全文获取类型
收费全文 | 800篇 |
免费 | 0篇 |
专业分类
各国政治 | 3篇 |
工人农民 | 29篇 |
世界政治 | 3篇 |
外交国际关系 | 488篇 |
法律 | 240篇 |
中国政治 | 12篇 |
政治理论 | 19篇 |
综合类 | 6篇 |
出版年
2020年 | 3篇 |
2018年 | 5篇 |
2017年 | 3篇 |
2016年 | 2篇 |
2015年 | 2篇 |
2014年 | 43篇 |
2013年 | 75篇 |
2012年 | 57篇 |
2011年 | 96篇 |
2010年 | 63篇 |
2009年 | 78篇 |
2008年 | 66篇 |
2007年 | 47篇 |
2006年 | 42篇 |
2005年 | 41篇 |
2004年 | 56篇 |
2003年 | 52篇 |
2002年 | 38篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1998年 | 1篇 |
1997年 | 5篇 |
1995年 | 2篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1982年 | 1篇 |
排序方式: 共有800条查询结果,搜索用时 15 毫秒
601.
This article explores a scenario of extended nuclear opacity in the Middle East that would comprise two undeclared nuclear powers: Iran and Israel. We argue that this regional spread of nuclear opacity would act as a major driver of instability in terms of conflict prevention and non- proliferation efforts. In both cases, it would demand a profound reevaluation of security policies conducted by Western countries and their allies in the region. Extended nuclear opacity in the Middle East would mean no communication channels, and no declaratory policies. It would entail no information on security perceptions, doctrines, capabilities, or targeting policies. This scenario of nuclear opacity is worth exploring as it brings new light to several critical issues in security studies. In particular it re-emphasizes a feature sometimes considered too casually which is that deterrence, if it ever is working, is not a natural state. It is socially situated and needs solid prerequisites, among them a certain level of transparency and communication. It also offers a new perspective on the logic of “nuclear hedging” and it revives the question of security guarantees from external powers as relevant means to balance threats. 相似文献
602.
This article analyses potential end-user copyright violations associated with peer-to-peer (P2P) file sharing and the anti-piracy efforts currently underway in order to tackle them. This article discusses international developments in terms of trends, issues and solutions aimed at addressing peer-to-peer file sharing of copyrighted material. First, the article introduces P2P file sharing, its increasing significance in the growing digital media economy, and the legal issues surrounding this topic. Next, the article provides a comparative analysis of global efforts and trends in preventing digital piracy by analyzing relevant legislation, case law and practices in multiple jurisdictions, including the United States, United Kingdom, France, Sweden, and Japan. In addition, the article reviews Hong Kong's current case law and proposed legal reforms including an analysis of their deficiencies with respect to addressing P2P copyright infringement. The article concludes with an analysis of existing trends in preventive measures against copyright infringement through P2P file sharing and suggests directions on future legal and non-legal measures that Hong Kong as well as the international community can take in combating digital piracy and copyright infringement through peer-to-peer file sharing. 相似文献
603.
Pardis Moslemzadeh TehraniAuthor VitaeNazura Abdul ManapAuthor Vitae 《Computer Law & Security Report》2013
Cyberspace is a cross-national world that transcends geopolitical national borders. Jurisdiction is the focal point for any dispute arising in the international arena, because it determines which state court has the authority to settle a dispute. The objective of this paper is to analyse territorial and universal jurisdiction principles which can be specifically related to cyberspace to determine which of them is best suited to providing the appropriate jurisdiction in combating cyber terrorism and how conflicts arising between them can be settled. The transnational nature of cyber terrorism offences leads to jurisdictional complexity, thereby investigation and prosecution is difficult. Lack of harmonisation in legislating among countries leads to difficulty in investigation and prosecution of cyber terrorism offences. This paper notes that universal jurisdiction is the most feasible and effective method to deter cyber terrorism. 相似文献
604.
The Singapore Personal Data Protection Act and an assessment of future trends in data privacy reform
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development of the privacy regime in Singapore and beyond. In the course of this analysis, international standards, technological trends and recent legal developments in other jurisdictions will be considered. 相似文献
605.
