首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   635篇
  免费   1篇
各国政治   3篇
工人农民   17篇
外交国际关系   446篇
法律   168篇
政治理论   2篇
  2019年   1篇
  2017年   1篇
  2016年   1篇
  2014年   38篇
  2013年   54篇
  2012年   59篇
  2011年   90篇
  2010年   58篇
  2009年   67篇
  2008年   35篇
  2007年   36篇
  2006年   37篇
  2005年   38篇
  2004年   42篇
  2003年   43篇
  2002年   35篇
  2001年   1篇
排序方式: 共有636条查询结果,搜索用时 62 毫秒
621.
Most interventions by outside forces to promote democracy in post-conflict states since WWII have failed. The most successful were in societies, such as Germany and Japan, featuring relatively high per capita GNP and diversified middle class economies. Among societies in general, prospects for democracy tend to diminish as per capita GNP decreases. The effects of conflict make democracy promotion considerably more difficult, particularly when poorer societies are plagued by weak institutions, corruption, religious extremism and ethnic, religious or factional animosities. Even if outsiders are able to control violence and actively promote democracy, success will depend on the underlying political culture and willingness of key political actors to play by democratic rules once the outsiders have gone. Hence, outsiders need to develop the best possible understanding of their prospects for success before committing to intervention, particularly when the resource demands are likely to be high.  相似文献   
622.
The English High Court recently refused to grant an injunction to restrain The Times newspaper from publishing the identity of an anonymous political blogger (The author of a blog v Times Newspapers Limited [2009] EWHC 1358 (QB)). The facts of the case were unusual: there was no clearly unlawful behaviour by the blogger, who was also a police officer highly critical of political figures and policies. There was also no relationship between the blogger and the journalist who deduced the blogger's identity; the court therefore focussed on the tort of misuse of private information and countervailing public interests, such as freedom of expression. This article describes the approach of the court and considers the earlier case of Mahmood v Galloway ([2006] EWHC 1286 (QB)) concerning an undercover journalist's attempt to prevent publication of photographs showing what he looked like. It also discusses whether data protection law could have a role to play in future cases concerning attempts to preserve an online author's anonymity. The conclusion of the article is that this case does not spell the end of all anonymous blogging.  相似文献   
623.
Due to a strong “Can Do” spirit and a well-engrained, albeit simplistic, notion of civilian control over the military, senior military leaders are disinclined to publicly share their disagreement with emerging national security policy. Many senior officers mistakenly believe that there are no alternatives other than just silently executing, resigning, or retiring when confronted with bad policy formulation. There are, however, options available to senior uniformed leaders when confronted with policy formulation that they, in their professional opinion, believe is flawed. Depending on the degree to which the civilian authorities are receptive to military advice and the magnitude of the threat to national security involved in the policy, senior military leaders can choose among many alternatives to widen the policy debate.  相似文献   
624.
625.
Why a combatant command for Africa? I argue that AFRICOM was formed to implement the U.S. national security strategy that seeks to strengthen states and eliminate ungoverned space, as well as establish relationships with African states that offer a means to greater state stability and foster economic development. In so doing, it counters global jihadist by denying them haven among weak governments or in ungoverned areas. It protects U.S. interests in resources by helping governments become more stable. And it competes with the Chinese approach that could worsen the status quo of ineffective states and ungoverned space. Indeed, the U.S. approach of increasing state effectiveness makes African countries less susceptible to the problems that may arise from the Chinese approach and so serves China's interests in access to natural resources.  相似文献   
626.
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
627.
CCTV networks are progressively being replaced by more flexible and adaptable video surveillance systems based on internet protocol (IP) technologies. The use of wireless IP systems allows for the emergence of flexible networks and for their customization, while at the same time video analytics is easing the retrieval of the most relevant information. These technological advances, however, bring with them threats of a new kind for fundamental freedoms that cannot always be properly assessed by current legal safeguards. This paper analyses the ability of current data protection laws in providing an adequate answer to these new risks.  相似文献   
628.
War and the East     
This article proposes three lesson plans for teaching Asian military history to High School students. Each case study—Sun Tzu's Art of War, the Mongols, and the Rise and Fall of Imperial Japan—is structured around a primary source in translation and is designed to highlight the depth and diversity of the Asian experience with war. They allow us to see the East as more than a venue for the West's wars and also to appreciate the array of indigenous military and strategic cultures that have arisen and competed in Asia over the last three millennia.  相似文献   
629.
630.
EU update     
This is the latest edition of Baker & McKenzie's column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside websites are included where possible. No responsibility is assumed for the accuracy of information contained in these links  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号