首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   805篇
  免费   38篇
各国政治   63篇
工人农民   46篇
世界政治   55篇
外交国际关系   60篇
法律   409篇
中国政治   7篇
政治理论   196篇
综合类   7篇
  2024年   1篇
  2023年   5篇
  2022年   5篇
  2021年   11篇
  2020年   18篇
  2019年   26篇
  2018年   40篇
  2017年   48篇
  2016年   35篇
  2015年   22篇
  2014年   25篇
  2013年   164篇
  2012年   26篇
  2011年   33篇
  2010年   40篇
  2009年   31篇
  2008年   39篇
  2007年   34篇
  2006年   26篇
  2005年   26篇
  2004年   23篇
  2003年   11篇
  2002年   27篇
  2001年   10篇
  2000年   8篇
  1999年   9篇
  1998年   11篇
  1997年   8篇
  1996年   9篇
  1995年   5篇
  1994年   6篇
  1993年   10篇
  1992年   1篇
  1991年   7篇
  1990年   7篇
  1989年   6篇
  1988年   4篇
  1987年   4篇
  1986年   1篇
  1985年   3篇
  1984年   4篇
  1983年   2篇
  1982年   3篇
  1981年   3篇
  1980年   3篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
排序方式: 共有843条查询结果,搜索用时 15 毫秒
671.

As climate change impacts become increasingly apparent, adaptation becomes increasingly urgent. Accordingly, adaptation to climate change has shifted towards the centre of attention in both policy and research. In this article, we review the last 10 years of adaptation research (2008–2018), with a focus on work within the Earth System Governance network. We use the lens of access and allocation to structure our review and examine how adaptation affects, and is affected by, access to basic needs, basic rights, and decision-making on the one hand, as well as allocation of responsibilities, resources, and risks on the other. We find that questions of justice, equity, and fairness are fundamental to all dimensions of adaptation. The access perspective, for example, suggests that we need to assess vulnerability, understood broadly, while the allocation perspective focuses on questions of responsibility for being vulnerable, e.g. when people live, or move to, hazard-prone areas exposed to climate risk. This also relates to questions of who is responsible for selecting, implementing, and funding adaptation measures. Overall, we find that the framework of “access and allocation” and its subcategories offer a detailed approach to adaptation and adaptation research, but that it is not intuitive. The notion of “climate justice” seems to resonate more with both academic and policy debates.

  相似文献   
672.
This paper provides an analysis of the development of democracy in Korea since the transition from authoritarianism in 1987, and its implications for critical analyses of Third World democratisation. Accounts of ‘low intensity democracy’ or ‘polyarchy’ have noted Third World democratisation for its constrained and elite-centred nature, and as an outcome of US foreign policy, which has sought to demobilise restive popular movements and extend the reach of global capital. However, the Korean general elections of 2004 saw the historic entry of the explicitly socialist Korean Democratic Labour Party (kdlp) into the National Assembly. A re-examination of post-authoritarian politics in fact shows a process of continuous contestation that belies the claims made by the polyarchy literature. Formal democratisation has by its very nature allowed for a counter-movement to be mobilised. The paper also examines the relationship between the kdlp and the mass labour union movement and argues that, while democracy has provided opportunities for participation by previously marginalised social forces, concomitant neoliberal restructuring has limited the development of the mass movements from which such political projects draw their strength. Thus, inquiry into the implications of democratisation for a progressive challenge to neoliberal capitalism must also extend beyond ‘politics’ to mass movements in the socioeconomic sphere.  相似文献   
673.
674.
675.
676.
677.
678.
679.
680.
‘Illegals’ are extensively trained individuals dispatched abroad under false identities with no observable links to their operating country. Technology has made possible a new kind of ‘virtual illegal,’ one that extends beyond the operating country’s borders without putting a human at risk. When this is done in a targeted manner by a sophisticated attacker it is called an Advanced Persistent Threat (APT). This article draws from historical illegals cases to identify parallels in the preparation, insertion, and control of malware by APTs. Ultimately, the methods for countering the two parallel phenomena can also be similar, despite their physical differences.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号