首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   31篇
  免费   1篇
各国政治   2篇
工人农民   1篇
世界政治   2篇
外交国际关系   4篇
法律   13篇
政治理论   9篇
综合类   1篇
  2023年   1篇
  2019年   1篇
  2018年   1篇
  2017年   2篇
  2014年   1篇
  2013年   3篇
  2012年   3篇
  2010年   2篇
  2008年   1篇
  2005年   1篇
  2004年   1篇
  2003年   1篇
  2001年   2篇
  2000年   1篇
  1993年   1篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
  1987年   1篇
  1986年   2篇
  1985年   1篇
  1982年   1篇
  1973年   1篇
排序方式: 共有32条查询结果,搜索用时 0 毫秒
31.
Achieving public participation often is a goal for public budgeting entities, but it is difficult to accomplish in practice. This study examines three questions: How do public representatives interpret and define their democratic responsibilities? What are their insights regarding opportunities for and barriers to participatory budgeting processes? To what extent are these goals met? To address these questions, this research employs a qualitative research strategy with a case study design of a public university budgeting committee. The findings reveal that respondents (1) define their mission structurally and procedurally, (2) identify a need for ethical behavior and leadership, and (3) recognize that democratic values such as participation and efficiency are in tension with one another. Being open and inclusive comes in the form of the citizen–public administrator dialectic and requires intellectual, ethical, and practical engagement with competing democratic values.  相似文献   
32.
Identity fraud as a term and concept in its formative stages was often presumed to be identity theft and visa versa. However, identity theft is caused by the identities (or tokens) of individuals or organisations being stolen is an enabling precursor to identity fraud. The boundaries of identity fraud and identity theft are now better defined. The absence of specific identity crime legislation could be a cause of perpetrators not classified as breaching identity crimes but under other specific entrenched law such as benefit fraud, or credit card fraud. This metrics overlap can cause bias in crime management information systems. This study uses a multi-method approach where data was collected in both a quantitative and qualitative manner. These approaches are used as a lens for defining different classes of online identity crimes in a crime management (IS) security context. In doing so, we contribute to a deeper understanding of identity crime by specifically examining its hierarchical classes and definitions; to aid clearer structure in crime management IS. We seek to answer the questions: should current law around identity fraud continue to be reinforced and measures introduced to prevent identity crime; should laws be amended; or should new identity crime laws be constructed? We conclude and recommend a solution incorporating elements of all three.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号