What is the Foreign Corrupt Practices Act The Foreign Corrupt Practices Act, known in common parlanceas the FCPA, is a US law passed in 1977 in response to widespreadinternational corruption involving US-based corporations and. . . [Full Text of this Article]The anti-bribery provisionsThe accounting provisionsTo whom does the Foreign Corrupt Practices Act applyWhat are the consequences of violating the Foreign Corrupt Practices Act   Omega AdvisorsSi Chan WoohBaker HughesDow ChemicalEl PasoVetco InternationalStatoil   International conventions against foreign briberyInternational prosecutions for foreign briberyOil-for-Food programme investigations (multi-national)Siemens (Germany)BAE Systems (UK and US)   The principle of successor liabilityDue diligence checklist    相似文献   
[首页] « 上一页 [15] [16] [17] [18] [19] [20] 21 [22] [23] [24] 下一页 » 末  页»
  首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   234篇
  免费   5篇
各国政治   10篇
工人农民   9篇
世界政治   16篇
外交国际关系   15篇
法律   99篇
中国政治   2篇
政治理论   88篇
  2023年   3篇
  2020年   5篇
  2019年   2篇
  2018年   10篇
  2017年   4篇
  2016年   3篇
  2015年   6篇
  2014年   2篇
  2013年   28篇
  2012年   5篇
  2011年   9篇
  2010年   5篇
  2009年   4篇
  2008年   9篇
  2007年   14篇
  2006年   3篇
  2005年   5篇
  2004年   11篇
  2003年   5篇
  2002年   9篇
  2000年   4篇
  1999年   4篇
  1995年   3篇
  1994年   5篇
  1993年   6篇
  1992年   3篇
  1991年   4篇
  1990年   4篇
  1989年   3篇
  1988年   6篇
  1987年   5篇
  1986年   2篇
  1985年   2篇
  1984年   2篇
  1983年   2篇
  1982年   3篇
  1981年   2篇
  1979年   4篇
  1978年   3篇
  1977年   3篇
  1976年   3篇
  1975年   2篇
  1974年   3篇
  1973年   1篇
  1972年   2篇
  1969年   4篇
  1967年   1篇
  1966年   1篇
  1965年   3篇
  1964年   1篇
排序方式: 共有239条查询结果,搜索用时 31 毫秒
201.
There is a widely held perception that intelligence is the purloining of secret information from foreign countries, which is then used for advantage in wartime and as an aid to diplomacy and statecraft in peacetime, and the catching of foreign spies, or counterintelligence. In reality, intelligence serves a number of other purposes, such as technology development in support of other intelligence programmes, support to treaty negotiations and monitoring, arms control, and more. Several recently declassified Cold War intelligence activities are reviewed as examples of some of the other uses and benefits of intelligence gathering, and to show that leaders, policy makers and other consumers of intelligence may choose to use, abuse or ignore it, depending upon their own predilection, prejudices, biases, or political agendas, and sometimes altering the original intent of the intelligence.  相似文献   
202.
203.
In this article, I mine President Donald Trump’s considerable writing and speaking record to synthesize the key elements of his deal‐making approach to help make better sense of his rhetoric and actions on the world’s diplomatic stage. My argument is that Trump’s coercive negotiation style is best understood through the prism of his four public roles: observer, performer, controller, and disrupter. In this article, I analyze how these roles translate into his negotiating behavior. Spotting and exploiting vulnerability is his trade; leverage and bravado are his tools. After assessing the opposing side, Trump uses leverage to threaten his counterparts’ weaknesses, while using bravado to play up the advantages of reaching an agreement on his terms. This way, he presents a drastic structured choice to his opponents, leaving them the least maneuvering space. In the final section of the paper, I illustrate how the four‐role framework helps explain Trump’s decisions in the nuclear negotiations with North Korean leader Kim Jong Un. I also consider opportunities for further research.  相似文献   
204.
205.
With three-dimensional (3D) laser scanning technology and software packages, the practice of documenting and measuring bullet trajectories has benefited from greater accuracy and reproducibility. This study investigated the accuracy and reproducibility of the bullet trajectory tools in the software package, FARO Zone 3D (FZ3D). Twelve participants were provided laser scanner data for 21 bullet trajectories on drywall panels with impact angles between 25° and 90°. When the impact plane was manually aligned by the operator, 75% of the absolute errors were within 0.91° and 0.98° for the azimuth and vertical angles, respectively. The vertical angle improved to 0.47° when impact plane alignment was taken with respect to gravity (no operator influence). Thus, manual alignment is shown to be subject to greater error than alignment with gravity. However, this study shows that the accuracy and reproducibility of the FZ3D bullet trajectory tools to be comparable with previous research studies.  相似文献   
206.
