首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   449篇
  免费   6篇
各国政治   28篇
工人农民   76篇
世界政治   32篇
外交国际关系   13篇
法律   202篇
中国政治   3篇
政治理论   100篇
综合类   1篇
  2021年   3篇
  2020年   8篇
  2019年   9篇
  2018年   11篇
  2017年   5篇
  2016年   8篇
  2015年   14篇
  2014年   17篇
  2013年   58篇
  2012年   5篇
  2011年   17篇
  2010年   7篇
  2009年   13篇
  2008年   14篇
  2007年   21篇
  2006年   11篇
  2005年   7篇
  2004年   16篇
  2003年   11篇
  2002年   15篇
  2001年   16篇
  2000年   12篇
  1999年   4篇
  1998年   8篇
  1997年   7篇
  1996年   11篇
  1995年   4篇
  1994年   5篇
  1993年   2篇
  1992年   6篇
  1991年   4篇
  1990年   7篇
  1989年   9篇
  1988年   5篇
  1987年   7篇
  1986年   8篇
  1985年   8篇
  1984年   4篇
  1983年   6篇
  1982年   8篇
  1981年   3篇
  1980年   4篇
  1979年   2篇
  1978年   5篇
  1977年   10篇
  1976年   3篇
  1975年   3篇
  1974年   3篇
  1973年   4篇
  1968年   2篇
排序方式: 共有455条查询结果,搜索用时 15 毫秒
451.
452.
Abstract

Participants in today's financial markets confront a sea of data. While the availability of market data has benefits it also creates problems, notably those relating to questions of meaning, judgement and intervention: how to make sense of these flows – how to see the ‘market’, its futures, and thus act pre-emptively. Over more recent years financial organizations have been turning to new technologies of representation, in particular the design and application of visualization software in an effort to enable better visual imagination of and interaction with markets as they unfold in real time. ‘What you see is what you risk’ in many respects captures the thinking or at least the desire underlying the employment of the latest visualization software. The more powerful one's vision the better able one is to participate in increasingly complex financial markets, at least in theory.

Based on recent interviews with those involved in developing and using the latest visualization software within some of the key markets of global finance, and developing the influential work of Daniel Beunza and David Stark, and Karin Knorr Cetina, in particular, this paper adopts a cultural-economy-of-finance perspective to examine the implications of these new techniques of representation. The paper argues that the latest visual turn within finance should be afforded a more central position in the study of contemporary financial market practices.  相似文献   
453.
Female offender populations are growing at an unprecedented rate. The present study examines gender differences among a large sample of male and female offenders as related to seriousness of their offense and success on parole. Data analyzed were originally collected from a random sample of parole case files in California. Results revealed that although gender does significantly impact parole success, seriousness of the offense does not. Other significant factors include age at release on parole, criminal history, and measures of stability upon release. The need for wrap-around services, comprehensive treatment models, and funding for gender-specific services are discussed.  相似文献   
454.
Book reviews     

Elites, Parties and Democracy: Festschrift for Professor Mogens N. Pedersen edited by Erik Beukel, Kurt Klaudi Klausen and Poul Erik Mouritzen. Odense: Odense University Press, 1999. Pp.xii + 341. DKK 350 hb ISBN 87 7838 506 7.

Horses in Midstream: U.S. Midterm Elections and their Consequences 1894–1998 by Andrew E. Busch. Pittsburgh, PA: University of Pittsburg Press, 1999. Pp.ix + 254. $45 hb ISBN 0 8229 4105 8; $19.95 pb ISBN 0 8229 5705 1.

Race, Redistricting, and Representation: The Unintended Consequences of Black Majority Districts by David T. Canon. Chicago, IL: University of Chicago Press, 1999. Pp.xiv + 324. £35 hb ISBN 0 226 09270 4, £13 pb ISBN 0 226 09271 2.

Rulemaking: How Government Agencies Write Law and Make Policy by Cornelius M. Kerwin. Washington DC: CQ Press, 1998 Second Edition. Pp.x + 294. $28.95 pb. ISBN 156802 418 5.

The Republican Takeover of Congress edited by Dean McSweeney and John E. Owens. Basingstoke: Macmillan Press Ltd, 1998. Pp.xii + 202. £42.50 hb ISBN 0 333 66965 7.

When Women Lead: Integrative Leadership in State Legislatures by Cindy Simon Rosenthal. New York: Oxford University Press, 1998. Pp.xiv + 240. £35 hb ISBN 0 19 511540 6.

Reforming the House of Lords: Lessons from Overseas by Meg Russell. Oxford: Oxford University Press, 2000. Pp.xi + 368. £18.99 hb ISBN 0 19 829831 5.

EU Committees as Influential Policymakers edited by M.P.C.M. Van Schendelen. Aldershot: Ashgate, 1998. Pp.xiv + 294 £42.50 hb ISBN 1 84014 724 5.

The Dignity of Legislation by Jeremy Waldron. Cambridge: Cambridge University Press, 1999. Pp.xiii + 206. £35 hb ISBN 0 521 65092 5, £12.95 pb ISBN 0 521 65883 7.  相似文献   
455.

Research Summary

This qualitative interview study examined individual and social aspects in the lives of 15 hackers who started with ethical hacking before the age of 18. We examined what motivated and stimulated them to start with ethical hacking and how and why they continued. Results show that individual aspects, such as an early interest in ICT (Information and Communication Technology), the motivation to make systems more secure, and thinking of reporting vulnerabilities as a moral duty, contribute to the initiation of ethical hacking. Social aspects, such as role models, mainly play a role in the further development of the ethical hacking career. For example, peers, parents, friends, and hacker communities have a motivating and stimulating effect on young ethical hackers. Similarly, positive reactions from public and private system owners can further stimulate the development and self-image of ethical hackers.

Policy Implications

In contrast to criminal hackers, ethical hackers improve cybersecurity, for example, by reporting weaknesses or errors in computer systems. Nowadays, an increasing number of public and private organizations around the world are creating cybersecurity policies and practices around ethical hacking. The interest in hacking usually arises at an early age, making it important to gain knowledge about what stimulates and motivates young people to start and continue with ethical hacking, to inform these policies and practices. Our results show that recognition and reactions from system owners are important in the ethical hacking career. Our recommendations based on these results could stimulate more young people to take the ethical path. Simultaneously, this increases the security of public and private organizations, reducing opportunities for criminal hackers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号