全文获取类型
收费全文 | 848篇 |
免费 | 45篇 |
专业分类
各国政治 | 79篇 |
工人农民 | 67篇 |
世界政治 | 78篇 |
外交国际关系 | 56篇 |
法律 | 407篇 |
中国共产党 | 2篇 |
中国政治 | 11篇 |
政治理论 | 186篇 |
综合类 | 7篇 |
出版年
2023年 | 14篇 |
2022年 | 11篇 |
2021年 | 10篇 |
2020年 | 30篇 |
2019年 | 39篇 |
2018年 | 57篇 |
2017年 | 50篇 |
2016年 | 47篇 |
2015年 | 33篇 |
2014年 | 29篇 |
2013年 | 133篇 |
2012年 | 41篇 |
2011年 | 36篇 |
2010年 | 39篇 |
2009年 | 34篇 |
2008年 | 22篇 |
2007年 | 32篇 |
2006年 | 34篇 |
2005年 | 38篇 |
2004年 | 20篇 |
2003年 | 26篇 |
2002年 | 21篇 |
2001年 | 14篇 |
2000年 | 8篇 |
1999年 | 3篇 |
1998年 | 4篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 6篇 |
1993年 | 8篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 8篇 |
1989年 | 3篇 |
1988年 | 2篇 |
1987年 | 5篇 |
1985年 | 3篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1982年 | 2篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1979年 | 2篇 |
1978年 | 1篇 |
1977年 | 1篇 |
1976年 | 1篇 |
排序方式: 共有893条查询结果,搜索用时 0 毫秒
331.
Yun Tae Kim 《当代亚洲杂志》2013,43(1):19-37
During the period of rapid industrialisation, Korean business elites sought to establish a ruling alliance of state officials, politicians, business owners, and professional managers that formed a social coalition to influence the state and society as a whole, reinforced through extensive social and political networks with various ruling groups. The elite community has generated a high degree of self-recruitment and social closure through school, marriage and kinship networks. In this way, the leading sector of the Korean business elite has formed complex, often contingent, relations with the state elite, and acts as an integral part of the upper class in society. 相似文献
332.
The “economic miracle” of South Korea has been well documented by many scholars, but most studies have focused on the cooperative relations between the state and entrepreneurial elites, with little attention being given to the accomplishments and contribution of Korean labor to industrial development. To date there has been no comprehensive sociological study as to how workers in South Korea were “ideologically” mobilized and motivated to commit their labor power to the process of industrialization. In an attempt to redress this imbalance, this article offers an analysis of the role of Confucianism and nationalism in the state-sponsored ideology of work in South Korea during its economic boom of the 1960s and 1970s. It is argued here that both the workers' voluntary participation in industrial work and the harmony in the workplace, which were two of the most essential factors in the nation's remarkable economic success during the 1960s and 1970s, were intimately linked to a new ideology of work and entrepreneurship which combined nationalism and pro-growth Confucian precepts. The article will thus sociologically examine ways in which ideas about work in South Korea have incorporated nationalist ideals and Confucianism, and analyze the relevance of this ideology of work to the nation's phenomenal economic growth. 相似文献
333.
This article argues that North Korea can achieve an economic catch-up after decades of economic isolation and stagnation by promoting an economic opening focused on foreign trade and investment in a sustained manner. An analogy is been made with the case of Fujian Province in China, which has accomplished economic catch-up, mainly due to Taiwanese investments. To realise its potential, it is argued that North Korea treats its foreign direct investment (FDI) from South Korea as intra-Korean investment. The article also discusses the diverse modes of engagement with foreign capital that are available for North Korea, considering its own capability (absorption or management capabilities), rivalry among possible foreign investors, implications for market structure (monopoly or more competition), the nature of target technologies or facilities, opportunity for learning and transfer, and so forth. Finally, the article discusses the economic and political preconditions for such and economic catch-up. 相似文献
334.
This article utilizes a longitudinal approach to assess the visibility of women as police officers in primetime crime shows from 1950 to 2008 and compares these numbers for television to actual data on women who work as police officers in the United States. We find that as expected, annual labor force data and crime show data both indicate increases in the number of minorities and women working in the criminal justice system over time. Given the robust literature on the general underrepresentation of women on television, however, we did not expect to uncover that both White and minority women are overrepresented as police officers on television every year compared to the occupational reality. Implications of the findings are discussed. 相似文献
335.
