全文获取类型
收费全文 | 1168篇 |
免费 | 15篇 |
专业分类
各国政治 | 28篇 |
工人农民 | 54篇 |
世界政治 | 48篇 |
外交国际关系 | 483篇 |
法律 | 414篇 |
中国政治 | 15篇 |
政治理论 | 139篇 |
综合类 | 2篇 |
出版年
2023年 | 6篇 |
2020年 | 9篇 |
2019年 | 12篇 |
2018年 | 15篇 |
2017年 | 14篇 |
2016年 | 13篇 |
2015年 | 10篇 |
2014年 | 47篇 |
2013年 | 119篇 |
2012年 | 69篇 |
2011年 | 112篇 |
2010年 | 70篇 |
2009年 | 80篇 |
2008年 | 44篇 |
2007年 | 43篇 |
2006年 | 61篇 |
2005年 | 52篇 |
2004年 | 61篇 |
2003年 | 60篇 |
2002年 | 52篇 |
2001年 | 17篇 |
2000年 | 9篇 |
1999年 | 22篇 |
1998年 | 6篇 |
1997年 | 8篇 |
1996年 | 8篇 |
1995年 | 12篇 |
1994年 | 6篇 |
1993年 | 5篇 |
1992年 | 7篇 |
1991年 | 8篇 |
1990年 | 7篇 |
1989年 | 13篇 |
1988年 | 9篇 |
1987年 | 8篇 |
1986年 | 10篇 |
1985年 | 4篇 |
1984年 | 5篇 |
1983年 | 7篇 |
1982年 | 5篇 |
1981年 | 6篇 |
1979年 | 8篇 |
1978年 | 6篇 |
1977年 | 4篇 |
1973年 | 3篇 |
1972年 | 3篇 |
1971年 | 3篇 |
1970年 | 3篇 |
1968年 | 5篇 |
1966年 | 3篇 |
排序方式: 共有1183条查询结果,搜索用时 15 毫秒
881.
This article explores a scenario of extended nuclear opacity in the Middle East that would comprise two undeclared nuclear powers: Iran and Israel. We argue that this regional spread of nuclear opacity would act as a major driver of instability in terms of conflict prevention and non- proliferation efforts. In both cases, it would demand a profound reevaluation of security policies conducted by Western countries and their allies in the region. Extended nuclear opacity in the Middle East would mean no communication channels, and no declaratory policies. It would entail no information on security perceptions, doctrines, capabilities, or targeting policies. This scenario of nuclear opacity is worth exploring as it brings new light to several critical issues in security studies. In particular it re-emphasizes a feature sometimes considered too casually which is that deterrence, if it ever is working, is not a natural state. It is socially situated and needs solid prerequisites, among them a certain level of transparency and communication. It also offers a new perspective on the logic of “nuclear hedging” and it revives the question of security guarantees from external powers as relevant means to balance threats. 相似文献
882.
This article analyses potential end-user copyright violations associated with peer-to-peer (P2P) file sharing and the anti-piracy efforts currently underway in order to tackle them. This article discusses international developments in terms of trends, issues and solutions aimed at addressing peer-to-peer file sharing of copyrighted material. First, the article introduces P2P file sharing, its increasing significance in the growing digital media economy, and the legal issues surrounding this topic. Next, the article provides a comparative analysis of global efforts and trends in preventing digital piracy by analyzing relevant legislation, case law and practices in multiple jurisdictions, including the United States, United Kingdom, France, Sweden, and Japan. In addition, the article reviews Hong Kong's current case law and proposed legal reforms including an analysis of their deficiencies with respect to addressing P2P copyright infringement. The article concludes with an analysis of existing trends in preventive measures against copyright infringement through P2P file sharing and suggests directions on future legal and non-legal measures that Hong Kong as well as the international community can take in combating digital piracy and copyright infringement through peer-to-peer file sharing. 相似文献
883.
Pardis Moslemzadeh TehraniAuthor VitaeNazura Abdul ManapAuthor Vitae 《Computer Law & Security Report》2013
Cyberspace is a cross-national world that transcends geopolitical national borders. Jurisdiction is the focal point for any dispute arising in the international arena, because it determines which state court has the authority to settle a dispute. The objective of this paper is to analyse territorial and universal jurisdiction principles which can be specifically related to cyberspace to determine which of them is best suited to providing the appropriate jurisdiction in combating cyber terrorism and how conflicts arising between them can be settled. The transnational nature of cyber terrorism offences leads to jurisdictional complexity, thereby investigation and prosecution is difficult. Lack of harmonisation in legislating among countries leads to difficulty in investigation and prosecution of cyber terrorism offences. This paper notes that universal jurisdiction is the most feasible and effective method to deter cyber terrorism. 相似文献
884.
The Singapore Personal Data Protection Act and an assessment of future trends in data privacy reform
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development of the privacy regime in Singapore and beyond. In the course of this analysis, international standards, technological trends and recent legal developments in other jurisdictions will be considered. 相似文献
885.
886.
887.
Robert D. Brown Jennifer M. Davis L. Marvin Overby Charles E. Smith Jr. David R. Holian 《The Journal of Legislative Studies》2013,19(2):70-88
In this study, we enter the on‐going debate on committee outliers by addressing two important points. First, we dispute the conventional wisdom that committee outliers are best identified and evaluated using traditional tests of statistical significance. Contesting the appropriateness of such tests, we contend that any observed difference between chamber behaviour and floor behaviour may be substantively significant and use raw mean differences between Americans for Democratic Action (ADA) scores to examine differences between the full House of Representatives and its committees. Second, we attempt to integrate the committee outlier literature into the broader literature on the historical development of the House by using data from 20 Congresses over four decades (1951–90). This longitudinal analysis indicates that there have been interesting dynamic changes in the prevalence of committee outliers across time and committee types in patterns that are consistent with both the principal‐agent framework and the more general literature on congressional change and reform. Many of these important changes are not obvious when relying solely on traditional tests of statistical significance to examine committee outliers. 相似文献
888.
889.
890.
H Carmel M Hunter 《The Bulletin of the American Academy of Psychiatry and the Law》1991,19(3):309-316
The seven staff psychiatrists injured by patient attack in a large forensic hospital in five years were compared with the 47 who were not injured by attack. Thirteen percent of the psychiatrists were injured by patient attack (2.6 percent per year); 5.5 injuries per 100 person-years occurred. This rate is comparable to the rate of injury from patient attack noted among ward nursing staff during the same period. Younger psychiatrists, and psychiatrists more recently out of residency, were more likely to be injured. Male psychiatrists were injured at a rate approximately 50 percent higher than female psychiatrists, and graduates of university-affiliated residencies were three times as likely to be injured as graduates of public-sector residencies, though these differences did not reach statistical significance. A slightly higher rate of injury was noted among graduates from non-North American medical schools. Board-certification and length of service in the hospital were not related to being injured. 相似文献