首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   358篇
  免费   18篇
各国政治   46篇
工人农民   5篇
世界政治   25篇
外交国际关系   18篇
法律   205篇
中国政治   2篇
政治理论   73篇
综合类   2篇
  2024年   1篇
  2023年   3篇
  2022年   2篇
  2021年   4篇
  2020年   9篇
  2019年   7篇
  2018年   16篇
  2017年   15篇
  2016年   15篇
  2015年   16篇
  2014年   24篇
  2013年   42篇
  2012年   19篇
  2011年   13篇
  2010年   12篇
  2009年   12篇
  2008年   19篇
  2007年   19篇
  2006年   7篇
  2005年   12篇
  2004年   18篇
  2003年   19篇
  2002年   11篇
  2001年   9篇
  2000年   6篇
  1999年   6篇
  1998年   5篇
  1996年   2篇
  1995年   3篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1989年   6篇
  1988年   3篇
  1987年   2篇
  1986年   1篇
  1984年   2篇
  1983年   2篇
  1982年   1篇
  1981年   1篇
  1979年   1篇
  1974年   1篇
  1972年   1篇
  1971年   2篇
  1970年   1篇
排序方式: 共有376条查询结果,搜索用时 15 毫秒
101.
Abstract: Conducted electrical weapons (CEWs) such as the TASER® M‐ and X‐series deliver short high‐voltage, low‐current energy pulses to temporarily paralyze a person by causing electrical interruption of the body’s normal energy pulses. Despite many scientific publications, which classify the health risks of an appropriate use of the TASER device as minor, there still is a continuous uncertainty about possible side effects with human application. Based on a literature search of the National Library of Medicine’s MEDLINE database’s PubMed system of current publications, the following article describes the mechanisms by which the device operates and discusses possible pathophysiological consequences. The majority of current human literature has not found evidence of clinical relevant pathophysiological effects during and after an exposure of professionally applied CEWs. However, to be able to exclude possible health risks, a medical checkup of people who have been exposed to CEWs is essential.  相似文献   
102.
Privacy by Design (PbD) is a kind of precautionary legal technology design. It takes opportunities for fundamental rights without creating risks for them. Now the EU Commission “promised” to implement PbD with Art. 23(4) of its proposal of a General Data Protection Regulation. It suggests setting up a committee that can define technical standards for PbD. However the Commission did not keep its promise. Should it be left to the IT security experts who sit in the committee but do not have the legal expertise, to decide on our privacy or, by using overly detailed specifications, to prevent businesses from marketing innovative products? This paper asserts that the Commission's implementation of PbD is not acceptable as it stands and makes positive contributions for the work of a future PbD committee so that the Commission can keep its promise to introduce precautionary legal technology design.  相似文献   
103.
Money represents a form of trust among the members of a community. They share a belief that certain symbolic tokens constitute real value. Sceptics frequently point out that the euro area does not have the characteristics of a community. In particular they view the euro as money without a demos. According to this sceptical view, then, the euro is backed by an insufficient level of solidarity and suffers from a deficit of legitimacy. This article identifies the main flaws and contradictions of the no-demos theory. Most importantly, no-demos theory suffers from the fundamental misconception that political community and democracy are possible only in the nation-state. This conceptualisation of community represents a zero-sum understanding of community that cannot capture the dynamic interaction of multiple communities as well as complex and overlapping identities. In addition, no-demos theory is trapped in an internal contradiction. In order for democracy to be possible among the members of a community, that membership in the community is given and rests on pre-democratic criteria. I argue in this article that we need to accept the notion of disaggregated communities and should drop the concept of a unified and fully sovereign demos altogether. Moreover, under conditions in which the gap between sovereignty and authority continues to grow, European Monetary Union is actually a more democratic form of governance than the pre-Maastricht monetary regime in Europe.  相似文献   
104.
105.
Risk has become a ubiquitous tool for security governance. This paper analyzes the ongoing shift in airport/aviation security from rule-based to risk-based screening. Seeking to explore the effects of data based passenger risk assessment on privacy through the collection and processing of personal data, it is argued that risk is likely to enroll passengers into a partly voluntary, partly enforced membership in trusted traveler schemes in order to enhance the database, thus enabling a more precise assessment of risk levels. In a disciplinary spatial setting, the once distinct privacy dimensions of citizen-state and consumer-market become increasingly blurred, as law enforcement authorities seek to exploit data that was originally obtained for commercial purposes to improve risk calculations.  相似文献   
106.
107.
108.
Terms of trade, relating only to manufactured exports and imports, are calculated for a sample of 37 industrialised and developing countries over the 1967 to 1987 period. It is found that the terms of trade movements were significantly more favourable for higher‐income countries. This result highlights the importance of export diversification as part of a development strategy.  相似文献   
109.
110.
Zusammenfassung Die Kommission unabh?ngiger Sachverst?ndiger (Kommission) hat am 18.7. 2001 ihren Bericht mit Empfehlungen für ?nderungen des Parteiengesetzes dem Bundespr?sidenten übergeben (Kommission 2001). Aus diesem aktuellen Anlass werden nachfolgend zun?chst die Arbeitsweise der Kommission betrachtet und anschlie?end einige ihrer Empfehlungen einer kritischen Würdigung unterzogen.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号