首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   800篇
  免费   0篇
各国政治   3篇
工人农民   29篇
世界政治   3篇
外交国际关系   488篇
法律   240篇
中国政治   12篇
政治理论   19篇
综合类   6篇
  2020年   3篇
  2018年   5篇
  2017年   3篇
  2016年   2篇
  2015年   2篇
  2014年   43篇
  2013年   75篇
  2012年   57篇
  2011年   96篇
  2010年   63篇
  2009年   78篇
  2008年   66篇
  2007年   47篇
  2006年   42篇
  2005年   41篇
  2004年   56篇
  2003年   52篇
  2002年   38篇
  2001年   2篇
  2000年   2篇
  1999年   3篇
  1998年   1篇
  1997年   5篇
  1995年   2篇
  1994年   5篇
  1993年   3篇
  1990年   2篇
  1989年   1篇
  1988年   2篇
  1987年   1篇
  1985年   1篇
  1982年   1篇
排序方式: 共有800条查询结果,搜索用时 15 毫秒
601.
This article explores a scenario of extended nuclear opacity in the Middle East that would comprise two undeclared nuclear powers: Iran and Israel. We argue that this regional spread of nuclear opacity would act as a major driver of instability in terms of conflict prevention and non- proliferation efforts. In both cases, it would demand a profound reevaluation of security policies conducted by Western countries and their allies in the region. Extended nuclear opacity in the Middle East would mean no communication channels, and no declaratory policies. It would entail no information on security perceptions, doctrines, capabilities, or targeting policies. This scenario of nuclear opacity is worth exploring as it brings new light to several critical issues in security studies. In particular it re-emphasizes a feature sometimes considered too casually which is that deterrence, if it ever is working, is not a natural state. It is socially situated and needs solid prerequisites, among them a certain level of transparency and communication. It also offers a new perspective on the logic of “nuclear hedging” and it revives the question of security guarantees from external powers as relevant means to balance threats.  相似文献   
602.
This article analyses potential end-user copyright violations associated with peer-to-peer (P2P) file sharing and the anti-piracy efforts currently underway in order to tackle them. This article discusses international developments in terms of trends, issues and solutions aimed at addressing peer-to-peer file sharing of copyrighted material. First, the article introduces P2P file sharing, its increasing significance in the growing digital media economy, and the legal issues surrounding this topic. Next, the article provides a comparative analysis of global efforts and trends in preventing digital piracy by analyzing relevant legislation, case law and practices in multiple jurisdictions, including the United States, United Kingdom, France, Sweden, and Japan. In addition, the article reviews Hong Kong's current case law and proposed legal reforms including an analysis of their deficiencies with respect to addressing P2P copyright infringement. The article concludes with an analysis of existing trends in preventive measures against copyright infringement through P2P file sharing and suggests directions on future legal and non-legal measures that Hong Kong as well as the international community can take in combating digital piracy and copyright infringement through peer-to-peer file sharing.  相似文献   
603.
Cyberspace is a cross-national world that transcends geopolitical national borders. Jurisdiction is the focal point for any dispute arising in the international arena, because it determines which state court has the authority to settle a dispute. The objective of this paper is to analyse territorial and universal jurisdiction principles which can be specifically related to cyberspace to determine which of them is best suited to providing the appropriate jurisdiction in combating cyber terrorism and how conflicts arising between them can be settled. The transnational nature of cyber terrorism offences leads to jurisdictional complexity, thereby investigation and prosecution is difficult. Lack of harmonisation in legislating among countries leads to difficulty in investigation and prosecution of cyber terrorism offences. This paper notes that universal jurisdiction is the most feasible and effective method to deter cyber terrorism.  相似文献   
604.
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development of the privacy regime in Singapore and beyond. In the course of this analysis, international standards, technological trends and recent legal developments in other jurisdictions will be considered.  相似文献   
605.
Abstract

Child services organisations need policies that minimise the risk of sexual abuse of the children in their care. In particular, managers (and the public) are justifiably concerned when abuse is perpetrated by individuals who should not have been working with children in the first place. Unfortunately, there has been relatively little work on determining unacceptable risk for sexually abusive behaviour in child service organisations. The purpose of this paper is to describe the contexts in which screening procedures are appropriate, review the academic literature on screening procedures and present the results of a pilot survey of current screening practices in the United Kingdom. We comment on the effectiveness of screening measures available for use by organisations and provide suggestions for improvement. Specifically, we recommend that screening procedures consider risk factors associated with the onset and persistence of child sexual abuse perpetration.  相似文献   
606.
Abstract

Assessing the implicit attitudes and beliefs of offenders has proved difficult over decades of work and research with offender samples. The purpose of this paper is to outline the research related to the use of the emotional Stroop task and to encourage researchers and practitioners to use it as a measure to assess the implicit attitudes of offenders within their assessments. We consider the factors that may influence Stroop results along with the research considerations that need to be taken into account when using an emotional Stroop paradigm. Currently, a significant limitation of the emotional Stroop task is a lack of standard word stimulus sets that are able to distinguish between offender types. This limitation could seriously impede further development of this tool. Suggestions for future research are proposed.  相似文献   
607.
Abstract

This article argues that distressed neighborhoods greatly benefit from New Urbanist design. New Urbanists have been rebuilding distressed neighborhoods for years, and New Urbanism's mix of architecture, planning, and public policy offers inner‐city neighborhoods the best set of tools available to improve the quality of life for their residents. Principles based on flexibility and absolute rejection of formula allow New Urbanism to offer solutions for a broad range of situations.  相似文献   
608.
609.
Robotic systems are commonly utilized for the extraction of database samples. However, the application of robotic extraction to forensic casework samples is a more daunting task. Such a system must be versatile enough to accommodate a wide range of samples that may contain greatly varying amounts of DNA, but it must also pose no more risk of contamination than the manual DNA extraction methods. This study demonstrates that the BioMek 2000 Laboratory Automation Workstation, used in combination with the DNA IQ System, is versatile enough to accommodate the wide range of samples typically encountered by a crime laboratory. The use of a silica coated paramagnetic resin, as with the DNA IQ System, facilitates the adaptation of an open well, hands off, robotic system to the extraction of casework samples since no filtration or centrifugation steps are needed. Moreover, the DNA remains tightly coupled to the silica coated paramagnetic resin for the entire process until the elution step. A short pre-extraction incubation step is necessary prior to loading samples onto the robot and it is at this step that most modifications are made to accommodate the different sample types and substrates commonly encountered with forensic evidentiary samples. Sexual assault (mixed stain) samples, cigarette butts, blood stains, buccal swabs, and various tissue samples were successfully extracted with the BioMek 2000 Laboratory Automation Workstation and the DNA IQ System, with no evidence of contamination throughout the extensive validation studies reported here.  相似文献   
610.
As a second step in our three-dimensional (3D) ultrasound research on facial tissues, orthodontic patients with available lateral cephalographs (radiographs) allowing measurements of tissues along the midline of the face were recruited for ultrasound scanning. Comparison of three points on the upper lip (A-point), chin (B-point), and nose (nasion) produced differences of varying magnitude between radiographic and ultrasound measurements, with the B-point measurement being clearly affected by head orientation. Concordance was better for A-point and best for nasion. Although extension of two-dimensional (2D) ultrasound scanning of facial tissues to 3D scanning for forensic and surgical reconstructive purposes remains a worthy goal, it must be recognized that because of the differences in technique, measurements obtained from the different visualization modalities at present vary in their comparability.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号