首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   656篇
  免费   0篇
各国政治   2篇
工人农民   15篇
世界政治   1篇
外交国际关系   449篇
法律   188篇
政治理论   1篇
  2023年   1篇
  2021年   2篇
  2020年   2篇
  2019年   3篇
  2017年   2篇
  2016年   4篇
  2015年   5篇
  2014年   40篇
  2013年   56篇
  2012年   57篇
  2011年   78篇
  2010年   60篇
  2009年   71篇
  2008年   36篇
  2007年   35篇
  2006年   38篇
  2005年   39篇
  2004年   43篇
  2003年   43篇
  2002年   35篇
  2001年   2篇
  1990年   2篇
  1989年   1篇
  1966年   1篇
排序方式: 共有656条查询结果,搜索用时 15 毫秒
241.
Dr Chris Pounder has been professionally involved in delivering data protection services since the time of the Lindop Report in 1978. Here he argues for an express link between the data protection and human rights regimes. Amberhawk is a new company founded by Chris in 2008 with Sue Cullen as the vehicle for the continuation of the information law training business previously operated by Pinsent Masons LLP.  相似文献   
242.
This article focuses on the threat to Somalia by al Shabaab (The Youth), an extremist organization that controls most of southern and central Somalia. It learned its strategy and tactics from al Qaeda and the Taliban and relies heavily on a relatively small number of foreign fighters, most of whom are Somalis with foreign passports from the large Somali diaspora. The non-Somali contingent probably numbers only about 200 to 300, although it brings battlefield experience from Afghanistan and Iraq and provides al Shabaab with expertise in bomb making, remote-controlled explosions, suicide bombing and assassinations. Some of the foreigners occupy key positions in al Shabaab. The connection between al Shabaab and al Qaeda is growing stronger but has not yet reached the level of operational control by al Qaeda. Al Shabaab's draconian tactics, which are imported from outside and are anathema to most Somalis, and its foreign component may be its undoing.  相似文献   
243.
This article details how prior to the establishment of al Qaeda in the Islamic Maghreb (AGIM), Meghrebis—that is, Algerians, Moroccans, Tunisians and others--made up a significant percentage of the foreign fighters in the al Qaeda-led insurgency in Iraq, thus helping to build the trust networks between al Qaeda central and the Maghreb-based groups, culminating in the the 2007 formal affiliation of the Groupe Salafiste pour la Predication et le Combat (GSPC) with al Qaeda. Since then, an emboldened AQIM has evolved significantly, both strategically and operationally.  相似文献   
244.
This article offers an assessment of cross-Strait relations almost 30 months into the Ma Ying-jeou administration, and two years before Hu Jintao likely will begin to give up the titles that make him China's paramount leader. The article briefly describes the essential character of cross-Strait relations before President Ma came to office; reviews what has happened during his administration; clarifies what this process represents; examines what might happen in the future, and concludes with implications for other countries— particularly the United States.  相似文献   
245.
246.
Despite worries that ASEAN is becoming weak, the organization remains as strong as it ever was, given the parameters of its design. Its member countries still tightly embrace the organization's principles, the “ASEAN way.” But simple adherence to those principles can be problematic. ASEAN countries, whose national economic and political interests collide, often appeal to the same principles to back their positions. That tends to pull ASEAN in different directions. Great power policies, particularly those of China and the United States, now exacerbate the situation. At the same time, ASEAN's reliance on multilateral consensus has made it difficult to reconcile real differences among its member countries or develop unified regional responses. That can be seen in issues from the Xayaburi dam on the Mekong River to the South China Sea. The ease with which ASEAN's principles can come into conflict and its consensus-driven decision- making can become deadlocked clearly marks the limits of the “ASEAN way.”  相似文献   
247.
As long as we conceive of the fight with al Qaeda as a war, the fight will remain unwinnable and the goal of effective destruction will remain beyond our reach, according to the author. Historically speaking, modern wars require negotiated conclusions or the complete eradication of present and future threats. The former is politically impossible and the latter is historically unachievable.  相似文献   
248.
This article argues that prospects for change in North Korea and, thus, reduction in threats to regional security, lay more in rising prospects for Korean unification than in scant hopes for reform inside North Korea. It identifies several factors that have made unification a more salient idea than at any time in the last decade. First, Kim Jong Il's failing health and his youngest son's and designated heir's uncertain grip on succession mean greater risk of political instability in North Korea that could bring discontinuous change, including reunification. Second, it has become clear that the Six Party Talks and other diplomatic efforts will not produce denuclearization and reduction of the regional security threat posed by Pyongyang's weapons program. Third, the current and likely future leadership in Pyongyang is incapable of reform, making regime collapse a more likely scenario and unification a more likely route to meaningful change. Fourth, the North Korean regime has become heavily dependent on Chinese support, material and political-diplomatic. Finally, thinking about how unification might occur has shifted to scenarios that are more feasible to key parties, including South Korea, the United States and Japan.  相似文献   
249.
CLSR welcomes occasional comment pieces on issues of current importance in the law and technology field from different jurisdictions. In this instance the Government of Malta published a White Paper in October 2012 for public consultation, proposing the introduction of the following four so-called “digital rights” in the Constitution of Malta: (1) the right to Internet access; (2) the right to informational access; (3) the right to informational freedom and (4) the right to digital informational self-determination. The author believes that the proposal is indeed a step in the right direction but lacks punch where it matters most and does not go far enough.  相似文献   
250.
Risk has become a ubiquitous tool for security governance. This paper analyzes the ongoing shift in airport/aviation security from rule-based to risk-based screening. Seeking to explore the effects of data based passenger risk assessment on privacy through the collection and processing of personal data, it is argued that risk is likely to enroll passengers into a partly voluntary, partly enforced membership in trusted traveler schemes in order to enhance the database, thus enabling a more precise assessment of risk levels. In a disciplinary spatial setting, the once distinct privacy dimensions of citizen-state and consumer-market become increasingly blurred, as law enforcement authorities seek to exploit data that was originally obtained for commercial purposes to improve risk calculations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号