首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1407篇
  免费   79篇
各国政治   134篇
工人农民   63篇
世界政治   93篇
外交国际关系   130篇
法律   625篇
中国共产党   1篇
中国政治   10篇
政治理论   412篇
综合类   18篇
  2023年   5篇
  2022年   9篇
  2021年   23篇
  2020年   42篇
  2019年   42篇
  2018年   50篇
  2017年   69篇
  2016年   55篇
  2015年   52篇
  2014年   51篇
  2013年   247篇
  2012年   41篇
  2011年   55篇
  2010年   40篇
  2009年   56篇
  2008年   58篇
  2007年   55篇
  2006年   44篇
  2005年   40篇
  2004年   43篇
  2003年   37篇
  2002年   44篇
  2001年   20篇
  2000年   26篇
  1999年   19篇
  1998年   29篇
  1997年   21篇
  1996年   15篇
  1995年   10篇
  1994年   20篇
  1993年   14篇
  1992年   10篇
  1991年   11篇
  1990年   14篇
  1989年   8篇
  1988年   9篇
  1987年   11篇
  1986年   10篇
  1985年   10篇
  1984年   8篇
  1983年   14篇
  1982年   5篇
  1981年   5篇
  1980年   6篇
  1979年   4篇
  1978年   4篇
  1977年   4篇
  1976年   6篇
  1974年   3篇
  1971年   3篇
排序方式: 共有1486条查询结果,搜索用时 15 毫秒
231.
The use of computers in the commission of crime, so-called ??cybercrime??, presents a considerable challenge to law enforcement. Central to the prosecution of cybercrime is the offence of unauthorised access to a computer, or ??hacking??. Originally conceived of as analogous to trespass, the trend in some jurisdictions has been toward punishing access to computer data per se. This issue also arises under the Council of Europe Convention on Cybercrime which criminalizes ??offences against the confidentiality, integrity and availability of computer data and systems??. As the criminal law traditionally provides protection only to limited forms of information, the increasing use of the criminal law to protect computer data therefore confers on it a status not enjoyed by information stored in other forms. Drawing upon the laws of Australia, the United Kingdom and the United States, this article explores the increasing criminalization of access to computer data. It describes the evolution of cybercrime laws and considers ways in which problems of over breadth may be avoided. Questions will also be raised as to the appropriate role of the criminal law in protecting information.  相似文献   
232.
We present a formal model of an intelligence agency that must divide its resources between the collection and analysis of information pertaining to terror plots. The model highlights the negative consequences of queues which form when collection exceeds analytic capacity. We incorporate the response of a terrorist organization to the operating characteristics of the intelligence system it faces, and solve for equilibrium strategies for the intelligence system and terrorist organization. Our results demonstrate the importance of properly balancing resources between collection and analysis, and stand in contrast to the observed state of overcollection in US intelligence agencies.  相似文献   
233.
Does foreign aid reduce terrorism? We examine whether foreign aid decreases terrorism by analyzing whether aid targeted toward certain sectors is more effective than others. We use the most comprehensive databases on foreign aid and transnational terrorism??AidData and ITERATE??to provide a series of statistical tests. Our results show that foreign aid decreases terrorism especially when targeted toward sectors, such as education, health, civil society, and conflict prevention. These sector-level results indicate that foreign aid can be an effective instrument in fighting terrorism if allocated in appropriate ways.  相似文献   
234.
235.
The desire to base policy at least in part upon scientific information is a clear trend in Australian governance. The growing literature on how to facilitate this intent highlights a few important principles complemented by examples from the application of social sciences. An example from a very large research project based on physical sciences responding to a national crisis is presented in the context of how it approached delivery to policy‐makers. The Murray‐Darling Basin Sustainable Yields Assessment, widely considered an outstanding success in both scientific terms and for its impact, is reviewed with respect to how the scientific challenge of assessing the future security of water resources in Australia's most important and politically contentious catchment translated into the policy domain. The lessons learned offer a potential template for science with policy intent.  相似文献   
236.
237.
238.
239.
Sevoflurane concentrations in blood, brain, and lung were measured in an individual apparently dying from sevoflurane inhalation. Sevoflurane is a volatile nonflammable fluorinated methyl isopropyl ether inhaled anesthetic, chemically related to desflurane and isoflurane. The incidence of abuse of sevoflurane is lower than that of other drugs of abuse possibly due to its inaccessibility to the general public and less pleasurable and addicting effects. The dead subject was an anesthetist found prone in bed holding an empty bottle of sevoflurane (Ultane). Serum, urine, and liver were screened for numerous drugs and metabolites using enzyme immunoassays and gas chromatography-mass spectrometry. Analysis did not reveal presence of any drug, including ethanol, other than sevoflurane. Sevoflurane was determined by headspace gas chromatography and revealed concentrations of 15 microg/mL in blood and 130 mg/kg in brain and lung. Autopsy revealed pulmonary edema and frothing in the lung, pathological findings associated with death by sevoflurane or hypoxia. The cause of death was ruled as sevoflurane toxicity and the manner of death as accident.  相似文献   
240.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号