首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   182篇
  免费   7篇
各国政治   11篇
工人农民   29篇
世界政治   29篇
外交国际关系   8篇
法律   45篇
中国政治   13篇
政治理论   53篇
综合类   1篇
  2022年   2篇
  2021年   4篇
  2019年   2篇
  2017年   5篇
  2016年   4篇
  2015年   3篇
  2014年   3篇
  2013年   17篇
  2012年   9篇
  2011年   7篇
  2010年   9篇
  2009年   4篇
  2008年   15篇
  2007年   8篇
  2006年   9篇
  2005年   2篇
  2004年   5篇
  2003年   3篇
  2002年   1篇
  2001年   4篇
  2000年   4篇
  1999年   7篇
  1998年   2篇
  1997年   3篇
  1996年   2篇
  1995年   4篇
  1994年   2篇
  1993年   1篇
  1992年   3篇
  1991年   3篇
  1990年   4篇
  1989年   4篇
  1988年   1篇
  1987年   3篇
  1986年   2篇
  1985年   4篇
  1983年   1篇
  1982年   1篇
  1981年   4篇
  1980年   2篇
  1979年   1篇
  1977年   1篇
  1969年   2篇
  1968年   2篇
  1967年   1篇
  1965年   1篇
  1964年   2篇
  1955年   1篇
  1949年   1篇
  1947年   1篇
排序方式: 共有189条查询结果,搜索用时 15 毫秒
21.
22.
23.
24.
25.
In its report published in 2004, the National Commission on Terrorist Attacks Upon the United States (known as the ‘9/11 Commission’) analyses the functioning of the Intelligence Community (ICo). It indicates that the ICo is both over‐fragmented and guilty of not sharing enough information. The Commission recommends that central control of the ICo needs to be strengthened and that more incentives for information‐sharing should be designed. This article takes a critical look at these two recommendations. Sharing information carries major risks and is therefore not something that can take place as a matter of course. Moreover, information has to be subject to a selection process before it can be shared. This selection cannot be measured objectively, so mistakes in the selection are unavoidable. Strengthening central control also poses risks: it engenders more battles over territory, it does not improve understanding of the capillaries of the organization – the capillaries being where the primary processes of information gathering, validation and assessment take place – and it involves the destruction of checks and balances. Fragmentation may even be functional since it leads to redundancy, itself a safeguard against the risk of misselecting relevant information.  相似文献   
26.
27.
28.
Employing the analytic technique of game theory, we attempt to answer questions about how individuals with different proclivities to use crime to accomplish ends, and different beliefs about society's fairness, are likely to respond to different incentives and disincentives that are derived from strain and neoclassical deterrence theories. Our analysis indicates that the crime control policies typically recommended by adherents of both theories are often logically invalid, given the premises upon which they are supposedly based. For example, our analysis suggests why punishment strategies like “three strikes and you're out” and “entitlement strategies” such as welfare and other short-term redistributive payment programs fail to deter crime. Finally, after including notions of equity with traditional rational choice assumptions, our analysis identifies a mix of theoretically derived strategies that may more effectively deter crime.  相似文献   
29.
LYNDEN  BARON H. DE 《African affairs》1947,46(185):207-216
As the republic of Liberia celebrated its centenary on the 26thJuly, the Liberian Minister was asked in May to address a jointmeeting, under the Chairmanship of Sir Drummond Shiels. Liberiaalways raises a number of important and delicate questions,so that we give a rather larger space than usual to discussion,and further comments by Mr. Lewis Smart, an engineer with extensiveknowledge of the subject.  相似文献   
30.
FEW will argue that the recently concluded beijing Games will stand as a great example in the annals of the Olympic movement. but beyond the obvious, concrete legacies represented by beijing’s entirely modernized, envy-inducing infrastructure, the true impact of the 2008 Olympics will take time to manifest itself as China continues its march forward.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号