全文获取类型
收费全文 | 2380篇 |
免费 | 42篇 |
国内免费 | 2篇 |
专业分类
各国政治 | 83篇 |
工人农民 | 30篇 |
世界政治 | 99篇 |
外交国际关系 | 211篇 |
法律 | 703篇 |
中国共产党 | 130篇 |
中国政治 | 289篇 |
政治理论 | 186篇 |
综合类 | 693篇 |
出版年
2024年 | 1篇 |
2023年 | 11篇 |
2022年 | 23篇 |
2021年 | 45篇 |
2020年 | 69篇 |
2019年 | 22篇 |
2018年 | 36篇 |
2017年 | 45篇 |
2016年 | 37篇 |
2015年 | 44篇 |
2014年 | 84篇 |
2013年 | 165篇 |
2012年 | 115篇 |
2011年 | 135篇 |
2010年 | 232篇 |
2009年 | 213篇 |
2008年 | 167篇 |
2007年 | 199篇 |
2006年 | 205篇 |
2005年 | 191篇 |
2004年 | 97篇 |
2003年 | 68篇 |
2002年 | 72篇 |
2001年 | 48篇 |
2000年 | 20篇 |
1999年 | 14篇 |
1998年 | 9篇 |
1997年 | 6篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1994年 | 8篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 6篇 |
1990年 | 5篇 |
1989年 | 4篇 |
1988年 | 7篇 |
1987年 | 4篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1982年 | 1篇 |
1981年 | 1篇 |
1977年 | 1篇 |
1975年 | 2篇 |
1969年 | 1篇 |
排序方式: 共有2424条查询结果,搜索用时 15 毫秒
981.
谭家超 《天津行政学院学报》2020,(2):79-87
监察建议是我国监察机关治理腐败问题的重要职权之一,《监察法》涉及的主要有四个条款,搭建了该项制度的基本框架,表现出公权性、合法性、治理性与程序性等特征。监察建议的类型化设置有两种路径:一是承前启后的承继进路,二是自上而下的政治进路。监察建议职权的本质是由对人监察向对事监督进行的适当延伸。在《监察法》具体实施过程中,宜将监察建议定位成“末端治理”过程中的“前端治理”手段,用以发挥其防范、效能与衔接功能。按法教义学的建构方法,监察建议职权在具体运行上应兼具合法性与合理性标准。 相似文献
982.
根据后果来证立裁判的裁判思维普遍符合法官的审判经验,但后果考量应当建立在解释规则充分运用的基础之上,从而将后果考量纳入法教义学的框架,在裁判目标上兼顾正确的裁判与可接受的裁判。为此,应当通过确立裁判后果的系统分类,限制法外因素和间接法源影响裁判后果的条件,确立后果主义审判的法律方法论,从而防范后果主义审判所形成的恣意司法的风险。 相似文献
983.
德国社会学家尼古拉斯·卢曼的社会系统论和二阶观察理论所提供的社会建构论框架,有助于我们从技术、时间、知识、决策等维度厘清技术风险形成的复杂社会机制,促进我们对政治系统和法律系统中的技术风险管制活动进行反思性观察。政治系统通过政策性决策活动规划和控制技术风险的努力,本身也会导致决策风险,政治系统因此发展出令规制失灵而被社会遗忘的应对能力;法律系统内部发展出来的风险预防原则,其功能不在于增加社会的安全水平,而是作为一种程序性反应机制,吸收因科学技术后果的不确定性所导致的环境复杂性。 相似文献
984.
对口支援是在中国政治生态环境中萌芽、发展和不断完善的由中央政府动员地方政府实施的区域援助政策,新时代我国社会的主要矛盾凸显了这一长期隐匿在国家治理光谱后的政策存在。通过对“对口支援”作用机制的分析,基于1996-2017年的省际面板数据,采用双向固定效应模型对对口支援的政策效应进行评估。研究发现:对口支援通过支援省政府能力人为定向外溢到受援省,推动了受援省各项事业的发展;不过仅依靠对口支援很难达到区域的均衡发展;支援效果在不同的对口关系中存在较大差异,受援省与支援省之间的差距在不同的对口关系中也有一定的区别。故而,对口支援需要着力提高受援省政府的自我治理能力,区域均衡还有赖于中央政府更为科学的治理策略。 相似文献
985.
