全文获取类型
收费全文 | 639篇 |
免费 | 1篇 |
专业分类
各国政治 | 2篇 |
工人农民 | 17篇 |
世界政治 | 2篇 |
外交国际关系 | 448篇 |
法律 | 170篇 |
政治理论 | 1篇 |
出版年
2019年 | 2篇 |
2016年 | 1篇 |
2015年 | 2篇 |
2014年 | 39篇 |
2013年 | 52篇 |
2012年 | 56篇 |
2011年 | 77篇 |
2010年 | 58篇 |
2009年 | 68篇 |
2008年 | 41篇 |
2007年 | 39篇 |
2006年 | 37篇 |
2005年 | 38篇 |
2004年 | 42篇 |
2003年 | 43篇 |
2002年 | 36篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1992年 | 1篇 |
1987年 | 1篇 |
1986年 | 1篇 |
1984年 | 1篇 |
1980年 | 1篇 |
1979年 | 1篇 |
排序方式: 共有640条查询结果,搜索用时 15 毫秒
161.
David Lei Author Vitae 《Orbis》2008,52(1):139-157
As trade-driven growth and prosperity redefine both the Chinese economy and the global competitive landscape, U.S. policy makers increasingly must ponder whether the Chinese leadership will seek new options and capabilities to protect its far-reaching oceanic lifelines. As imported oil and raw minerals power the Chinese juggernaut, much of these flows traverse the Strait of Malacca and other littorals where there is little current Chinese capability to project power. In recent years, there is an ongoing debate among Chinese military circles regarding the feasibility of constructing a blue-water fleet that could change the balance of power in the Western Pacific and Indian Oceans. U.S. policy makers watch with increasing unease as a new generation of technically-savvy navy officers forcefully argue for a forward-looking maritime strategic posture that extends beyond the East and South China Seas. In addition, recent Chinese space-based and cyber warfare technology initatives bear watching as Beijing seeks to nullify key U.S. advantages in C4SRI using a high-tech variant of “asymmetric warfare.” Although it is unclear what direction future Chinese maritime strategy and doctrine will take, U.S. policy makers need to remain vigilant about rising Chinese maritime ambitions and capabilities in the future. 相似文献
162.
Beatrix Elsner Marcelo Aebi Bruno Aubusson de Cavarlay Gwladys Gillieron Hakan Hakeri Jörg-Martin Jehle Martin Killias Christopher Lewis Julia Peters Erika Roth Paul Smit Piotr Sobota Ksenjia Turkovic Marianne Wade Josef Zila 《European Journal on Criminal Policy and Research》2008,14(2-3):123-132
The article presents a special form of a European comparative synopsis. For this case examples have been chosen ranging from administrative or minor (criminal) offences to increasingly serious offences and offenders. In this way it can be comparatively demonstrated how the criminal justice systems studied handle specific cases and whether they do so in a similar or different way. 相似文献
163.
As long as we conceive of the fight with al Qaeda as a war, the fight will remain unwinnable and the goal of effective destruction will remain beyond our reach, according to the author. Historically speaking, modern wars require negotiated conclusions or the complete eradication of present and future threats. The former is politically impossible and the latter is historically unachievable. 相似文献
164.
There is growing interest in Europe in privacy impact assessment (PIA). The UK introduced the first PIA methodology in Europe in 2007, and Ireland followed in 2010. PIAs provide a way to detect potential privacy problems, take precautions and build tailored safeguards before, not after, the organisation makes heavy investments in the development of a new technology, service or product. This paper presents some findings from the Privacy Impact Assessment Framework (PIAF) project and, in particular, the project's first deliverable, which analyses the similarities and differences between PIA methodologies in Australia, Canada, Hong Kong, Ireland, New Zealand, the United Kingdom and the United States, with a view to picking out the best elements which could be used in constructing an optimised PIA methodology for Europe. The project, which began in January 2011, is being undertaken for the European Commission's Directorate General Justice. The first deliverable was completed in September. The paper provides some background on privacy impact assessment, identifies some of its benefits and discusses elements that can be used in construction of a state-of-the-art PIA methodology. 相似文献
165.
