全文获取类型
收费全文 | 1008篇 |
免费 | 4篇 |
专业分类
各国政治 | 8篇 |
工人农民 | 34篇 |
世界政治 | 23篇 |
外交国际关系 | 501篇 |
法律 | 355篇 |
中国政治 | 11篇 |
政治理论 | 75篇 |
综合类 | 5篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 1篇 |
2019年 | 5篇 |
2018年 | 2篇 |
2017年 | 4篇 |
2016年 | 6篇 |
2015年 | 4篇 |
2014年 | 40篇 |
2013年 | 95篇 |
2012年 | 64篇 |
2011年 | 102篇 |
2010年 | 68篇 |
2009年 | 75篇 |
2008年 | 74篇 |
2007年 | 56篇 |
2006年 | 47篇 |
2005年 | 45篇 |
2004年 | 58篇 |
2003年 | 56篇 |
2002年 | 41篇 |
2001年 | 5篇 |
2000年 | 6篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 6篇 |
1993年 | 7篇 |
1992年 | 5篇 |
1991年 | 7篇 |
1990年 | 6篇 |
1989年 | 6篇 |
1988年 | 14篇 |
1987年 | 14篇 |
1986年 | 5篇 |
1985年 | 5篇 |
1984年 | 11篇 |
1983年 | 6篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 8篇 |
1979年 | 6篇 |
1978年 | 5篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1975年 | 1篇 |
1974年 | 3篇 |
排序方式: 共有1012条查询结果,搜索用时 15 毫秒
901.
This article explores how both the sovereign debt crisis and the European Union's response illustrate fundamental characteristics of contemporary European integration. In the face of an unexpected emergency, national politicians took the lead and pressed ahead with more integration. The long-term results though depend on national acceptance of not just the bailout provisions but also enforcement of debt brakes mandated by the new EU treaty. This means democratic politics at the national level will continue to have a fundamental influence on EU affairs, while the North/South split will co-exist alongside a more marked separation between countries inside and outside the Eurozone. In this context of increased political turbulence within the EU, there is likely to be only a limited window of opportunity for successful negotiation of a free-trade deal with the United States. 相似文献
902.
Luis SimónAuthor VitaeDaniel FiottAuthor Vitae 《Orbis》2014,58(3):413-428
Insofar as Europe's security and cohesion have for decades been premised upon a strong American political and strategic engagement, Washington's intention to “rebalance” to Asia casts a shadow over the sustainability of a stable and coherent geopolitical order on the continent. This article argues that as the United States seeks to rebalance strategically towards the Asia-Pacific region a number of “indigenous” geopolitical trends are becoming increasingly important in Europe: an Anglo-French entente for a “maritime” Europe, a German-French “continental” project of economic and political integration, and Russia's resurgence across Europe's East. The growing prominence of competing geopolitical visions for Europe might even call into question the cohesion and direction of the institutional expressions of the U.S.- engineered Western order in Europe, namely the Atlantic Alliance and the European Union. Increasing geopolitical and institutional contestation, we contend, pose a number of challenges for both U.S. interests and European security. 相似文献
903.
Sibylle ScheipersAuthor Vitae 《Orbis》2014,58(4):566-583
The West's treatment of irregular fighters in the “war on terror” was highly problematic. This article contends that we must look beyond the assumption that political and strategic considerations compromised the law and led to the “invention” of the category of the “unlawful combatant.” Rather, the law of armed conflict itself includes strong exclusionary mechanisms towards irregular fighters. These exclusionary strands in the law came to dominate the West's strategic decision-making on the treatment of irregular fighters. Moreover, the fact that irregular fighters became such a vital issue post-9/11 was not a result of the war on terror being a new kind of war, as has often been argued. Rather, this article suggests that it reflects an identity crisis of the West's regular armed forces at the start of the twenty-first century. 相似文献
904.
Anna SimonsAuthor Vitae 《Orbis》2014,58(4):552-565
As the Department of Defense strives to take the social sciences more seriously in the face of threats emanating from the non-West, it confronts several challenges. Among them, we Westerners cannot model non-Western minds. Nor can we devise a methodology that will accurately capture contingency. We may already be doing our “scientific” best with “pattern of life” targeting. Consequently, DoD should invest more heavily in individuals who already have an affinity for, and interest in, the non-West and who show promise as future commanders and talented analysts rather than spend large sums on trying to devise more comprehensive models, methodologies, and metrics. 相似文献
905.
