首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   41篇
  免费   3篇
各国政治   14篇
工人农民   2篇
世界政治   2篇
外交国际关系   6篇
法律   12篇
政治理论   8篇
  2023年   1篇
  2019年   1篇
  2018年   4篇
  2017年   2篇
  2016年   5篇
  2015年   1篇
  2014年   1篇
  2013年   2篇
  2009年   6篇
  2008年   2篇
  2007年   3篇
  2006年   1篇
  2003年   2篇
  2001年   1篇
  1999年   1篇
  1997年   3篇
  1996年   1篇
  1994年   3篇
  1993年   1篇
  1987年   1篇
  1977年   1篇
  1974年   1篇
排序方式: 共有44条查询结果,搜索用时 29 毫秒
11.
12.
13.
Israel's new law requiring taxpayers to report aggressive taxplanning arrangements to the Israeli Tax Authority requiresprofessionals to consider the reporting implications and therisks when advising clients.  相似文献   
14.
15.
16.
17.
18.
The public versus private nature of organizations influences their goals, processes, and employee values. However, existing studies have not analyzed whether and how the public nature of organizations shapes their responses to concrete social pressures. This article takes a first step toward addressing this gap by comparing the communication strategies of public organizations and businesses in response to large‐scale social protests. Specifically, we conceptualize, theorize, and empirically analyze the communication strategies of 100 organizations in response to large‐scale social protests that took place in Israel during 2011. We find that in response to these protests, public organizations tended to employ a “positive‐visibility” strategy, whereas businesses were inclined to keep a “low public profile.” We associate these different communication strategies with the relatively benign consequences of large‐scale social protests for public organizations compared with their high costs for businesses.  相似文献   
19.
Government Accountability Office reports and secondary sources reveal that the U.S. Congress has employed three distinct legislative approaches to address the federal counterterrorism information-sharing impasse: coerce, consent, and coax. One main example illustrates each approach: the Homeland Security Information Network project exemplifies the coerce approach; Intellipedia illustrates the consent approach; the office of the Program Manager of the Information Sharing Environment exemplifies the coax approach. Secondary examples are utilized including those of regional Fusion Centers, the Office of the Director of National Intelligence, and the National Counterterrorism Center. The merits and challenges of the three approaches are discussed and compared. The conclusion proposes ideas for using the approach most appropriate to specific counterterrorism challenges.  相似文献   
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号