全文获取类型
收费全文 | 430篇 |
免费 | 5篇 |
专业分类
各国政治 | 36篇 |
工人农民 | 28篇 |
世界政治 | 30篇 |
外交国际关系 | 108篇 |
法律 | 90篇 |
中国政治 | 33篇 |
政治理论 | 102篇 |
综合类 | 8篇 |
出版年
2022年 | 2篇 |
2021年 | 2篇 |
2020年 | 4篇 |
2019年 | 7篇 |
2018年 | 17篇 |
2017年 | 11篇 |
2016年 | 20篇 |
2015年 | 32篇 |
2014年 | 29篇 |
2013年 | 83篇 |
2012年 | 6篇 |
2011年 | 23篇 |
2010年 | 6篇 |
2009年 | 5篇 |
2008年 | 5篇 |
2007年 | 7篇 |
2006年 | 7篇 |
2005年 | 25篇 |
2004年 | 21篇 |
2003年 | 11篇 |
2002年 | 6篇 |
2001年 | 5篇 |
2000年 | 8篇 |
1999年 | 3篇 |
1998年 | 5篇 |
1997年 | 3篇 |
1995年 | 4篇 |
1994年 | 5篇 |
1993年 | 2篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 5篇 |
1988年 | 2篇 |
1987年 | 2篇 |
1986年 | 3篇 |
1985年 | 2篇 |
1984年 | 2篇 |
1983年 | 3篇 |
1982年 | 4篇 |
1979年 | 3篇 |
1978年 | 5篇 |
1977年 | 2篇 |
1976年 | 3篇 |
1974年 | 5篇 |
1973年 | 6篇 |
1971年 | 2篇 |
1970年 | 2篇 |
1968年 | 3篇 |
1967年 | 2篇 |
1966年 | 2篇 |
排序方式: 共有435条查询结果,搜索用时 46 毫秒
81.
Starting from 2004, China's trading partners, in particular the United States, have increasingly utilized the World Trade Organization (WTO) dispute settlement system (DSS) to challenge China's trade-related measures. As a major player in world trade, how China responds to adverse rulings is not only important to its trading partners, but also for the future of the international trade regime. China has thus far held a relatively good compliance record when facing adverse panel and/or Appellate Body rulings, except for the recent delay in full compliance in China—Publications and Audiovisual Products. Through examining the factors affecting China's decision making when targeted in a WTO dispute, this article finds that, in general, China is highly motivated to comply with the WTO DSS due to the reputational costs of noncompliance. Nevertheless, the recent delay in compliance in China—Publications and Audiovisual Products also demonstrates that successful implementation could be impeded by certain politically influential interest groups, especially when the measure at dispute is politically sensitive. 相似文献
82.
Hans Vollaard & Dorte Sindbjerg Martinsen 《West European politics》2014,37(4):711-731
Studies explaining the timeliness and correctness of the transposition of EU directives into national legislation have provided rather inconclusive findings. They do not offer a clear-cut prediction concerning the transposition of the patients’ rights directive, which is one of the first that concerns the organisation and financing of national healthcare systems. This article applies the perspective of bounded rationality to explain (irregularities in) the timely and correct transposition of EU directives. The cognitive and organisational constraints long posited by the bounded rationality perspective may affect the commonly employed explanatory factors of administrative capacities, misfit and the heterogeneity of preferences among veto players. To prevent retrospective rationalisation of the transposition process, this paper traces this process as it unfolded in Denmark and the Netherlands. As bounded rationality is apparent in the transposition processes in these relatively well-organised countries, future transposition studies should devote greater consideration to the bounded rationality perspective. 相似文献
83.
New currencies designed for user anonymity and privacy – widely referred to as “privacy coins” – have forced governments to listen and legislate, but the political motivations of these currencies are not well understood. Following the growing interest of political brands in different contexts, we provide the first systematic review of political motivations expressed in cryptocurrency whitepapers whose explicit goal is “privacy.” Many privacy coins deliberately position themselves as alternative political brands. Although cryptocurrencies are often closely associated with political philosophies that aim to diminish or subvert the power of governments and banks, advocates of privacy occupy much broader ideological ground. We present thematic trends within the privacy coin literature and identify epistemic and ethical tensions present within the communities of people calling for the adoption of entirely private currencies. 相似文献
84.
85.
86.
87.
88.
Rustum Mahmoud & Stephan Rosiny 《British Journal of Middle Eastern Studies》2018,45(2):231-250
The excessive violence that has spread across virtually all of Syria since the 2011 uprising against the regime of Bashar al-Asad has so far prevented a serious debate about feasible solutions. Together with internal power struggles and the intervention of external actors, ideational factors and identity construction are playing a key role in shaping the dynamics of the Syrian conflict. Fear of exclusion in a future order dominated by radical Islamist forces is keeping the minority groups and some secularists close to the regime. However, there are also grounds for cautious optimism: as this paper shows, most actors from the moderate opposition acknowledge the need to take the minorities’ fears seriously and to provide them with guarantees of participation in a future political order, while stopping short of the option of a power-sharing arrangement between community representatives. 相似文献
89.
While effective foreign and national security policy-making increasingly requires research that is produced outside government, little is known about how such research affects the actions of policy-makers, or why it may or may not be policy-relevant to them. This essay poses a number of criteria which can be used to weigh the policy relevance of applied social science research for national security and foreign policy issues. These criteria can be divided into content and process categories, the former including aspects of time, issue salience, format, and confidence; and the latter incorporating questions related to the origin of research, the strategy which informs it, and the tactics by which it is presented. Hopefully, such criteria can be applied to existing works, serve as guidelines for future research, and perhaps illuminate the general role of social knowledge in policy formulation.The authors wish to express their appreciation for the opportunity to participate in the National Security Education Seminar held at Colorado College, Colorado Springs, Colorado, June 18–July13, 1973, directed by Fred A. Sondermann and conducted under the auspices of the National Security Program, New York University, Frank N. Trager, Director. This paper is a revised version of a report originally prepared for the seminar. The views presented here are those of the authors, and not necessarily of any of the institutions with which they are associated. 相似文献
90.