This paper explores the European Commission’s proposal for a new Regulation to update and reform data protection law in Europe. As regards the Regulation itself, without presenting an exhaustive analysis of all the provisions, this paper aims to highlight some significant changes proposed to the data protection regime by comparison between Directive 95/46 and the proposed Regulation. It takes particularly into account legislative innovation concerning data protection principles, data subjects’ rights, data controllers and data processors obligations, and the regulation of technologies. Before analyzing these innovations, it introduces some considerations about the Commission’s choice to use a Regulation instead of a Directive to harmonize national data protection regime. 相似文献
166.
The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity and exposes flaws in popular legal arguments on the subject. Problems of mistaken identity must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence of identity theft and the greater difficulty of authenticating the other transacting party. The trend to preserve the privacy of Internet users indirectly clashes with efforts to ensure transactional security in e-commerce. An indispensable prerequisite of the latter is the ability to identify the other party to the contract. The problem of mistaken identity is not new – but it assumes a different scale in e-commerce transactions. 相似文献
167.
Colin Dueck Author Vitae 《Orbis》2011,55(1):30-52
The United States has never followed only one grand strategy at a time. In this article, I develop the concept of “hybrid” grand strategies—strategies that vary by time and place, and combine the advantages (or disadvantages) of pure strategic archetypes such as containment, integration, regime change, bargaining, or non-intervention. I argue that hybrid strategies have been ubiquitous in American history, varying more by emphasis and degree than by absolute contrast. Moreover, U.S. hybrid strategies have often succeeded in accomplishing their major goals. 相似文献
168.
Clark Murdock Author VitaeAuthor Vitae 《Orbis》2011,55(4):541-557
This article hopes to contribute to the strategic content of U.S. foreign policy by offering a definition of grand strategy and case for reorienting U.S. policy around it. Rather than advocate a specific grand strategy—a matter still open for debate—the analysis concludes with a set of attributes to assess whether a proposed grand strategy constitutes a “good” grand strategy. It concludes by introducing the concept of an applied grand strategy approach, which may help to identify and assess the strategic implications of foreign policy choices. 相似文献
169.
Marie Skubak TillyerAuthor Vitae Brenda VoseAuthor Vitae 《Journal of criminal justice》2011,39(5):452
Purpose
Despite a longstanding tradition in criminology to consider the impact of neighborhood context on crime-related outcomes, criminologists have largely ignored the influence of social ecology on recidivism until recently. The purpose of the present study was to examine the main and moderating influences of social ecology on recidivism.Materials and Methods
The present study used hierarchical nonlinear modeling to estimate the effects of concentrated disadvantage, immigrant concentration, and residential stability on recidivism for a sample of offenders released from custody/supervision in 2006 and nested within Iowa counties. We controlled for individual-level risk for recidivism using the Level of Service Inventory-Revised (LSI-R), a validated risk assessment instrument. We also examined whether the relationship between LSI-R score and recidivism varied across counties, and if so, whether this variation can be explained by social structural characteristics.Results
Results indicate that residential stability was the only contextual variable significantly related to recidivism. The relationship between individual-level risk and recidivism did not vary across contexts.Conclusions
The findings suggest that the social structural context has limited influence on recidivism, while the LSI-R is a robust predictor of recidivism across contexts. We discuss the implications of our findings for theory, practice, and future research. 相似文献170.
Rolf H. WeberAuthor Vitae 《Computer Law & Security Report》2011,27(2):133-138
Accountability of governing bodies in the Internet of Things (IoT) is of major importance and requires a partly different approach than applied in the (general) Internet. Improving accountability makes the implementation of new general principles necessary in order to provide for a stable and foreseeable legal framework on which businesses can rely. In particular, standards need to be introduced that hold governing bodies accountable, information should be made more readily available and beneficiaries of accountability must be able to impose some sort of sanction on the accountable in case of non-compliance. Improving accountability by creating such framework also supports the betterment of security in the Internet of Things. 相似文献