This research examined the demographic and offense‐related characteristics of 1,488 children who were 12 years of age or younger when transferred by juvenile court judges to criminal courts in the United States from 1985 to 2009. Juvenile court statistics show a twofold increase in the number of these children transferred between 2005 and 2009, compared to the five‐year era between 1985 and 1989. Examination of the data revealed that the major offense that precipitated most of these transfers was a nonviolent act. Given these facts, a number of key questions emerged from this study: (1) Are these transfers desirable given the potential lifelong consequences of a criminal conviction for these youngsters; (2) Do these practices accomplish a legitimate crime control function; and (3) Are these transfers just and fair given the developmental status of these children? 相似文献
906.
Cloud computing is an information technology technique that promises greater efficiency and reduced-cost to consumers, businesses and public institutions. However, to the extent it has brought better efficiency and minimal cost, the emergence of cloud computing has posed a significant regulatory challenge on the application of data protection rules particularly on the regime regulating cross-border data flow. The Data Protection Directive (DPD), which dates back to 1995, is at odds with some of the basic technological and business-related features of the cloud. As a result, it is claimed that the Directive hardly offers any help in using the legal bases to ‘process’ and ‘transfer’ data as well as to determine when a transfer to a third country occurs in cloud computing. Despite such assertions, the paper argues that the ECJ's Bodil Lindqvist decision can to a certain extent help to delineate circumstances where transfer should and should not occur in the cloud. Concomitantly, the paper demonstrates that controllers can still make the most of the available possibilities in justifying their ‘processing’ as well as ‘transferring’ of data to a third country in cloud arrangements. In doing so, the paper also portrays the challenges that arise down the road. All legal perspectives are largely drawn from EU level though examples are given from member states and other jurisdictions when relevant. 相似文献
907.
Trust has been defined in many ways, but at its core it involves acting without the knowledge needed to act. Trust in records depends on four types of knowledge about the creator or custodian of the records: reputation, past performance, competence, and the assurance of confidence in future performance. For over half a century society has been developing and adopting new computer technologies for business and communications in both the public and private realm. Frameworks for establishing trust have developed as technology has progressed. Today, individuals and organizations are increasingly saving and accessing records in cloud computing infrastructures, where we cannot assess our trust in records solely on the four types of knowledge used in the past. Drawing on research conducted at the University of British Columbia into the nature of digital records and their trustworthiness, this article presents the conceptual archival and digital forensic frameworks of trust in records and data, and explores the common law legal framework within which questions of trust in documentary evidence are being tested. Issues and challenges specific to cloud computing are introduced. 相似文献
908.
E. Rely Vîlcic?Author Vitae 《Journal of criminal justice》2012,40(2):103
The role of dismissal as a major case disposition in criminal courts in America has been largely neglected in empirical studies to date, despite long-lasting questions about its nature and important implications for justice goals. This paper is a first attempt to fill in this gap.
Purpose
Drawing on untested assumptions about a possible dismissal-reoffending connection, the paper proposes a public safety framework for examining the nature of dismissals and their consequences for the community. Under this perspective, dismissal is a function of defendants’ risk attributes and contributes to subsequent public safety threat.Methods
To test these hypotheses, predictive and causal analyses were conducted on an 800-case sample of criminal defendants in one large urban American jurisdiction, Philadelphia, Pennsylvania. Cases were sampled at the first judicial stage and followed as a cohort for one year to record disposition and post-disposition outcomes.Results
The findings indicate that defendants’ risk attributes contribute to the explanation of dismissal and that dismissal in itself adds to the probability of subsequent offending.Conclusions
The findings raise questions about the justice system goals, particularly deterrence and have important policy implications for the processing and disposition of criminal cases in American jurisdictions. 相似文献909.
Although the framework for protection of computer programs has been established in the European Union more than two decades ago, it has not undergone any major changes. Opinions of Advocate General Yves Bot have convinced the Court to advance the concept of the plurality of copyright regimes applicable to software: source code, object code and documentation would be protected under the Software Directive, whereas interfaces, programming languages, data formats and software manuals are dealt with as literary works under the InfoSoc Directive. In SAS Institute v WPL, the Court also ruled that copyright in a computer program cannot be infringed where the lawful acquirer of the license neither decompiled the object code nor copied the source code of the computer program, but merely studied, observed and tested that program in order to reproduce its functionality in a second program. This ruling paves the way and acknowledges the reverse engineering efforts on the Old Continent. 相似文献
910.
解决海事纠纷常见方式是提交法院或通过仲裁途径 ,但实际上还存在另一种解决方式—— ADR方式。本文首先介绍了 ADR的概念并阐述了 ADR在海事案件中的优点 ,然后通过介绍具体案例解释 ADR在海事案件中的应用过程 ,最后展望了 ADR在以后国际商事中的发展趋势 相似文献