首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   872篇
  免费   5篇
各国政治   11篇
工人农民   24篇
世界政治   19篇
外交国际关系   458篇
法律   302篇
中国政治   1篇
政治理论   58篇
综合类   4篇
  2023年   1篇
  2022年   2篇
  2020年   5篇
  2019年   6篇
  2018年   7篇
  2017年   7篇
  2016年   13篇
  2015年   2篇
  2014年   44篇
  2013年   85篇
  2012年   64篇
  2011年   98篇
  2010年   63篇
  2009年   78篇
  2008年   42篇
  2007年   39篇
  2006年   44篇
  2005年   48篇
  2004年   57篇
  2003年   58篇
  2002年   54篇
  2001年   6篇
  2000年   6篇
  1999年   4篇
  1998年   6篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1993年   2篇
  1992年   2篇
  1991年   2篇
  1990年   2篇
  1989年   3篇
  1987年   2篇
  1986年   3篇
  1985年   5篇
  1984年   1篇
  1983年   2篇
  1980年   2篇
  1979年   1篇
  1977年   1篇
  1975年   2篇
  1972年   1篇
  1967年   2篇
排序方式: 共有877条查询结果,搜索用时 15 毫秒
801.
The West's treatment of irregular fighters in the “war on terror” was highly problematic. This article contends that we must look beyond the assumption that political and strategic considerations compromised the law and led to the “invention” of the category of the “unlawful combatant.” Rather, the law of armed conflict itself includes strong exclusionary mechanisms towards irregular fighters. These exclusionary strands in the law came to dominate the West's strategic decision-making on the treatment of irregular fighters. Moreover, the fact that irregular fighters became such a vital issue post-9/11 was not a result of the war on terror being a new kind of war, as has often been argued. Rather, this article suggests that it reflects an identity crisis of the West's regular armed forces at the start of the twenty-first century.  相似文献   
802.
As the Department of Defense strives to take the social sciences more seriously in the face of threats emanating from the non-West, it confronts several challenges. Among them, we Westerners cannot model non-Western minds. Nor can we devise a methodology that will accurately capture contingency. We may already be doing our “scientific” best with “pattern of life” targeting. Consequently, DoD should invest more heavily in individuals who already have an affinity for, and interest in, the non-West and who show promise as future commanders and talented analysts rather than spend large sums on trying to devise more comprehensive models, methodologies, and metrics.  相似文献   
803.
Cloud computing is an information technology technique that promises greater efficiency and reduced-cost to consumers, businesses and public institutions. However, to the extent it has brought better efficiency and minimal cost, the emergence of cloud computing has posed a significant regulatory challenge on the application of data protection rules particularly on the regime regulating cross-border data flow. The Data Protection Directive (DPD), which dates back to 1995, is at odds with some of the basic technological and business-related features of the cloud. As a result, it is claimed that the Directive hardly offers any help in using the legal bases to ‘process’ and ‘transfer’ data as well as to determine when a transfer to a third country occurs in cloud computing. Despite such assertions, the paper argues that the ECJ's Bodil Lindqvist decision can to a certain extent help to delineate circumstances where transfer should and should not occur in the cloud. Concomitantly, the paper demonstrates that controllers can still make the most of the available possibilities in justifying their ‘processing’ as well as ‘transferring’ of data to a third country in cloud arrangements. In doing so, the paper also portrays the challenges that arise down the road. All legal perspectives are largely drawn from EU level though examples are given from member states and other jurisdictions when relevant.  相似文献   
804.
Trust has been defined in many ways, but at its core it involves acting without the knowledge needed to act. Trust in records depends on four types of knowledge about the creator or custodian of the records: reputation, past performance, competence, and the assurance of confidence in future performance. For over half a century society has been developing and adopting new computer technologies for business and communications in both the public and private realm. Frameworks for establishing trust have developed as technology has progressed. Today, individuals and organizations are increasingly saving and accessing records in cloud computing infrastructures, where we cannot assess our trust in records solely on the four types of knowledge used in the past. Drawing on research conducted at the University of British Columbia into the nature of digital records and their trustworthiness, this article presents the conceptual archival and digital forensic frameworks of trust in records and data, and explores the common law legal framework within which questions of trust in documentary evidence are being tested. Issues and challenges specific to cloud computing are introduced.  相似文献   
805.
The role of dismissal as a major case disposition in criminal courts in America has been largely neglected in empirical studies to date, despite long-lasting questions about its nature and important implications for justice goals. This paper is a first attempt to fill in this gap.

Purpose

Drawing on untested assumptions about a possible dismissal-reoffending connection, the paper proposes a public safety framework for examining the nature of dismissals and their consequences for the community. Under this perspective, dismissal is a function of defendants’ risk attributes and contributes to subsequent public safety threat.

Methods

To test these hypotheses, predictive and causal analyses were conducted on an 800-case sample of criminal defendants in one large urban American jurisdiction, Philadelphia, Pennsylvania. Cases were sampled at the first judicial stage and followed as a cohort for one year to record disposition and post-disposition outcomes.

Results

The findings indicate that defendants’ risk attributes contribute to the explanation of dismissal and that dismissal in itself adds to the probability of subsequent offending.

Conclusions

The findings raise questions about the justice system goals, particularly deterrence and have important policy implications for the processing and disposition of criminal cases in American jurisdictions.  相似文献   
806.
807.
808.
809.
Historian John Lewis Gaddis has found precedent for the current war on terror in early American history, arguing that the British burning of the capitol in 1814 had an impact on defense policy similar to the terrorist attacks of 9/11, leading to an emphasis on preemption. In basic respects, Gaddis restates the consensus among diplomatic historians that the early republic's foreign policy focused on preemption, unilateralism, and hegemony. But these depictions of early American diplomacy conflate separate eras and ignore an opposing tradition that was more moderate and principled. They are not without some truth, but their imperious sway in histories of our country needs to be checked and balanced.  相似文献   
810.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号