首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1168篇
  免费   15篇
各国政治   28篇
工人农民   54篇
世界政治   48篇
外交国际关系   483篇
法律   414篇
中国政治   15篇
政治理论   139篇
综合类   2篇
  2023年   6篇
  2020年   9篇
  2019年   12篇
  2018年   15篇
  2017年   14篇
  2016年   13篇
  2015年   10篇
  2014年   47篇
  2013年   119篇
  2012年   69篇
  2011年   112篇
  2010年   70篇
  2009年   80篇
  2008年   44篇
  2007年   43篇
  2006年   61篇
  2005年   52篇
  2004年   61篇
  2003年   60篇
  2002年   52篇
  2001年   17篇
  2000年   9篇
  1999年   22篇
  1998年   6篇
  1997年   8篇
  1996年   8篇
  1995年   12篇
  1994年   6篇
  1993年   5篇
  1992年   7篇
  1991年   8篇
  1990年   7篇
  1989年   13篇
  1988年   9篇
  1987年   8篇
  1986年   10篇
  1985年   4篇
  1984年   5篇
  1983年   7篇
  1982年   5篇
  1981年   6篇
  1979年   8篇
  1978年   6篇
  1977年   4篇
  1973年   3篇
  1972年   3篇
  1971年   3篇
  1970年   3篇
  1968年   5篇
  1966年   3篇
排序方式: 共有1183条查询结果,搜索用时 15 毫秒
881.
This article explores a scenario of extended nuclear opacity in the Middle East that would comprise two undeclared nuclear powers: Iran and Israel. We argue that this regional spread of nuclear opacity would act as a major driver of instability in terms of conflict prevention and non- proliferation efforts. In both cases, it would demand a profound reevaluation of security policies conducted by Western countries and their allies in the region. Extended nuclear opacity in the Middle East would mean no communication channels, and no declaratory policies. It would entail no information on security perceptions, doctrines, capabilities, or targeting policies. This scenario of nuclear opacity is worth exploring as it brings new light to several critical issues in security studies. In particular it re-emphasizes a feature sometimes considered too casually which is that deterrence, if it ever is working, is not a natural state. It is socially situated and needs solid prerequisites, among them a certain level of transparency and communication. It also offers a new perspective on the logic of “nuclear hedging” and it revives the question of security guarantees from external powers as relevant means to balance threats.  相似文献   
882.
This article analyses potential end-user copyright violations associated with peer-to-peer (P2P) file sharing and the anti-piracy efforts currently underway in order to tackle them. This article discusses international developments in terms of trends, issues and solutions aimed at addressing peer-to-peer file sharing of copyrighted material. First, the article introduces P2P file sharing, its increasing significance in the growing digital media economy, and the legal issues surrounding this topic. Next, the article provides a comparative analysis of global efforts and trends in preventing digital piracy by analyzing relevant legislation, case law and practices in multiple jurisdictions, including the United States, United Kingdom, France, Sweden, and Japan. In addition, the article reviews Hong Kong's current case law and proposed legal reforms including an analysis of their deficiencies with respect to addressing P2P copyright infringement. The article concludes with an analysis of existing trends in preventive measures against copyright infringement through P2P file sharing and suggests directions on future legal and non-legal measures that Hong Kong as well as the international community can take in combating digital piracy and copyright infringement through peer-to-peer file sharing.  相似文献   
883.
Cyberspace is a cross-national world that transcends geopolitical national borders. Jurisdiction is the focal point for any dispute arising in the international arena, because it determines which state court has the authority to settle a dispute. The objective of this paper is to analyse territorial and universal jurisdiction principles which can be specifically related to cyberspace to determine which of them is best suited to providing the appropriate jurisdiction in combating cyber terrorism and how conflicts arising between them can be settled. The transnational nature of cyber terrorism offences leads to jurisdictional complexity, thereby investigation and prosecution is difficult. Lack of harmonisation in legislating among countries leads to difficulty in investigation and prosecution of cyber terrorism offences. This paper notes that universal jurisdiction is the most feasible and effective method to deter cyber terrorism.  相似文献   
884.
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development of the privacy regime in Singapore and beyond. In the course of this analysis, international standards, technological trends and recent legal developments in other jurisdictions will be considered.  相似文献   
885.
886.
887.
In this study, we enter the on‐going debate on committee outliers by addressing two important points. First, we dispute the conventional wisdom that committee outliers are best identified and evaluated using traditional tests of statistical significance. Contesting the appropriateness of such tests, we contend that any observed difference between chamber behaviour and floor behaviour may be substantively significant and use raw mean differences between Americans for Democratic Action (ADA) scores to examine differences between the full House of Representatives and its committees. Second, we attempt to integrate the committee outlier literature into the broader literature on the historical development of the House by using data from 20 Congresses over four decades (1951–90). This longitudinal analysis indicates that there have been interesting dynamic changes in the prevalence of committee outliers across time and committee types in patterns that are consistent with both the principal‐agent framework and the more general literature on congressional change and reform. Many of these important changes are not obvious when relying solely on traditional tests of statistical significance to examine committee outliers.  相似文献   
888.
889.
890.
The seven staff psychiatrists injured by patient attack in a large forensic hospital in five years were compared with the 47 who were not injured by attack. Thirteen percent of the psychiatrists were injured by patient attack (2.6 percent per year); 5.5 injuries per 100 person-years occurred. This rate is comparable to the rate of injury from patient attack noted among ward nursing staff during the same period. Younger psychiatrists, and psychiatrists more recently out of residency, were more likely to be injured. Male psychiatrists were injured at a rate approximately 50 percent higher than female psychiatrists, and graduates of university-affiliated residencies were three times as likely to be injured as graduates of public-sector residencies, though these differences did not reach statistical significance. A slightly higher rate of injury was noted among graduates from non-North American medical schools. Board-certification and length of service in the hospital were not related to being injured.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号