首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   89篇
  免费   5篇
各国政治   8篇
工人农民   5篇
世界政治   1篇
外交国际关系   2篇
法律   58篇
中国政治   1篇
政治理论   19篇
  2023年   2篇
  2022年   1篇
  2021年   2篇
  2020年   5篇
  2019年   7篇
  2018年   6篇
  2017年   4篇
  2016年   8篇
  2015年   5篇
  2014年   1篇
  2013年   8篇
  2012年   5篇
  2011年   4篇
  2010年   3篇
  2009年   7篇
  2008年   1篇
  2007年   2篇
  2006年   6篇
  2005年   5篇
  2003年   5篇
  1999年   1篇
  1998年   2篇
  1996年   1篇
  1993年   1篇
  1987年   1篇
  1985年   1篇
排序方式: 共有94条查询结果,搜索用时 15 毫秒
41.
This article explores the background of social engineering in the Bieszczady in the 1950s and 1960s, when a revolutionary political leadership ventured to impose a new socialist order in an area ravaged by war and ethnic cleansing. The article addresses two questions: first, what were the conditions that resulted in the failure of socialist engineering in the Bieszczady, and second, what were the consequences of this failure for relationships at the local level? One thesis put forward is that the relative weakness of the Polish state vis-à-vis the local setting left plenty of room for local residents to develop a dynamic social order of their own.  相似文献   
42.
43.
‘A book may be good for nothing; or there may be onlyone thing in it worth knowing; are we to read it all through?’(Samuel Johnson) This section is dedicated to the review ofideas, articles, books, films and other media. It will includereplies (and rejoinders) to articles, the evaluation of newideas or proposals, and reviews of books and articles both directlyand indirectly related to intellectual property law.
Intellectual Property Rights and the EC  相似文献   
44.
45.
46.
Recent policies and proposed regulations, including the Notice of Proposed Rulemaking for the Common Rule and the 2014 NIH Genetic Data Sharing Policy, seek to improve research subject protections. Protections for subjects whose genetic data is shared are critical to reduce risks such as loss of confidentiality, stigma, and discrimination. In the article ‘It depends whose data are being shared: considerations for genomic data sharing policies’, Robinson et al. provide a response to our article, ‘The Growth and Gaps of Genetic Data Sharing Policies’. Robinson et al. highlight the importance of individual and group preferences. In this article, we extend the conversation on models for improving protections which will mitigate consequences for individuals and groups that are vulnerable to stigma and discrimination.  相似文献   
47.
48.
Innovation diffusion is important for both firms’ profitability and countries’ economic growth. For these reasons, policies that aim to reduce the main barriers to innovation diffusion are a relevant issue on the agenda of most policy makers. Although the importance of this topic is widely recognized, few studies explore public policies that aim to enhance innovation diffusion. This article attempts to fill this literature gap. Specifically, the study aims to clarify the role of policy makers in promoting new technology diffusion, to identify the barriers that affect the process of innovation diffusion and that are relevant for public policy makers and to analyze potential policies to overcome the main barriers to the diffusion of new relevant technologies. This study shows that public policies must simultaneously address the most relevant barriers to the diffusion of a new technology to be effective. Focusing on only specific barriers by developing policies with a too narrow scope may lead to poor results. The study explores a topic that is almost neglected in the innovation management literature. On the one hand, the article provides a conceptual framework for analyzing public policies. On the other hand, it proposes an overview of the repertoire of policies that policy makers can use to overcome the most relevant barriers to the diffusion of a new technology. In doing so, it also contributes to the debate about the role of the policy maker in the process of innovation development and diffusion.  相似文献   
49.
Lyndon Johnson woke up studying whip counts, went to bed reading the Congressional Record, and invested countless hours in between translating that political intelligence into a lobbying offensive. The result, famously christened “The Johnson Treatment,” remains the archetype practitioners and political scientists cite when appraising presidential leadership on Capitol Hill. Yet Beltway folklore aside, we know little about how LBJ helped forge winning legislative coalitions. Stepping back from the (countless) colorful anecdotes, this study offers a new and systematic look at Lyndon Johnson's lobbying. Specifically, after exploring theoretical models of presidential coalition building, we then investigate their operational tenets using original data on all President Johnson's contacts, with each member of Congress, in both chambers, for every day he was president.  相似文献   
50.
ABSTRACT

Scholarship on subsidiarity conducted since the nineteenth century has developed two strands of interpretation suggesting competing models of social organisation as far as the potential location of decision-making power is concerned. While this intellectual effort has mainly concentrated on political experiences in continental Europe, and gained further traction with the principle’s recognition in European Union law, the institutional architecture of Commonwealth countries has experienced relative neglect. This collection, however, examines the debates around competing ordering principles with evidence coming from operational problems of Westminster style democracies in four world regions, and considers how a multi-disciplinary perspective can guide comparative analysis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号