首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   35篇
  免费   3篇
各国政治   14篇
世界政治   2篇
外交国际关系   6篇
法律   11篇
政治理论   5篇
  2023年   1篇
  2019年   1篇
  2018年   3篇
  2017年   1篇
  2016年   6篇
  2015年   1篇
  2014年   2篇
  2013年   4篇
  2009年   5篇
  2008年   2篇
  2007年   2篇
  2003年   1篇
  2001年   1篇
  1999年   1篇
  1997年   3篇
  1996年   1篇
  1994年   2篇
  1993年   1篇
排序方式: 共有38条查询结果,搜索用时 31 毫秒
11.
Israel's new law requiring taxpayers to report aggressive taxplanning arrangements to the Israeli Tax Authority requiresprofessionals to consider the reporting implications and therisks when advising clients.  相似文献   
12.
13.
14.
The public versus private nature of organizations influences their goals, processes, and employee values. However, existing studies have not analyzed whether and how the public nature of organizations shapes their responses to concrete social pressures. This article takes a first step toward addressing this gap by comparing the communication strategies of public organizations and businesses in response to large‐scale social protests. Specifically, we conceptualize, theorize, and empirically analyze the communication strategies of 100 organizations in response to large‐scale social protests that took place in Israel during 2011. We find that in response to these protests, public organizations tended to employ a “positive‐visibility” strategy, whereas businesses were inclined to keep a “low public profile.” We associate these different communication strategies with the relatively benign consequences of large‐scale social protests for public organizations compared with their high costs for businesses.  相似文献   
15.
Government Accountability Office reports and secondary sources reveal that the U.S. Congress has employed three distinct legislative approaches to address the federal counterterrorism information-sharing impasse: coerce, consent, and coax. One main example illustrates each approach: the Homeland Security Information Network project exemplifies the coerce approach; Intellipedia illustrates the consent approach; the office of the Program Manager of the Information Sharing Environment exemplifies the coax approach. Secondary examples are utilized including those of regional Fusion Centers, the Office of the Director of National Intelligence, and the National Counterterrorism Center. The merits and challenges of the three approaches are discussed and compared. The conclusion proposes ideas for using the approach most appropriate to specific counterterrorism challenges.  相似文献   
16.
This study examined predictors for parents’ potential for abusing their children. Two hundred and thirteen Jewish and Arab parents of children up to 6 years of age completed six questionnaires assessing child-abuse potential, childhood history of abuse/neglect, attachment style, emotional control, perceived stress, and cognitive appraisal of parenthood. Results indicated that parents who experienced childhood abuse and neglect scored significantly higher in child-abuse potential than parents without a history of abuse or neglect. A Structural Equation Model indicated that anxious and avoidant attachment mediated the experiences of abuse and neglect in childhood and emotional control; whereas emotional control deficits mediated the relationship between insecure attachment and parenthood as challenge vs. threat, leading to greater child-abuse potential. Clinical implications were discussed.  相似文献   
17.
ABSTRACT

This article examines the impact of social media on the wave of Palestinian lone-wolf attacks against Israelis from October 2015 through September 2016. My principal argument is that social media played an important role in shaping the identity, perceptions, and behavioral patterns of dozens of assailants, and was key in creating the dynamic that ultimately characterized both the spreading of the idea of lone-wolf attacks and its execution. Social media reflected reality on the ground while simultaneously nourishing, amplifying, and escalating the situation by providing a platform for the emergence of new sources of authority, including an online subculture with distinct codes and pseudo-ritual patterns to support assailants. Social media also contributed substantially to shaping the contagious character of the attacks, and their capacity to persist without direct organizational guidance, following a typical epidemiological dynamic of spread, containment, and preservation.  相似文献   
18.
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号