全文获取类型
收费全文 | 142篇 |
免费 | 6篇 |
专业分类
各国政治 | 10篇 |
工人农民 | 10篇 |
世界政治 | 18篇 |
外交国际关系 | 19篇 |
法律 | 52篇 |
政治理论 | 38篇 |
综合类 | 1篇 |
出版年
2023年 | 3篇 |
2020年 | 4篇 |
2019年 | 4篇 |
2018年 | 5篇 |
2017年 | 11篇 |
2016年 | 12篇 |
2015年 | 3篇 |
2014年 | 5篇 |
2013年 | 34篇 |
2012年 | 1篇 |
2011年 | 4篇 |
2010年 | 6篇 |
2009年 | 3篇 |
2008年 | 1篇 |
2007年 | 2篇 |
2006年 | 4篇 |
2005年 | 4篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 7篇 |
2001年 | 3篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1994年 | 1篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1982年 | 3篇 |
1981年 | 1篇 |
1980年 | 1篇 |
1970年 | 1篇 |
排序方式: 共有148条查询结果,搜索用时 15 毫秒
141.
142.
Sam Mullins 《Terrorism and Political Violence》2013,25(2):254-285
Australian interests have been considered viable targets for Islamist terrorists since at least 2001, and Australians have suffered from attacks in Bali in 2002 and 2005, and Jakarta in 2004 and 2009. Moreover, Australian citizens have been involved in militant Islamist networks since the late 1980s, and similar to other Western countries in recent years there have been examples of “home-grown” plots to carry out domestic terrorist attacks. This article seeks to clarify the nature of the contemporary security threat within Australia by analysing the involvement of Australian citizens and residents in Islamist terrorism, both at home and abroad. The results build upon previous research findings revealing that while the profile of Australian jihadis is unique in terms of its exact manifestation, there is overall conformity with generally observed trends in Islamist terrorism in other Western countries. 相似文献
143.
How political representatives interact with constituents is contingent on the conditions under which they compete for re-election. It has been the assumption that intra-party competition shapes legislators’ incentive to cultivate a personal reputation and thereby the incentive to engage in any constituency-oriented action that reputation may be built on. Using data from the PARTIREP cross-national survey among regional and national legislators in 12 European democracies, the assumption is proven to be inaccurate: focusing on more than one action at a time, it becomes clear that district magnitude increases the time representatives spend on some constituency-oriented actions and decreases the time they spend on others (even when the electoral incentive to nurture a personal reputation is strong). The article demonstrates that representatives’ choice to engage in four constituency-oriented actions is related to the nature of these home styles and their electoral utility in a given context. 相似文献
144.
Sam Robertshaw 《European Security》2013,22(2):304-318
The 2014 crisis in Ukraine has refocused attention on Russia as a European security actor. Despite showing renewed military capability, compared to the post-Soviet period, Russian society–military relations have remained the same. This relationship (between society and the security organs) provides the key context for assessing security. Analysis of everyday militarization and the role of voluntary organizations (such as DOSAAF [Dobrovol'noe obshchestvo sodeistviya armii, aviatsii i flotu] and Nashi [Molodezhnoe demokraticheskoe antifashistskoe dvizheni]) in supporting the military can provide an important insight into Russian behaviour as a security actor. These organizations generate a pro-military outlook and at the same time provide training and activities, thus contributing to military effectiveness by developing the competency of young people prior to military service as well as increasing public knowledge of military affairs. However, strong support for the military, a lack of independent information, and an absence of a shared vision on how society–military relations should be developed and also represent political challenges in terms of everyday militarization. This dynamic is important for understanding both Russia's security posture and wider security implications for Europe. 相似文献
145.
Sam Evans M.Phil. Suzanne Noorbhai M.Sc. Zoe Lawson Ph.D. Seren Stacey‐Jones B.A. Romina Carabott M.Sc. 《Journal of forensic sciences》2013,58(3):804-810
Enhanced images may improve bite mark edge definition, assisting forensic analysis. Current contrast enhancement involves color extraction, viewing layered images by channel. A novel technique, producing a single enhanced image using the grayscale mix panel within Adobe Camera Raw®, has been developed and assessed here, allowing adjustments of multiple color channels simultaneously. Stage 1 measured RGB values in 72 versions of a color chart image; eight sliders in Photoshop® were adjusted at 25% intervals, all corresponding colors affected. Stage 2 used a bite mark image, and found only red, orange, and yellow sliders had discernable effects. Stage 3 assessed modality preference between color, grayscale, and enhanced images; on average, the 22 survey participants chose the enhanced image as better defined for nine out of 10 bite marks. The study has shown potential benefits for this new technique. However, further research is needed before use in the analysis of bite marks. 相似文献
146.
Scott Allardyce Tom Ohta Sam Tuxford Faye Weedon Sacha Wilson Osman Zafar Mark Watts 《Computer Law & Security Report》2013,29(1):83-88
This is the first edition of the Bristows column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside websites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
147.
148.
Sam S. Souryal 《Critical Criminology》2011,19(2):119-135
This article examines the practice of personal loyalty to superiors, in general, and in criminal justice agencies, in particular.
While practitioners are taught that their primarily loyalty is to the United States Constitution, State laws, departmental
rules and regulations, they are organizationally taught that personal loyalty to superiors is paramount if they wanted their career to continue and prosper. As a result many practitioners are
rightfully confused (even exhibiting paranoia) over who or what to be primarily loyal to, and at what price or risk. This unwarranted fear has been behind numerous acts of malfeasance and misfeasance;
it can lower the workers’ morale, confuses the practitioners, and destabilizes the agency’s equilibrium. This article examines
three types of workplace loyalties, and suggests, as an attempt toward reform, the use of a more sensible duty-based paradigm.
Such a paradigm can be based on four practical propositions: (1) seriously examining why personal loyalty to superiors is deemed essential, if at all, especially since it is never mentioned in the agency’s rules and regulations;
(2) taking the fear out of the language of “loyalty-disloyalty” by perhaps replacing the term with more benign and rather
measurable terms such as “performance and collaboration;” (3) strengthening dutiful supervision; and (4) maximizing professional
accountability. 相似文献