Yee‐Yang Teing B.Sc. Ali Dehghantanha Ph.D. Kim‐Kwang Raymond Choo Ph.D. Tooska Dargahi Ph.D. Mauro Conti Ph.D. 《Journal of forensic sciences》2017,62(3):641-654
Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic is relatively new and is an under‐explored area of research. Using Symform as a case study, we seek to determine the data remnants from the use of cooperative cloud storage services. In particular, we consider both mobile devices and personal computers running various popular operating systems, namely Windows 8.1, Mac OS X Mavericks 10.9.5, Ubuntu 14.04.1 LTS, iOS 7.1.2, and Android KitKat 4.4.4. Potential artefacts recovered during the research include data relating to the installation and uninstallation of the cloud applications, log‐in to and log‐out from Symform account using the client application, file synchronization as well as their time stamp information. This research contributes to an in‐depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices. 相似文献
336.
Abdullah Azfar M.Sc. Kim‐Kwang Raymond Choo Ph.D. Lin Liu Ph.D. 《Journal of forensic sciences》2017,62(2):435-456
An Android social app taxonomy incorporating artifacts that are of forensic interest will enable users and forensic investigators to identify the personally identifiable information (PII) stored by the apps. In this study, 30 popular Android social apps were examined. Artifacts of forensic interest (e.g., contacts lists, chronology of messages, and timestamp of an added contact) were recovered. In addition, images were located, and Facebook token strings used to tie account identities and gain access to information entered into Facebook by a user were identified. Based on the findings, a two‐dimensional taxonomy of the forensic artifacts of the social apps is proposed. A comparative summary of existing forensic taxonomies of different categories of Android apps, designed to facilitate timely collection and analysis of evidentiary materials from Android devices, is presented. 相似文献
337.
338.
Christopher F.R. Tassone B.Sc. Ben Martini Ph.D. Kim‐Kwang Raymond Choo Ph.D. 《Journal of forensic sciences》2017,62(5):1197-1204
Digital forensic visualization is an understudied area despite its potential to achieve significant improvements in the efficiency of an investigation, criminal or civil. In this study, a three‐stage forensic data storage and visualization life cycle is presented. The first stage is the decoding of data, which involves preparing both structured and unstructured data for storage. In the storage stage, data are stored within our proposed database schema designed for ensuring data integrity and speed of storage and retrieval. The final stage is the visualization of stored data in a manner that facilitates user interaction. These functionalities are implemented in a proof of concept to demonstrate the utility of the proposed life cycle. The proof of concept demonstrates the utility of the proposed approach for the storage and visualization of digital forensic data. 相似文献
339.
ABSTRACTThis article critiques recent developments in training in the Australian security industry. Regulation of the industry is state- and territory-based, with eight jurisdictions enacting purpose-built legislation. Training was a key area of reform in the 1990s and early 2000s, but standards remained fragmented until 2008 when the Committee of Australian Governments agreed on a national competency framework to be implemented by 2010. However, despite the adoption of a common curriculum for core security tasks, the project derailed spectacularly in terms of consistency of standards, as revealed by a number of major inquiries and associated sources. This article analyses the reasons for this situation and recommends an alternative model to optimise competency standards in security work that includes much greater specificity in hours of instruction and in teaching and assessment methods. The lessons from this study have wider application given that deficits in security training appear to be a common problem internationally. 相似文献
340.
The aim of the present study was to evaluate the validity of the modified Kim's scoring system as a practical method of recording occlusal tooth wear and estimating age. For this purpose, 1092 pairs of maxillary and mandibular full-arch casts were randomly selected, scored, and analyzed. The results showed that the modified Kim's scoring system had excellent reliability, and that occlusal tooth wear had a positive correlation with age. Tooth wear scores of all teeth except the two lower central incisors were higher in males than in females. Calculating tables for age estimation were designed by multiple linear regression analysis. Estimated ages were within +/-5 years of actual ages in 63.5% of male subjects, and 64.0% of female subjects. The accuracy of age estimation was increased when the subjects were divided into two age groups and data were re-analyzed. Collectively, it was shown that the modified Kim's scoring system is a reliable and accurate method for age estimation, and that the data from these 1092 individuals can be used as a standard for age estimation of Korean adults. 相似文献