首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   780篇
  免费   9篇
各国政治   11篇
工人农民   16篇
世界政治   10篇
外交国际关系   464篇
法律   213篇
政治理论   73篇
综合类   2篇
  2023年   1篇
  2021年   2篇
  2020年   3篇
  2019年   2篇
  2018年   9篇
  2017年   5篇
  2016年   9篇
  2015年   5篇
  2014年   42篇
  2013年   74篇
  2012年   62篇
  2011年   93篇
  2010年   60篇
  2009年   70篇
  2008年   42篇
  2007年   42篇
  2006年   40篇
  2005年   42篇
  2004年   45篇
  2003年   47篇
  2002年   43篇
  2000年   5篇
  1999年   4篇
  1998年   4篇
  1997年   3篇
  1996年   4篇
  1995年   1篇
  1994年   1篇
  1993年   2篇
  1990年   4篇
  1989年   2篇
  1988年   3篇
  1987年   1篇
  1986年   1篇
  1985年   1篇
  1984年   1篇
  1983年   1篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
  1973年   2篇
  1972年   2篇
  1969年   1篇
  1965年   1篇
排序方式: 共有789条查询结果,搜索用时 31 毫秒
761.
Bite wounds on humans have rarely been comparatively analyzed, and the behavior leading to such bites is virtually unknown. Nevertheless, the behavior of a shark is reflected in the bite structure and should be an essential part of shark-accident analysis. This paper compares 3 nonfatal accidents on humans, caused by bull sharks, Carcharhinus leucas, that occurred within a 12-month period in the same area of the Bahamas. Examination focused on wound analysis and accident reconstruction to determine the most likely bite motivation of the sharks. Two sharks targeted the left calf areas of the victims; another one bit the back area of a person. Although both calf bites had a very similar appearance, examination concluded that one of them showed the same triggering behavior as for the shark who inflicted the very different-looking back bite. Those 2 bites were competitive, whereas the other calf bite was initially of exploratory nature, turning into a stress-related bite.  相似文献   
762.
763.
Kurt Lang 《Society》1981,18(3):40-42
  相似文献   
764.
The most persuasive argument in favor of city–county consolidation has been—and remains—economic development through the formation of a strong and attractive regional community identity. Empirical evidence consistently demonstrates that appeals to voters based on reducing inner-city/suburban socioeconomic inequity and enhancing administrative efficiency are a recipe for failed consolidation campaigns.  相似文献   
765.
This article analyzes the analytical limitations of rational-choice institutionalism for the study of Latin American politics. Adherents of this approach have made important contributions by analyzing topics that Latin Americanists traditionally neglected, such as the political impact of electoral rules and the processes of legislative decision-making. But rational-choice institutionalism has difficulty explaining the complicated, variegated, and fluid patterns of Latin American politics. It overemphasizes the electoral and legislative arenas and—in general—the input side of politics; it overestimates the importance and causal impact of formal rules and institutions; it does not explain the origins of political change and often suggests a static image of political development; it offers an incomplete analysis of institutional creation by neglecting the importance of political beliefs; it cannot fully account for crisis politics; and it puts excessive, analytically arbitrary emphasis on “microfoundations.” The article questions whether these limitations can successfully be overcome, arguing that rational-choice institutionalism—while an important addition to the debate—is not inherently superior to other approaches applied in Latin American Studies. Kurt Weyland is associate professor of government at the University of Texas at Austin. He is the author of two books—Democracy without Equity: Failures of Reform in Brazil (Pittsburgh, 1996) andThe Politics of Market Reform in Fragile Democracies: Argentina, Brazil, Peru, and Venezuela (Princeton, 2002)—and of numerous journal articles on democratization, market reform, social policy, and populism in Latin America. His current research focuses on the diffusion of policy innovations across countries. I would like to thank Barry Ames, James Booth, Ruth Collier, Marcelo Costa Ferriera, Wendy Hunter, Mark Jones, Fabrice Lehoucq, Scott Mainwaring, Gerardo Munck, Anthony Pereira, Tim Power, Ken Roberts, Charles Shipan, Richard Snyder, Donna van Cott, and two anonymous reviewers for excellent comments.  相似文献   
766.
This article focuses on the interplay of energy, climate change, and national security issues in Southwest Asia, using the newer definition of “national security” to include energy security, economic development, and climate change, as well as traditional security focusing on the military aspects.  相似文献   
767.
The use of online consumer tracking methods has raised significant privacy concerns for consumers and policymakers for decades. Advertisers using these methods analyze web-viewing habits to predict consumer preferences and actions. The advertising industry in the United States has promoted self-regulatory principles to respond to these concerns. However, in December 2010, the U.S. Federal Trade Commission reported that these efforts “have been too slow and up to now have failed to provide adequate and meaningful protection.” President Barack Obama's administration has supported broader legislation for comprehensive protection of individuals' private data. The leading model for data privacy protection is the 1980 Organization for Economic Cooperation and Development (OECD) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. This article examines two leading legislative privacy proposals in the context of the OECD principles. This examination concludes that, although the proposals do not provide sufficient comprehensive privacy protections, they do fill significant gaps in current U.S. privacy laws.  相似文献   
768.
The EU institutions are increasingly addressing harmonisation by means of regulation rather than the traditional use of directives. This is particularly impacting areas such as data protection, financial services regulation and European standardisation in Information and Communications Technology. More broadly, using directly applicable regulations which may have horizontal and vertical direct effect rather than directives has important administrative and constitutional implications for their application in national law and impacts on Member States' discretion to implement supplementary legislation which falls within the remit of the regulation in question. This is of particular concern where governments implement policies which might be in contravention of these rules. This may be the case in relation to the UK government's public procurement policy which mandates royalty free standards rather than royalty bearing standards with the option for the licence holder to licence royalty free.  相似文献   
769.
Proposals for the reform or ‘modernisation’ of Council of Europe Data Protection Convention 108 have now been forwarded from the Convention's Consultative Committee for consideration by the Council of Ministers. This article assesses the changes proposed, which strengthen the obligations of Parties to implement the Convention as a matter of effective practice, not just as a law on paper. It tightens most of the existing data protection principles, and adds new ones which better align the Convention with the EU Directive (and proposed Regulation). The Convention Committee will have explicit new functions including assessing candidates for accession, and periodically reviewing implementation by existing parties. However, the proposals concerning the required standard for data export limitations are in some respects ill-defined and dangerous for data subjects. The existing standard that personal data can only be exported if the recipient provides ‘adequate’ protection has been abandoned for an undefined requirement of ‘appropriate’ protection. The article situates the risk of abandoning meaningful data export restrictions in the context of the USA's push for ‘interoperability’ of very different data protection standards.  相似文献   
770.
Although the framework for protection of computer programs has been established in the European Union more than two decades ago, it has not undergone any major changes. Opinions of Advocate General Yves Bot have convinced the Court to advance the concept of the plurality of copyright regimes applicable to software: source code, object code and documentation would be protected under the Software Directive, whereas interfaces, programming languages, data formats and software manuals are dealt with as literary works under the InfoSoc Directive. In SAS Institute v WPL, the Court also ruled that copyright in a computer program cannot be infringed where the lawful acquirer of the license neither decompiled the object code nor copied the source code of the computer program, but merely studied, observed and tested that program in order to reproduce its functionality in a second program. This ruling paves the way and acknowledges the reverse engineering efforts on the Old Continent.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号