Utilizing evidence from a United Kingdom (UK) road case study Private Finance Initiative (PFI) project, this article considers how the UK central government's infrastructure strategy is operationalized through accounting-based performance measures and incentive systems, and articulates how the adoption of such systems is moderated by trust practices. The findings indicate that initial government policy objectives, translated as performance indicators in the case study, failed to offer adequate incentives for contractors and created tensions. However, controls were later developed through inter-party trust practices for managing performance and relational risk. These findings have important implications for PFI policy and practice, including that negotiation can: (i) lead to pragmatic controls being introduced to foster cooperation and trust-building; and (ii) provide opportunities for adapting the monitoring and incentive mechanisms. This study also contributes to the previous literature where PFI control systems were largely regarded as inadequate for dealing with unforeseen conflicts between parties. 相似文献
986.
987.
冲突与平衡:诱惑侦查与人权保障的法律分析 总被引:2,自引:0,他引:2
诱惑侦查与公民的人身自由权、隐私权、生命健康权和财产权等之间存在着矛盾与冲突,我国立法在此方面的规定却完全空白.因此,有必要借鉴西方法治国家关于诱惑侦查立法经验,在修改刑事诉讼法或其他相关法律时,将其作为一种独立的侦查行为加以规定,并对诱惑侦查的适用主体、范围、对象、行为方式、程序控制等方面做出规定,以实现诱惑侦查与人权保障之平衡. 相似文献
988.
A new method was developed for pre-concentration, chiral separation and determination of multiple illicit drugs on forensic samples using dispersive liquid-liquid microextraction (DLLME) and capillary electrophoresis (CE) with Ultra Violet (UV) detection. The method was based on the formation of tiny droplets of an organic extractant in the prepared sample solution using water-immiscible organic solvent (chloroform) dissolved in water-miscible organic dispersive solvent (isopropyl alcohol). The organic phase, which extracted heroin, DL-methamphetamine, DL-3, 4-methylenedioxymethamphetamine and dl-ketamine from the prepared sample solution, was separated by centrifuging. The sedimented phase was transferred into a small volume CE auto-sampler vial with 10 μL of 1% HCl methanol solution and evaporated to dryness. The residue was reconstituted in lidocaine hydrochloride aqueous solution (internal standard) and introduced by electrokinetic injection into CE. Parameters affecting extraction efficiency were investigated and optimized. Under optimum conditions, linearity of the method was 0.15-6500 μg/L for all target analytes. The LODs (S/N=3) were 0.05-0.20 μg/L. Excellent repeatability (RSD ≤ 4.4%, n=5) was achieved. The feasibility of this method was demonstrated by analyzing spiked forensic samples. To our knowledge, it is the first time to combine DLLME with CE for chiral separation and determining illicit drugs on forensic samples. 相似文献
989.
990.
Pardis Moslemzadeh Tehrani Nazura Abdul ManapAuthor VitaeHossein TajiAuthor Vitae 《Computer Law & Security Report》2013
With the widespread concerns about cyber terrorism and the frequent use of the term “cyber terrorism” at the present time, many international organisations have made efforts to combat this threat. Since cyber terrorism is an international crime, local regulations alone are not able to defend against such attacks; they require a transnational response. Therefore, an attacked country will invoke international law to seek justice for any damage caused, through the exercise of universal jurisdiction. Without the aid of international organisations, it is difficult to prevent cyber terrorism. At the same time, international organisations determine which state court, or international court, has the authority to settle a dispute. The objective of this paper is to analyse and review the effectiveness and sufficiency of the current global responses to cyber terrorism through the exercise of international jurisdiction. This article also touches upon the notion of cyber terrorism as a transnational crime and an international threat; thus, national regulations alone cannot prevent it. The need for an international organisation to prevent and defend nations from cyber terrorism attacks is pressing. This paper finds that, as cyber terrorism is a transnational crime, it should be subjected to universal jurisdiction through multinational cooperation, and this would be the most suitable method to counter future transnational crimes such as cyber terrorism. 相似文献