首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   848篇
  免费   45篇
各国政治   79篇
工人农民   67篇
世界政治   78篇
外交国际关系   56篇
法律   407篇
中国共产党   2篇
中国政治   11篇
政治理论   186篇
综合类   7篇
  2023年   14篇
  2022年   11篇
  2021年   10篇
  2020年   30篇
  2019年   39篇
  2018年   57篇
  2017年   50篇
  2016年   47篇
  2015年   33篇
  2014年   29篇
  2013年   133篇
  2012年   41篇
  2011年   36篇
  2010年   39篇
  2009年   34篇
  2008年   22篇
  2007年   32篇
  2006年   34篇
  2005年   38篇
  2004年   20篇
  2003年   26篇
  2002年   21篇
  2001年   14篇
  2000年   8篇
  1999年   3篇
  1998年   4篇
  1997年   2篇
  1996年   3篇
  1995年   4篇
  1994年   6篇
  1993年   8篇
  1992年   4篇
  1991年   2篇
  1990年   8篇
  1989年   3篇
  1988年   2篇
  1987年   5篇
  1985年   3篇
  1984年   4篇
  1983年   5篇
  1982年   2篇
  1981年   1篇
  1980年   1篇
  1979年   2篇
  1978年   1篇
  1977年   1篇
  1976年   1篇
排序方式: 共有893条查询结果,搜索用时 0 毫秒
331.
During the period of rapid industrialisation, Korean business elites sought to establish a ruling alliance of state officials, politicians, business owners, and professional managers that formed a social coalition to influence the state and society as a whole, reinforced through extensive social and political networks with various ruling groups. The elite community has generated a high degree of self-recruitment and social closure through school, marriage and kinship networks. In this way, the leading sector of the Korean business elite has formed complex, often contingent, relations with the state elite, and acts as an integral part of the upper class in society.  相似文献   
332.
The “economic miracle” of South Korea has been well documented by many scholars, but most studies have focused on the cooperative relations between the state and entrepreneurial elites, with little attention being given to the accomplishments and contribution of Korean labor to industrial development. To date there has been no comprehensive sociological study as to how workers in South Korea were “ideologically” mobilized and motivated to commit their labor power to the process of industrialization. In an attempt to redress this imbalance, this article offers an analysis of the role of Confucianism and nationalism in the state-sponsored ideology of work in South Korea during its economic boom of the 1960s and 1970s. It is argued here that both the workers' voluntary participation in industrial work and the harmony in the workplace, which were two of the most essential factors in the nation's remarkable economic success during the 1960s and 1970s, were intimately linked to a new ideology of work and entrepreneurship which combined nationalism and pro-growth Confucian precepts. The article will thus sociologically examine ways in which ideas about work in South Korea have incorporated nationalist ideals and Confucianism, and analyze the relevance of this ideology of work to the nation's phenomenal economic growth.  相似文献   
333.
This article argues that North Korea can achieve an economic catch-up after decades of economic isolation and stagnation by promoting an economic opening focused on foreign trade and investment in a sustained manner. An analogy is been made with the case of Fujian Province in China, which has accomplished economic catch-up, mainly due to Taiwanese investments. To realise its potential, it is argued that North Korea treats its foreign direct investment (FDI) from South Korea as intra-Korean investment. The article also discusses the diverse modes of engagement with foreign capital that are available for North Korea, considering its own capability (absorption or management capabilities), rivalry among possible foreign investors, implications for market structure (monopoly or more competition), the nature of target technologies or facilities, opportunity for learning and transfer, and so forth. Finally, the article discusses the economic and political preconditions for such and economic catch-up.  相似文献   
334.
This article utilizes a longitudinal approach to assess the visibility of women as police officers in primetime crime shows from 1950 to 2008 and compares these numbers for television to actual data on women who work as police officers in the United States. We find that as expected, annual labor force data and crime show data both indicate increases in the number of minorities and women working in the criminal justice system over time. Given the robust literature on the general underrepresentation of women on television, however, we did not expect to uncover that both White and minority women are overrepresented as police officers on television every year compared to the occupational reality. Implications of the findings are discussed.  相似文献   
335.
Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic is relatively new and is an under‐explored area of research. Using Symform as a case study, we seek to determine the data remnants from the use of cooperative cloud storage services. In particular, we consider both mobile devices and personal computers running various popular operating systems, namely Windows 8.1, Mac OS X Mavericks 10.9.5, Ubuntu 14.04.1 LTS, iOS 7.1.2, and Android KitKat 4.4.4. Potential artefacts recovered during the research include data relating to the installation and uninstallation of the cloud applications, log‐in to and log‐out from Symform account using the client application, file synchronization as well as their time stamp information. This research contributes to an in‐depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices.  相似文献   
336.
An Android social app taxonomy incorporating artifacts that are of forensic interest will enable users and forensic investigators to identify the personally identifiable information (PII) stored by the apps. In this study, 30 popular Android social apps were examined. Artifacts of forensic interest (e.g., contacts lists, chronology of messages, and timestamp of an added contact) were recovered. In addition, images were located, and Facebook token strings used to tie account identities and gain access to information entered into Facebook by a user were identified. Based on the findings, a two‐dimensional taxonomy of the forensic artifacts of the social apps is proposed. A comparative summary of existing forensic taxonomies of different categories of Android apps, designed to facilitate timely collection and analysis of evidentiary materials from Android devices, is presented.  相似文献   
337.
338.
Digital forensic visualization is an understudied area despite its potential to achieve significant improvements in the efficiency of an investigation, criminal or civil. In this study, a three‐stage forensic data storage and visualization life cycle is presented. The first stage is the decoding of data, which involves preparing both structured and unstructured data for storage. In the storage stage, data are stored within our proposed database schema designed for ensuring data integrity and speed of storage and retrieval. The final stage is the visualization of stored data in a manner that facilitates user interaction. These functionalities are implemented in a proof of concept to demonstrate the utility of the proposed life cycle. The proof of concept demonstrates the utility of the proposed approach for the storage and visualization of digital forensic data.  相似文献   
339.
ABSTRACT

This article critiques recent developments in training in the Australian security industry. Regulation of the industry is state- and territory-based, with eight jurisdictions enacting purpose-built legislation. Training was a key area of reform in the 1990s and early 2000s, but standards remained fragmented until 2008 when the Committee of Australian Governments agreed on a national competency framework to be implemented by 2010. However, despite the adoption of a common curriculum for core security tasks, the project derailed spectacularly in terms of consistency of standards, as revealed by a number of major inquiries and associated sources. This article analyses the reasons for this situation and recommends an alternative model to optimise competency standards in security work that includes much greater specificity in hours of instruction and in teaching and assessment methods. The lessons from this study have wider application given that deficits in security training appear to be a common problem internationally.  相似文献   
340.
The aim of the present study was to evaluate the validity of the modified Kim's scoring system as a practical method of recording occlusal tooth wear and estimating age. For this purpose, 1092 pairs of maxillary and mandibular full-arch casts were randomly selected, scored, and analyzed. The results showed that the modified Kim's scoring system had excellent reliability, and that occlusal tooth wear had a positive correlation with age. Tooth wear scores of all teeth except the two lower central incisors were higher in males than in females. Calculating tables for age estimation were designed by multiple linear regression analysis. Estimated ages were within +/-5 years of actual ages in 63.5% of male subjects, and 64.0% of female subjects. The accuracy of age estimation was increased when the subjects were divided into two age groups and data were re-analyzed. Collectively, it was shown that the modified Kim's scoring system is a reliable and accurate method for age estimation, and that the data from these 1092 individuals can be used as a standard for age estimation of Korean adults.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号