首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   37篇
  免费   0篇
各国政治   3篇
工人农民   4篇
世界政治   4篇
外交国际关系   4篇
法律   16篇
政治理论   6篇
  2023年   1篇
  2017年   2篇
  2016年   3篇
  2014年   1篇
  2013年   14篇
  2012年   2篇
  2009年   1篇
  2007年   2篇
  2006年   1篇
  2004年   2篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1996年   1篇
  1989年   1篇
  1983年   1篇
  1981年   1篇
  1976年   1篇
排序方式: 共有37条查询结果,搜索用时 15 毫秒
11.
In this article, we argue that a comparative study of state and non-state terrorism that uses the minimal foundationalist definition of terrorism as its central analytical framework offers a unique and instructive approach for answering the question: “what is terrorism?” To date, most recent comparative case study analyses of terrorism focus on ideologies, political/governance models, structural/contextual enablers, practices, organisational structures, and/or the basis of issues such as trust, belonging, and membership. We uniquely contribute to the growing literature on comparative terrorism studies by comparing and contrasting state and non-state terrorism on the basis of strategic communication vis-à-vis the preparation, execution, and outcomes of political violence (the “terrorism attack cycle”), the instrumentalisation of victims, and fear management. We argue that state and non-state terrorism are co-constituting and co-enabling phenomena, possibly best conceptualised as two bounded and coiled strands of the political violence DNA.  相似文献   
12.
13.
14.
15.
The conflict which many indigenous peoples experience with Westernized systems of law has precipitated a search for alternative models of criminal justice. While the process of colonization has most often resulted in the destruction of traditional practices of social control, in Greenland an attempt was made to adapt Western law to the indigenous culture. The Greenlandic justice system has several unique attributes which have attracted the attention of indigenous peoples and governments worldwide. This article traces the origins, development and evolution of the Greenlandic Criminal Code and criminal justice system, the factors which influenced its development, and the extent to which the objectives of the architects of the systems have been met. The discussion provides key insights into the potential and limitations of adapting Western law to indigenous cultures.  相似文献   
16.
This paper analyses whether direct government assistance during start-up and other forms of interaction with the state sector have influenced the long-run performance of small and medium-sized manufacturing enterprises (SMEs) in Vietnam. Using three partly overlapping surveys during the period 1990–2000, we find strong effects on firm dynamics from interaction with state institutions. Enterprises which have the state sector as their main customer perform better. This is so for both survival and growth. Moreover, temporary tax exemptions during firm start-up had a separate and positive influence on long-run growth for non-household enterprises and initial credit support seems to benefit rural firms.  相似文献   
17.
Book reviews     
Amir Taheri, Holy Terror: The Inside Story of Islamic Terrorism. London: Century Hutchinson; Bethesda, MD: Adler & Adler, 1987. Pp.313. £12.95/$19.95 (hardback); £3.95 (paperback).

Robert O. Slater and Michael Stohl (eds.), Current Perspectives on International Terrorism. London: Macmillan Press; New York: St. Martin's Press, 1988. Pp. 288. £29.50/$39.95 (hardback); £13.95 (paperback).

Juliet Lodge (ed.), The Threat of Terrorism. Brighton: Wheatsheaf Books; Boulder, CO.Westview Press, 1988. Pp. 280. £35/$33.50 (hardback); £12.95 (paperback).

Edward F. Mickolus with Peter A. Flemming (compilers), Terrorism, 1980–1987: A Selectively Annotated Bibliography. Westport, CT: Greenwood Press, 1988. Pp. 314. £49.50/$55.  相似文献   
18.
19.
20.
The Technology Safety Project of the Washington State Coalition Against Domestic Violence was designed to increase awareness and knowledge of technology safety issues for domestic violence victims, survivors, and advocacy staff. The project used a “train the trainer” model and provided computer and Internet resources to domestic violence service providers in order to (1) increase safe computer and Internet access for domestic violence survivors in Washington; (2) reduce the risk posed by abusers by educating survivors about technology safety and privacy; and (3) increase the ability of survivors to help themselves and their children through information technology. Evaluation of the project suggests that the program is needed, useful, and effective. Consumer satisfaction was high and there was perceived improvement in computer confidence and knowledge of computer safety. Areas for future program development and further research are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号