全文获取类型
收费全文 | 364篇 |
免费 | 15篇 |
专业分类
各国政治 | 30篇 |
工人农民 | 14篇 |
世界政治 | 46篇 |
外交国际关系 | 22篇 |
法律 | 165篇 |
中国共产党 | 1篇 |
中国政治 | 2篇 |
政治理论 | 96篇 |
综合类 | 3篇 |
出版年
2023年 | 2篇 |
2022年 | 2篇 |
2020年 | 3篇 |
2019年 | 5篇 |
2018年 | 15篇 |
2017年 | 11篇 |
2016年 | 11篇 |
2015年 | 9篇 |
2014年 | 11篇 |
2013年 | 90篇 |
2012年 | 12篇 |
2011年 | 12篇 |
2010年 | 11篇 |
2009年 | 9篇 |
2008年 | 11篇 |
2007年 | 15篇 |
2006年 | 8篇 |
2005年 | 16篇 |
2004年 | 17篇 |
2003年 | 7篇 |
2002年 | 10篇 |
2001年 | 5篇 |
2000年 | 13篇 |
1999年 | 3篇 |
1998年 | 9篇 |
1997年 | 7篇 |
1996年 | 4篇 |
1995年 | 5篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1987年 | 2篇 |
1985年 | 5篇 |
1984年 | 3篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1980年 | 3篇 |
1979年 | 1篇 |
1978年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有379条查询结果,搜索用时 15 毫秒
171.
Law and economics in cyberspace 总被引:1,自引:0,他引:1
173.
Steve Kayizzi-Mugerwa 《发展研究杂志》2013,49(6):1126-1132
We evaluate the impact of the Bono Solidario, a transfer payment scheme in Ecuador, on children's nutritional status. In addition to testing for pure income effects, because the programme transferred money to mothers of young children, we test whether mother's income has a stronger effect on children's heights and weights than ordinary household income. We draw two main conclusions: that the Bono Solidario transfer payment scheme has had a statistically significant but quite modest impact on children's nutritional status, and that this impact is no different than any other income effect on height and weight. In particular, the fact that the Bono is transferred to mothers has not made it more efficacious at reducing malnutrition than other household income. 相似文献
174.
175.
Chris Barton Chris Shepherd Frans Van Kraay Stephen Foster Steve Silvester J. G. Duddington 《The Law teacher》2013,47(3):310-333
Abstract THE CASE of R (Pretty) v. Director of Public Prosecutions, gave the House of Lords the opportunity to comment on the issues surrounding the application of the European Convention on Human Rights to the crime of assisted suicide in the case of the terminally ill. A conservative approach was taken in relation to both this issue and indeed in relation to the possibilities of judicial control of the Law Officers of the Crown. 相似文献
176.
Steve Sawyer 《Third world quarterly》2013,34(4):1325-1336
177.
Steve Bruce 《Terrorism and Political Violence》2013,25(3):501-521
This article uses the pattern of Loyalist violence since the cease fires of 1994 as the starting point for observations about the current roles of paramilitary organizations, the criminal economy and the power of megalomania. 相似文献
178.
179.
Steve Yetiv 《安全研究》2013,22(1):70-105
Balance of power is a ubiquitous concept in theory and practice, but it is rarely tested. This study tests balance of power and balance of threat theories in the case of U.S. intervention in the Persian Gulf. Propositions are derived from the theories and from a conceptualization that treats external states as facing potentially competing and contradictory pressures to balance at the global and regional levels as well as against power and threat. Evidence strongly disconfirms balance of power theory, while balance of threat theory is partly confirmed. Conditions are identified that make balance of threat theory more robust against the historical period explored and possibly in other cases. 相似文献
180.
Steve Saxby 《Computer Law & Security Report》2013,29(1):4-12
This has been a big year for privacy with so much going on within the EU regarding reform of data protection. What are the implications of reform here and what are the issues that concern us about the proposed new data protection regime contained in the proposed Regulation? We hear a lot about the ‘right to be forgotten’. How is that possible in the digital age within the online world? And what can be done about the big players who stand charged with the erosion of privacy viz Facebook, Google, Skype & YouTube etc? How can the law keep up with technological change when the latter is moving so fast e.g. with RFID, Cloud and social networking? To what extent can data breach notification, net neutrality and privacy impact assessment help and how should the law approach issues of liability and criminality in relation to privacy? What is the state of play too in the relationship between privacy policy and state surveillance and, given its implications for privacy, what obligations should governments adopt in response to cybersecurity regulation and data management? Is there a place for privacy self-regulation and if so in what respects and how effective are the Information Commissioners who often complain of being under resourced? In reviewing the way privacy law has emerged do we now need a completely new approach to the whole issue? Has the law crept into its present form simply by default? Do we need some new thinking now that reflects the fact that law is only one dimension in the battle for privacy? If so what are the other factors we need to recognise? 相似文献