首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   673篇
  免费   5篇
各国政治   5篇
工人农民   20篇
世界政治   6篇
外交国际关系   450篇
法律   173篇
政治理论   23篇
综合类   1篇
  2024年   1篇
  2023年   1篇
  2022年   2篇
  2021年   1篇
  2020年   2篇
  2019年   7篇
  2018年   3篇
  2017年   7篇
  2016年   3篇
  2014年   44篇
  2013年   60篇
  2012年   57篇
  2011年   81篇
  2010年   59篇
  2009年   69篇
  2008年   37篇
  2007年   36篇
  2006年   39篇
  2005年   40篇
  2004年   45篇
  2003年   44篇
  2002年   37篇
  2001年   2篇
  1985年   1篇
排序方式: 共有678条查询结果,搜索用时 312 毫秒
101.
This article examines the assumptions that lead China alarmists to dismiss America's ability to impose a distant blockade as an inadequate counter to Chinese A2/AD systems. It argues that distant blockade is indeed a viable, lower cost strategy that capitalizes on America's strengths and China's weaknesses.  相似文献   
102.
This article provides a review of the history of jihadi foreign fighters in Afghanistan over the last 30 years. It details the post-9/11 period and the invasion of Afghanistan by U.S. forces, focusing on the ethnic origin of the foreign fighters and how different groups engaged in different aspects of the conflict. Additionally, the piece explains that while the foreign fighters who came to fight alongside the Taliban in Afghanistan included, among others, Uzbekistanis (not Afghan Uzbeks), Turks, and Arabs, there was also a significant force of Pakistanis—of both Pashtun and Punjabi origins—that joined, bolstering the Taliban army.  相似文献   
103.
The Pulitzer Prize-winning historian reflects on the rich intellectual fare enjoyed over weekly lunches with Harvey Sicherman. McDougall describes Harvey's mastery of traditional geopolitical analysis, as well as his deftness in adapting strategy to the late-Cold War and post-Cold War eras.  相似文献   
104.
The author reflects on our decade long conflict in Afghanistan and identifies what he considers a main contributor to the malaise. He believes it is a failure to communicate: a message of purpose which answers the oft-asked “why are we there?” question amongst Western audiences; a message of resolve on which Afghans can bet their lives that ISAF will remain there until the Taliban is beaten or compelled to reasonable compromise; and, a message of what success will look like which is accompanied by a compelling rationalization of the cost.  相似文献   
105.
This article surveys the key loci of Sino-Indian tension, situating them within the context of a classical if uneven security dilemma. It then examines the sources of stability within the relationship, arguing that the scope and intensity of conflict is attenuated by a series of military, political, economic and other factors. Lastly, the essay discusses the implications of the analysis for external powers, and the possible trajectories of the relationship.  相似文献   
106.

Purpose

This study examined the process of leaving the gang. Gang membership was conceptualized in a life course framework and the motives for why and methods for how one leaves the gang were analyzed.

Methods

Data were gathered from a sample of 84 juvenile arrestees in Arizona, all of whom left their gang. Motives for leaving the gang were organized into factors internal (push) and external (pull) to the gang, while methods for leaving the gang were organized into hostile and non-hostile modes of departure. Motives and methods were cross-classified and their correlates were examined, notably in relation to gang ties—persisting social and emotional attachments to the gang.

Results

Push motives and non-hostile methods were the modal responses for leaving the gang. While it was not uncommon to experience a hostile departure from the gang, most former gang members reported walking away without ritual violence or ceremony. This method was conditional on the motive for departure, however. None of the individuals leaving the gang for pull or external reasons experienced a hostile departure. While gang ties persisted regardless of motive or method, retaining such ties corresponded with serious consequences.

Conclusions

A life course framework is capable of organizing similarities between leaving the gang and desistance from other forms of crime and deviant groups. The process of gang desistance is consistent with asymmetrical causation. Due to limited attention to this process, a typology is introduced as a basis for understanding leaving the gang in relation to desisting from crime.  相似文献   
107.

Purpose

The past decade has been witness to a proliferation of calls for evidence-based juvenile court sanctions—including various programs, interventions, services, and strategies or approaches—that reduce recidivism and improve mental health, drug dependency, and education outcomes. At the same time, an emerging body of work has identified “proven,” “evidence-based,” “best practice,” or, more generally, “effective” efforts to achieve these outcomes. Even so, grounds for concern exist regarding the evidence-base for these and other sanctions.

Methods

This paper describes the heterogeneity of sanctioning within juvenile justice and argues that, despite substantial advances in research, the heterogeneity severely delimits the generalizability of evaluations to date. It also raises questions about how much is in fact known about the effectiveness of many juvenile justice sanctions.

Conclusion

Extant research offers grounds for optimism. Even so, explicit articulation of the limitations of this research and the need for studies that examine external validity is important for developing evidence about “what works” in juvenile justice. Implications for research and policy are discussed.  相似文献   
108.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
109.
On 1st March 2011, the scope of the CAP Code was extended, giving the Advertising Standards Authority significantly expanded powers to regulate marketing claims made by advertisers on their own websites and in other non-paid-for space under their control, such as social networking sites and company blogs. The ASA’s extended remit will apply to all sectors and all businesses and organisations which are operating from the UK, regardless of size, in a move to ensure the same standards of consumer and business protection in the digital space as in other media. The extension aims to plug a regulatory gap following a formal recommendation from a wide cross-section of UK industry.  相似文献   
110.
Is Google in its quest for search engine optimization through the creation of new technologies, which not only improves its search algorithms but also refines its search functions for users, doing it in a manner that makes it a perpetrator of primary copyright infringement or an invaluable facilitator for Internet functionality? How should the balance of interests in the treatment of creative works be recalibrated in the face of changes in search engine technology and operations, and the disputes that have arisen within the last decade in the context of the digital age and its needs? Using Google as a case study, this paper will look at the two main areas of dispute over the operations of information locator tools and services that either threatens search engine functionality and efficiency or weakens copyright holders’ exclusive rights. It proposes a concerted set of solutions through a reassessment and amendment of copyright law to optimize the social benefits and objectives of both the copyright regime and technological innovations in the electronic model of information archiving, indexing and delivery. A fair distribution of responsibilities and allocation of rights and liabilities will be suggested. In the process, due consideration will be given to both public and private interests, with the former taking precedence; while the recommended solutions will be made within the currently outdated framework for Internet intermediary protection (i.e. safe harbor laws) and exceptions (i.e. specific statutory exemptions and the general fair use defense) under the existing copyright regime. Thus, the proposed changes will be far reaching without being too radical a departure from current law, an evolution that will likely be more acceptable and realistic a solution to the problem.This paper is published in two parts. Part One of this paper published in the previous edition of the CLSR at [2011] 27 CLSR 110-131 dealt with the challenges to the copyright regime posed by the operations and technology behind the Google Images Search Engine, while Part Two will assess the benefits of the Google Books Search Project vis-à-vis the effects it will have on the scope of copyright protection. Recommendations are made to copyright law to accommodate both functions while generally preserving the main objectives of copyright protection.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号