全文获取类型
收费全文 | 106篇 |
免费 | 4篇 |
专业分类
各国政治 | 12篇 |
工人农民 | 1篇 |
世界政治 | 12篇 |
外交国际关系 | 10篇 |
法律 | 48篇 |
政治理论 | 25篇 |
综合类 | 2篇 |
出版年
2023年 | 2篇 |
2022年 | 1篇 |
2021年 | 2篇 |
2020年 | 1篇 |
2019年 | 7篇 |
2018年 | 5篇 |
2017年 | 4篇 |
2016年 | 5篇 |
2015年 | 4篇 |
2014年 | 8篇 |
2013年 | 12篇 |
2012年 | 7篇 |
2011年 | 7篇 |
2010年 | 1篇 |
2009年 | 4篇 |
2008年 | 3篇 |
2006年 | 5篇 |
2005年 | 3篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 2篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1998年 | 1篇 |
1997年 | 2篇 |
1996年 | 2篇 |
1994年 | 1篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1981年 | 2篇 |
1977年 | 3篇 |
1969年 | 1篇 |
1966年 | 1篇 |
1965年 | 1篇 |
排序方式: 共有110条查询结果,搜索用时 15 毫秒
21.
22.
Felix Kumah-Abiwu 《英联邦与比较政治学杂志》2017,55(2):165-186
Ghana has conducted several successful elections since 1992, but the country continues to face many threats of widespread violence due to the recurrent nature of micro-level electoral violence and the existence of vulnerabilities such as political patronage, politics of exclusion, winner-takes-all electoral system and ethnic cleavages. While these factors have been used to explain the causes of electoral violence, issue framing by political elites and its connection to electoral violence have not been adequately examined. To better understand this phenomenon, this article draws on the concept of framing to underscore the argument that issue framing and reframing by political elites tend to shape micro-level electoral violence in Ghana. 相似文献
23.
Watchdogs in Our Midst: How Presidents Monitor Coalitions in Brazil's Multiparty Presidential Regime 下载免费PDF全文
When delegating governing tasks to a coalition partner, the president would like to give a minister ample administrative powers to be able to effectively accomplish the political mission. Due to information asymmetries, the president runs the risk that this discretion might be used to pursue policy outcomes that may harm the president's preferences. This trade‐off between delegation and control is key to understanding governance strategies the president chooses to minimize agency risks and coordinate public policies. With Brazil as a case study, this article demonstrates that presidents have strategically made frequent use of junior ministers as watchdogs of coalition partners, especially when coalition allies are ideologically distant from the president's preferences. Yet neither the portfolio salience nor the president's decision to share powers with coalition partners proportionally seems to interfere in such strategic decisions. 相似文献
24.
25.
Felix E. Eboibi 《Commonwealth Law Bulletin》2020,46(1):78-109
Undoubtedly, some African states have put in place cybercrime legal frameworks and institutional policies to combat cybercrime and curtail the proliferation of the crime globally. Although the cybercrime policy implementation gap is a global problem, this paper notes that these African States have a peculiar challenge of implementation gap or lack of implementation of cybercrime legal frameworks and policies as a basis for cybercrime proliferation and this poses great concerns for internet users. Incentive is comparatively drawn from the United States of America and the United Kingdom in determining what these African governments and institutions should do towards fighting cybercrime. 相似文献
26.
A survey of main memory acquisition and analysis techniques for the windows operating system 总被引:1,自引:0,他引:1
Traditional, persistent data-oriented approaches in computer forensics face some limitations regarding a number of technological developments, e.g., rapidly increasing storage capabilities of hard drives, memory-resident malicious software applications, or the growing use of encryption routines, that make an in-time investigation more and more difficult. In order to cope with these issues, security professionals have started to examine alternative data sources and emphasize the value of volatile system information in RAM more recently. In this paper, we give an overview of the prevailing techniques and methods to collect and analyze a computer's memory. We describe the characteristics, benefits, and drawbacks of the individual solutions and outline opportunities for future research in this evolving field of IT security. 相似文献
27.
Many scholars have convincingly shown that policies diffuse between national and sub-national entities for several different reasons. Although diffusion processes are empirically proven, we witness two shortcomings in the discussion: First, there is a lack of comparative research across policy areas. Second, the question of why diffusion might not occur in a certain domain is under-theorized and lacks an empirical test. By comparing the rationale behind diffusion processes in two policy domains??energy policy and locational policy??this paper shows that two aspects matter for diffusion processes: First is the observability of policy measures, that is, how easily things can be observed by others; second is the competitiveness of the policy domain. If policy measures can be hidden easily and the policy domain is highly competitive, policy diffusion is very unlikely to happen. Therefore, we seek the integration of these two aspects in prospective diffusion research. 相似文献
28.
29.
30.