is under-theorized and lacks an empirical test. By comparing the rationale behind diffusion processes in two policy domains??energy policy and locational policy??this paper shows that two aspects matter for diffusion processes: First is the observability of policy measures, that is, how easily things can be observed by others; second is the competitiveness of the policy domain. If policy measures can be hidden easily and the policy domain is highly competitive, policy diffusion is very unlikely to happen. Therefore, we seek the integration of these two aspects in prospective diffusion research.  相似文献   
30.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号