Abstract Child services organisations need policies that minimise the risk of sexual abuse of the children in their care. In particular, managers (and the public) are justifiably concerned when abuse is perpetrated by individuals who should not have been working with children in the first place. Unfortunately, there has been relatively little work on determining unacceptable risk for sexually abusive behaviour in child service organisations. The purpose of this paper is to describe the contexts in which screening procedures are appropriate, review the academic literature on screening procedures and present the results of a pilot survey of current screening practices in the United Kingdom. We comment on the effectiveness of screening measures available for use by organisations and provide suggestions for improvement. Specifically, we recommend that screening procedures consider risk factors associated with the onset and persistence of child sexual abuse perpetration. 相似文献
606.
Shelley A. Price Anthony R. Beech Ian J. Mitchell Glyn W. Humphreys 《Journal of Sexual Aggression》2013,19(3):253-268
Abstract Assessing the implicit attitudes and beliefs of offenders has proved difficult over decades of work and research with offender samples. The purpose of this paper is to outline the research related to the use of the emotional Stroop task and to encourage researchers and practitioners to use it as a measure to assess the implicit attitudes of offenders within their assessments. We consider the factors that may influence Stroop results along with the research considerations that need to be taken into account when using an emotional Stroop paradigm. Currently, a significant limitation of the emotional Stroop task is a lack of standard word stimulus sets that are able to distinguish between offender types. This limitation could seriously impede further development of this tool. Suggestions for future research are proposed. 相似文献
607.
Shelley R. Poticha 《Housing Policy Debate》2013,23(4):815-819
Abstract This article argues that distressed neighborhoods greatly benefit from New Urbanist design. New Urbanists have been rebuilding distressed neighborhoods for years, and New Urbanism's mix of architecture, planning, and public policy offers inner‐city neighborhoods the best set of tools available to improve the quality of life for their residents. Principles based on flexibility and absolute rejection of formula allow New Urbanism to offer solutions for a broad range of situations. 相似文献
608.
609.
Application of the BioMek 2000 Laboratory Automation Workstation and the DNA IQ System to the extraction of forensic casework samples 总被引:1,自引:0,他引:1
Greenspoon SA Ban JD Sykes K Ballard EJ Edler SS Baisden M Covington BL 《Journal of forensic sciences》2004,49(1):29-39
Robotic systems are commonly utilized for the extraction of database samples. However, the application of robotic extraction to forensic casework samples is a more daunting task. Such a system must be versatile enough to accommodate a wide range of samples that may contain greatly varying amounts of DNA, but it must also pose no more risk of contamination than the manual DNA extraction methods. This study demonstrates that the BioMek 2000 Laboratory Automation Workstation, used in combination with the DNA IQ System, is versatile enough to accommodate the wide range of samples typically encountered by a crime laboratory. The use of a silica coated paramagnetic resin, as with the DNA IQ System, facilitates the adaptation of an open well, hands off, robotic system to the extraction of casework samples since no filtration or centrifugation steps are needed. Moreover, the DNA remains tightly coupled to the silica coated paramagnetic resin for the entire process until the elution step. A short pre-extraction incubation step is necessary prior to loading samples onto the robot and it is at this step that most modifications are made to accommodate the different sample types and substrates commonly encountered with forensic evidentiary samples. Sexual assault (mixed stain) samples, cigarette butts, blood stains, buccal swabs, and various tissue samples were successfully extracted with the BioMek 2000 Laboratory Automation Workstation and the DNA IQ System, with no evidence of contamination throughout the extensive validation studies reported here. 相似文献
610.
As a second step in our three-dimensional (3D) ultrasound research on facial tissues, orthodontic patients with available lateral cephalographs (radiographs) allowing measurements of tissues along the midline of the face were recruited for ultrasound scanning. Comparison of three points on the upper lip (A-point), chin (B-point), and nose (nasion) produced differences of varying magnitude between radiographic and ultrasound measurements, with the B-point measurement being clearly affected by head orientation. Concordance was better for A-point and best for nasion. Although extension of two-dimensional (2D) ultrasound scanning of facial tissues to 3D scanning for forensic and surgical reconstructive purposes remains a worthy goal, it must be recognized that because of the differences in technique, measurements obtained from the different visualization modalities at present vary in their comparability. 相似文献