首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   961篇
  免费   47篇
各国政治   37篇
工人农民   60篇
世界政治   71篇
外交国际关系   56篇
法律   487篇
中国政治   15篇
政治理论   272篇
综合类   10篇
  2023年   11篇
  2022年   6篇
  2021年   14篇
  2020年   33篇
  2019年   24篇
  2018年   37篇
  2017年   43篇
  2016年   50篇
  2015年   35篇
  2014年   43篇
  2013年   134篇
  2012年   35篇
  2011年   23篇
  2010年   30篇
  2009年   43篇
  2008年   37篇
  2007年   53篇
  2006年   36篇
  2005年   43篇
  2004年   24篇
  2003年   35篇
  2002年   23篇
  2001年   17篇
  2000年   17篇
  1999年   13篇
  1998年   15篇
  1997年   9篇
  1996年   7篇
  1995年   10篇
  1994年   8篇
  1993年   6篇
  1992年   10篇
  1991年   5篇
  1990年   4篇
  1989年   5篇
  1988年   9篇
  1986年   5篇
  1985年   5篇
  1984年   4篇
  1983年   2篇
  1982年   7篇
  1981年   8篇
  1980年   2篇
  1979年   6篇
  1978年   2篇
  1977年   7篇
  1976年   2篇
  1975年   2篇
  1970年   3篇
  1968年   2篇
排序方式: 共有1008条查询结果,搜索用时 0 毫秒
911.
912.
Despite repeated conflict with organized labor, the government of Carlos Salinas de Gortari (1988–94) pushed an aggressive divestment agenda that transformed Mexico into Latin America's leading privatizer. Explanations of Salinas's achievements typically emphasize centralized presidential power (including control over the ruling party) and autonomy; technocratic and political savvy; and weak labor opposition. This article questions such a pure "capacity-outcome" approach. Of equal importance are the learning effects of repeated interaction between the state and labor, which changed the course of divestment struggles and thereby influenced their outcomes. Lessons learned in successive confrontations led to patterns of interaction conducive to widescale privatization. The article develops this argument through comparative analysis of major divestment episodes in the aviation, mining, steel, and telecommunications sectors.  相似文献   
913.
This paper studies a principal-agent model of the relationship between office-holder and an electorate, where everyone is initially uninformed about the office-holder’s ability. If office-holder effort and ability interact in the determination of performance in office, then an office-holder has an incentive to learn, i.e., raise effort so that performance becomes a more accurate signal of her ability. Elections reduce the learning effect, and the reduction in this effect may more than offset the positive “re-election concerns” effect of elections on effort, implying higher effort with appointment. When this occurs, appointment of officials may welfare-dominate elections.  相似文献   
914.
Eric Croddy 《Orbis》2000,44(4):631
  相似文献   
915.
The number of private prisons run by corporate security businesses has increased rapidly throughout the past two decades. There has been a parallel increase in literature, both pro and con, comparing the efficiency and effectiveness of private and public prisons; however, private prison staff has been largely ignored. OLS regression analysis of a survey of 160 employees at a Midwestern private prison facility showed that the job characteristics of job stress, supervision, and job variety were far more important than personal characteristics of race/ethnicity, gender, age, tenure, education and position in influencing staff job satisfaction and organizational commitment. Specifically, job stress had the largest impact on job satisfaction, while quality of supervision had the greatest impact on organizational commitment.  相似文献   
916.
917.
Futility is easily defined as uselessness. The mistaken appearance that it cannot be defined is explained by difficulties applying it to particular cases. This latter problem is a major goal of clinical training and cannot be solved in a pithy statement.  相似文献   
918.
919.
Sampling site, technique, and time influence postmortem drug concentrations. In 57 cases, we studied drug concentration differences as follows: subclavian vein‐dissection/clamping versus blind stick, femoral vein‐dissection/clamping versus blind stick, right cardiac chamber, and popliteal vein‐dissection and clamping only. Cases were distributed in group #1 (all cases with both techniques), group #2 (dissection/clamping), and group #3 (blind stick). Sampled drugs were diazepam, methadone, morphine, and their metabolites. To assess PMR, mean concentrations and ratios were calculated for each group. Time‐dependent variations of blood concentrations and ratios were also assessed. Results indicate that site, method, and time may influence postmortem distribution interpretation in different ways. Popliteal blood seems less subject to PMR. In conclusion, our study is the first to evaluate concurrently three main aspects of PMR and confirms that the popliteal vein may represent a site that is more resistant to the changes seen as a result of PMR.  相似文献   
920.
This article reports on preliminary findings and recommendations of a cross-discipline project to accelerate international business-to-business automated sharing of cyber-threat intelligence, particularly IP addresses. The article outlines the project and its objectives and the importance of determining whether IP addresses can be lawfully shared as cyber threat intelligence.The goal of the project is to enhance cyber-threat intelligence sharing throughout the cyber ecosystem. The findings and recommendations from this project enable businesses to navigate the international legal environment and develop their policy and procedures to enable timely, effective and legal sharing of cyber-threat information. The project is the first of its kind in the world. It is unique in both focus and scope. Unlike the cyber-threat information sharing reviews and initiatives being developed at country and regional levels, the focus of this project and this article is on business-to-business sharing. The scope of this project in terms of the 34 jurisdictions reviewed as to their data protection requirements is more comprehensive than any similar study to date.This article focuses on the sharing of IP addresses as cyber threat intelligence in the context of the new European Union (EU) data protection initiatives agreed in December 2015 and formally adopted by the European Council and Parliament in April 2016. The new EU General Data Protection Regulation (GDPR) applies to EU member countries, a major focus of the international cyber threat sharing project. The research also reveals that EU data protection requirements, particularly the currently applicable law of the Data Protection Directive 95/46/EC (1995 Directive) (the rules of which the GDPR will replace in practice in 2018), generally form the basis of current data protection requirements in countries outside Europe. It is expected that this influence will continue and that the GDPR will shape the development of data protection internationally.In this article, the authors examine whether static and dynamic IP addresses are “personal data” as defined in the GDPR and its predecessor the 1995 Directive that is currently the model for data protection in many jurisdictions outside Europe. The authors then consider whether sharing of that data by a business without the consent of the data subject, can be justified in the public interest so as to override individual rights under Articles 7 and 8(1) of the Charter of Fundamental Rights of the European Union, which underpin EU data protection. The analysis shows that the sharing of cyber threat intelligence is in the public interest so as to override the rights of a data subject, as long as it is carried out in ways that are strictly necessary in order to achieve security objectives. The article concludes by summarizing the project findings to date, and how they inform international sharing of cyber-threat intelligence within the private sector.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号