首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   92篇
  免费   8篇
各国政治   5篇
工人农民   8篇
世界政治   13篇
外交国际关系   6篇
法律   37篇
中国政治   3篇
政治理论   27篇
综合类   1篇
  2023年   2篇
  2022年   1篇
  2021年   1篇
  2020年   5篇
  2019年   2篇
  2018年   4篇
  2017年   4篇
  2016年   4篇
  2015年   6篇
  2014年   9篇
  2013年   14篇
  2012年   5篇
  2011年   3篇
  2010年   4篇
  2009年   5篇
  2008年   4篇
  2007年   1篇
  2005年   2篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2001年   8篇
  2000年   1篇
  1999年   3篇
  1998年   3篇
  1997年   1篇
  1996年   1篇
  1991年   1篇
  1984年   1篇
  1976年   1篇
排序方式: 共有100条查询结果,搜索用时 31 毫秒
31.
32.
Recent attention on high profile data breaches has overshadowed a potentially greater risk: cyber attacks on large industrial companies causing physical damage, potentially releasing contaminants, and shutting down operations. A handful of publicly reported cyber-attacks, including explosions at an oil pipeline and a steel mill, have highlighted the potential vulnerability of these companies' internet-facing industrial control systems to hackers. The insurance industry has reacted to the growing risk of privacy-related data breaches by marketing and selling so-called “cyber policies.” But these policies typically exclude coverage for property damage and are ill-suited to cover the magnitude of business interruption losses that could result from an extended shutdown of a large industrial operation. That leaves policyholders to look to their traditional property policies. This article examines the cyber-attack risk that large industrial companies face and how those companies' traditional property insurance policies may help mitigate that risk.  相似文献   
33.
Until 1999, Kosovo was a little-known province of Serbia. NATO's intervention, however, changed this. Suddenly, everyone was talking about Kosovo and the plight of the Kosovo Albanians. Today, Kosovo is no longer a major talking point; few authors are now writing about post-independence Kosovo and the many challenges that confront the young state. Particularly striking is the relative absence of scholarly writings that discuss the Gordian knot of northern Kosovo. Seeking to rectify this neglect, this article has three core aims: to provide new empirical insights into the situation on the ground in northern Kosovo, to explore Serb and Albanian viewpoints regarding the status of the north (and in particular to examine Serb fears and concerns) and to discuss possible solutions. It argues that granting the north a special, autonomous status within Kosovo is the ultimate way to resolve the “northern problem,” and indeed this now seems the most likely solution following the recent conclusion of the First Agreement on Principles Governing the Normalization of Relations. This research is based on five weeks of fieldwork in Kosovo in July and August 2012. During this time, the author conducted 56 semi-structured interviews, 29 of which took place in northern Kosovo.  相似文献   
34.
35.
Abstract

Understanding how import prices adjust to exchange rates helps anticipate inflation effects and monetary policy responses. This article examines exchange rate pass-through to the monthly import price index in South Africa during 1980–2009. Short-horizon pass-through estimates are calculated using both single equation equilibrium correction models and systems (Johansen) models, controlling for both domestic and foreign costs. Average pass-through is incomplete at about 50 per cent within a year and 30 per cent in six months, and in the long-run, from the Johansen analysis including feedback effects, is about 55 per cent. There is evidence of slower pass-through under inflation targeting; pass-through is found to decline with recent exchange rate volatility and there is evidence for asymmetry, with greater pass-through occurring for small appreciations.  相似文献   
36.
Abstract

Global integration has increased the international linkages of financial markets for emerging market countries. A key channel for the international transmission of inflation and economic cycles is from exchange rate movements to domestic prices, known as exchange rate pass-through (ERPT). This article reviews the conceptual, methodological and policy issues connected with ERPT in emerging market and developing countries, and critically surveys selected empirical studies. A key contribution is to categorise and compare the heterogeneous methodologies used to extract ERPT measures in the empirical literature. Single equation models and systems methods are contrasted; frequent misspecifications that produce unreliable ERPT estimates are highlighted. The discerning policy-maker needs to ascertain by which methods ERPT measures were calculated, the controls and restrictions applied, and the time frame and stability of the estimates.  相似文献   
37.
To date, little research has documented how teens might misuse technology to harass, control, and abuse their dating partners. This study examined the extent of cyber dating abuse—abuse via technology and new media—in youth relationships and how it relates to other forms of teen dating violence. A total of 5,647 youth from ten schools in three northeastern states participated in the survey, of which 3,745 reported currently being in a dating relationship or having been in one during the prior year (52 % were female; 74 % White). Just over a quarter of youth in a current or recent relationship said that they experienced some form of cyber dating abuse victimization in the prior year, with females reporting more cyber dating abuse victimization than males (particularly sexual cyber dating abuse). One out of ten youth said that they had perpetrated cyber dating abuse, with females reporting greater levels of non-sexual cyber dating abuse perpetration than males; by contrast, male youth were significantly more likely to report perpetrating sexual cyber dating abuse. Victims of sexual cyber dating abuse were seven times more likely to have also experienced sexual coercion (55 vs. 8 %) than were non-victims, and perpetrators of sexual cyber dating abuse were 17 times more likely to have also perpetrated sexual coercion (34 vs. 2 %) than were non-perpetrators. Implications for practice and future research are discussed.  相似文献   
38.
This study investigated the relationship between 10 characteristics of childhood sexual abuse and dissociation in adulthood. A structured clinical interview, the Dissociative Experiences Scale, and the Dissociation Subscale of the Symptom Checklist 90 - Revised were administered to 118 women survivors seeking psychotherapy. Separate stepwise multiple regression analyses were conducted for each dissociation scale to determine which abuse characteristics were predictive of dissociation. In both analyses, the same four variables were significantly related to dissociation: age at onset, coercive sexual acts, objectifying sexual acts, and concurrent multiple perpetrators. Implications of findings for future research and clinical practice are explored.  相似文献   
39.
Numerous studies outlining what needs to be done to improve the U.S. interagency system have been conducted in the past few decades. Together, these studies reflect a growing consensus on the range of changes needed across the government, from personnel reform, to changes in processes and structures. This article does not quibble with this consensus. Rather, in light of the current economic crisis and the challenges we face in Iraq and Afghanistan, this piece argues that dramatic reform may be a luxury we cannot afford right now. Instead of offering another proposal for large-scale reorganization, the author suggests a way to get started now; one that focuses on winning the fights we are currently in while setting the trajectory for long-term change.  相似文献   
40.
Attacks on computers and information networks, both public and private, are disclosed in the news daily. Most recently, Apple, Facebook, and Twitter acknowledged that they were attacked and were now taking additional measures to secure their networks. In January of 2013, Kaspersky Labs reported discovering malware that not only targeted government information in Eastern Europe, former Soviet republics, and Central Asia, but also had been actively doing so since 2007. The scope of global cyber attacks is staggering and the solutions to securing property and protecting national security are illusive, in large part because infrastructure is owned and operated by private, rather than public, entities. Nations struggle with choosing the most effective strategy and potential regulation of the private sector in order to reduce overall cybersecurity risk. This paper reviews the nature of cyber threats, and compares the United States and European approach to promoting cybersecurity in the private sector. Furthermore, the paper discusses how different approaches can affect cybersecurity risk, and suggests a framework for visualizing the impact of law and strategy on security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号