首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   630篇
  免费   3篇
工人农民   15篇
世界政治   7篇
外交国际关系   447篇
法律   163篇
政治理论   1篇
  2020年   1篇
  2019年   1篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   39篇
  2013年   55篇
  2012年   58篇
  2011年   78篇
  2010年   58篇
  2009年   67篇
  2008年   35篇
  2007年   36篇
  2006年   37篇
  2005年   38篇
  2004年   42篇
  2003年   44篇
  2002年   35篇
  2001年   2篇
  1990年   2篇
  1988年   1篇
  1981年   1篇
排序方式: 共有633条查询结果,搜索用时 0 毫秒
421.
422.
This article addresses property rights in China under four headings. I begin by placing the Chinese case within the larger context of property rights literature. The second section reviews the existing scholarship on property rights in China and identifies existing lacunae. The third section provides the broad contours of the contemporary Chinese intellectual and political discourse over property rights in China. And finally, I offer several cases of property rights that illustrate the variation in the scope of the concept of property rights in China and suggest possible avenues for future research.
The right of property is the guardian of every other right, and to deprive the people of this is in fact to deprive them of their liberty.- Arthur Lee, Virginia, 1775
You reproach us with planning to do away with your property. Precisely so; that is just what we intend.- Karl Marx and Friedrich Engels1
The fact that a legal or economic model does not exist for an activity or a behavior is no reason to oppose it, because the laws can develop out of experience and practice.- Wu Guoping, Yangtze Water Resources Commission2
  相似文献   
423.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
424.
425.
The principle of information security safeguards is a key information privacy principle contained in every privacy legislation measure, framework, and guideline. This principle requires data controllers to use an adequate level of safeguards before processing personal information. However, privacy literature neither explains what this adequate level is nor how to achieve it. Hence, a knowledge gap has been created between privacy advocates and data controllers who are responsible for providing adequate protection. This paper takes a step toward bridging this knowledge gap by presenting an analysis of how Data Protection and Privacy Commissioners have evaluated the adequacy level of security protection measures given to personal information in selected privacy invasive cases. This study addresses both security measures used to protect personal information against unauthorized activities and the use of personal information in authentication mechanisms. This analysis also lays a foundation for building a set of guidelines that can be used by data controllers for designing, implementing, and operating both technological and organizational measures used to protect personal information.  相似文献   
426.
427.
According to integration theory, growing economic interdependence between China and Japan should have spilled over into more cordial political relations. The opposite occurred, as summarized in the phrase “hot economics, cold politics.” Even as both sides acknowledge the value of cooperation for shared benefit, commercial and strategic rivalries have intensified, calling into question the validity of integration theory.  相似文献   
428.
While there have been many sources of tension in U.S.-China relations since the Cold War, they have been held in check generally by circumstances that have inclined the governments to cooperate. Yet, the relationship remains multi-faceted and fragile, and various frameworks and forecasts—like the contemporary “Great Divergence” framework, which speaks to the apparent disjunction between economic and security affairs—have proven to be incomplete and incorrect.  相似文献   
429.
430.
Grand or national strategy has emerged as a critical issue in security studies. Adam Garfinkle recently opined that American grand strategy has died a silent death. Too much attention has been devoted to definitions, or debates over the utility of strategy. Not enough consideration has been given to the complexities of actually building a robust strategy amidst that effectively integrates all elements of national power within a complex bureaucracy. Oddly, the exclusion of politics contradicts our understanding of war and conflict. Likewise, not enough attention has been applied to the fundamental components of building a competitive strategy that can be sustained over time. This essay offers an introductory discussion of the basic considerations or components of national strategy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号