Cast-off stains are common patterns found at crime scenes involving blood shedding events. However, the analysis and interpretation of cast-off patterns remains an area lacking tools for crime scene investigators. Analyzing cast-off patterns may allow investigators to interpret the area from where an object may have been swung and thus determine the approximate location of a suspect or victim. This study looked at the position and distribution of cast-off patterns and area of origin as a starting point for the development of a method to analyze cast-off patterns. Through a series of tests using a controlled cast-off rig (n = 10), it was observed that a Path Volume Envelope (PVE) may be identified where the swinging path is contained in a volume along with an area of exclusion. The calculated center, linear position of the PVE was found to have an average error of just over 3.2 cm when compared to the known object swing path position. The maximum deviation of the PVE to the known swing path was found to be 5.0 cm with a standard deviation of 1.4 cm. Additional studies are required to investigate the effects of partial cast-off stains, wielded object velocity, direction of swing, distance from the projected surface, and other factors. The observations and analysis from this study were seen to be predictable and repeatable and may provide a possible new method for investigators to interpret cast-off stains.  相似文献   
207.
In November 2018, Butte County, California, was decimated by the Camp Fire, the deadliest wildfire in state history. Over 150,000 acres were destroyed, and at its peak, the fire consumed eighty acres per minute. The speed and intensity of the oncoming flames killed scores of people, and weeks before the fire was contained, first responders began searching through the rubble of 18,804 residences and commercial buildings. As with most mass disasters, conventional identification modalities (e.g., fingerprints, odontology, hardware) were utilized to identify victims. The intensity and duration of the fire severely degraded most of the remains, and these approaches were useful in only 22 of 84 cases. In the past, the remaining cases would have been subjected to conventional DNA analysis, which may have required months to years. Instead, Rapid DNA technology was utilized (in a rented recreational vehicle outside the Sacramento morgue) in the victim identification effort. Sixty-nine sets of remains were subjected to Rapid DNA Identification and, of these, 62 (89.9%) generated short tandem repeat profiles that were subjected to familial searching; essentially all these profiles were produced within hours of sample receipt. Samples successfully utilized for DNA identification included blood, bone, liver, muscle, soft tissue of unknown origin, and brain. In tandem with processing of 255 family reference samples, 58 victims were identified. This work represents the first use of Rapid DNA Identification in a mass casualty event, and the results support the use of Rapid DNA as an integrated tool with conventional disaster victim identification modalities.  相似文献   
208.
This study seeks to (a) identify and measure the lifetime exposure to community violence of 137 African American and Latino middle school students from a low income neighborhood and apply numerical weights to each violent event; (b) examine the relationship between the objective severity of child self reported violence exposure and the child's subjective perception of the most bothersome event; and (c) examine the relationship between child's exposure and posttraumatic stress disorder (PTSD). Results highlight that students' designation of their most bothersome exposure to community violence did not correspond to the most severe violent event they experienced. Regression analyses reveal the weight of the most severe event explains a larger percentage of the variance in PTSD compared with the relationship to victim, level of exposure, weight of the most bothersome exposure, and cumulative weight of all exposure. This study underscores the importance of assessing a child's perception of violent events.  相似文献   
209.
Smith  W. Eugene 《Society》1986,23(4):71-76
  相似文献   
210.
The first 150 words of the full text of this article appear below. Key points
  • Securities regulators and law enforcement authoritiesare increasingly active in the application of anti-bribery lawsin the global environment. This renewed emphasis on rootingout transnational corruption has substantial implications forparticipants in the global capital markets engaged in cross-bordermergers and acquisitions.
  • More than ever, there is a risk thattransactions improperly structured or subjected to inadequatedue diligence may result in unexpected criminal or civil liabilitiesof unprecedented scope and severity.
  • This article is intendedas a brief primer on the essentials of the Foreign Corrupt PracticesAct a summary of the most current global developments in globalanti-bribery enforcement, and basic guidance on the due diligenceefforts that prudent participants in a cross-border transactionshould consider.
 
   1. Primer on the Foreign Corrupt Practices Act    2. Recent FCPA enforcement    3. International foreign bribery enforcement    4. Special focus—acquisition due diligence    5. Conclusion
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号