首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   325篇
  免费   25篇
各国政治   13篇
工人农民   16篇
世界政治   24篇
外交国际关系   40篇
法律   147篇
中国政治   7篇
政治理论   98篇
综合类   5篇
  2023年   8篇
  2022年   9篇
  2021年   6篇
  2020年   14篇
  2019年   20篇
  2018年   27篇
  2017年   18篇
  2016年   27篇
  2015年   27篇
  2014年   14篇
  2013年   47篇
  2012年   23篇
  2011年   12篇
  2010年   10篇
  2009年   9篇
  2008年   13篇
  2007年   7篇
  2006年   11篇
  2005年   7篇
  2004年   10篇
  2003年   6篇
  2002年   6篇
  2001年   2篇
  1999年   3篇
  1997年   3篇
  1995年   1篇
  1994年   2篇
  1993年   2篇
  1992年   2篇
  1990年   2篇
  1987年   1篇
  1981年   1篇
排序方式: 共有350条查询结果,搜索用时 15 毫秒
341.
342.
343.
344.
In semi‐arid countries, particularly in Africa, governments have evolved water policies oriented toward ‘techno‐giantist,’ grand‐scale schemes that have generally accelerated the depletion of national water tables. In Namibia, such a techno‐giantist water management strategy was utilized to reinforce the privileges of white minority farmers prior to independence, and was subsequently expanded to provide modern water facilities to the black African majority in the post‐independence period. The government has pursued not only the construction of a massive new system of pipelines and boreholes, but also the development of giant dam‐building and river canal schemes that are likely to result in watershed depletion over the long term. This reflects state leaders' belief in the imagery of political potency projected by the government's ability to build macro‐scale water systems. However, a water supply approach focused on more micro‐level extraction techniques through which aquifer recharge is prioritized is more likely to assure both local‐level water access and water table sustainability. Copyright © 2001 John Wiley & Sons, Ltd.  相似文献   
345.
346.
347.
348.
349.

Research Summary

This study utilized a quantitative analysis of 246 cyberattack incidents reported in the Extremist CyberCrime Database to identify significant predictors of nation-state-sponsored cyberattacks relative to those performed by non-nation-state-sponsored ideological actors. Clarke and Newman's Situational Crime Prevention framework for terrorism was used to identify differential opportunities to successfully affect targets on the basis of tools, weapons, and the ability to access targets in online settings. The analysis noted nation-state-sponsored attacks were less likely to use high-visibility attack methods and more likely to utilize attack methods leading to data breaches. In addition, they were more likely to target state governments and military entities relative to ideological actors.

Policy Implications

Nation-state attacks are more difficult to identify or mitigate while in process, requiring a more robust national cybersecurity policy framework to be implemented that moves beyond current practices. There is a need to better utilize all aspects of government, from legislation to grant funding, in order to deter cyberattacks from continuing into the future.  相似文献   
350.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号