首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   202篇
  免费   8篇
各国政治   15篇
工人农民   17篇
世界政治   8篇
外交国际关系   7篇
法律   95篇
中国政治   1篇
政治理论   64篇
综合类   3篇
  2019年   2篇
  2018年   8篇
  2017年   10篇
  2016年   5篇
  2014年   10篇
  2013年   20篇
  2012年   2篇
  2011年   8篇
  2010年   5篇
  2009年   5篇
  2008年   3篇
  2006年   5篇
  2005年   7篇
  2004年   5篇
  2003年   4篇
  2002年   9篇
  2001年   3篇
  2000年   2篇
  1999年   7篇
  1998年   2篇
  1997年   3篇
  1996年   2篇
  1994年   3篇
  1992年   6篇
  1991年   8篇
  1990年   2篇
  1989年   4篇
  1988年   5篇
  1987年   5篇
  1986年   1篇
  1985年   3篇
  1984年   6篇
  1983年   5篇
  1982年   4篇
  1981年   1篇
  1980年   1篇
  1979年   1篇
  1978年   1篇
  1977年   2篇
  1976年   3篇
  1975年   2篇
  1974年   2篇
  1973年   2篇
  1972年   1篇
  1971年   2篇
  1969年   1篇
  1968年   2篇
  1967年   1篇
  1966年   1篇
  1965年   3篇
排序方式: 共有210条查询结果,搜索用时 15 毫秒
41.
42.
43.
Almost a decade ago, the electronic commerce revolution began,led by such companies as Amazon.com and Ebay.com. These companieshave grown into the internet business giants they are today,diversifying in the products they sell, the services they provideand the jurisdictions they conduct business in. However, asidefrom these rare examples, most medium and small internet-basedbusiness enterprises have grown with the dot.com bubble anddissolved when it burst mid-way through the decade. Now, atthe 10th Anniversary of Electronic Commerce, after we have seenthe dot.com way of doing business launch like a rocket and plungelike a comet, subsequently emerging into a more cautious, butno less potential, avenue of doing business, other challengesnow face the industry as a whole to retain and obtain customers.Internet users are becoming increasingly wary of online transactions.2The irony is that as internet users become technologically savvy,they also become more aware of the dangers which connectivityentails and this inhibits their online behaviour. Chief amongthese concerns, and second only to cybercrimes, is the maintenanceof privacy in the context of the protection of personal information,particularly from the unsavory elements trawling the cyberworld.For cyber-trade and the e-commerce market to grow, and for thecontinued efficiency and utility of the internet for G2C andB2C transactions,3 governments and industries must re-instillthe trust and confidence of internet users both in commercialand non-commercial interaction.4  相似文献   
44.
45.
This paper reports the findings from a study of 935 adolescents' perceived attachments to their parents and peers, and their psychological health and well-being. Perceived attachment to parents did not significantly differ between males and females. However, females scored significantly higher than males on a measure of attachment to peers. Also, relative to males, they had higher anxiety and depression scores, suggesting poorer psychological well-being. Overall, a lower perceived attachment to parents was significantly associated with lower scores on the measures of well-being. Adolescents who perceived high attachments to both their parents and peers had the highest scores on a measure of self-perceived strengths. In this study, adolescents' perceived attachment to peers did not appear to compensate for a low attachment to parents in regard to their mental ill-health. These findings suggest that high perceived attachment to parents may be a critical variable associated with psychological well-being in adolescence.Received M.Sc. in psychology from the University of Otago, Dunedin, New Zealand. Research interests include adolescent menial health.Received Ph.D. in psychology from the University of New South Wales, Australia. Research interests include issues in behavioral medicine.Received Ph.D. in psychology from the University of Newcastle, Australia. Research interests include child health and development, and adolescent smoking behavior.  相似文献   
46.
Abstract

The setting up of the U.S.-Marcos dictatorship through the declaration of an “unlimited form of martial law” and under the fascist principle that “all power can be given to the military” has brought about a new situation. Through the crude employment of armed coercion, dictator Marcos as commander-in-chief has arrogated unto himself and concentrated in his hands all executive, legislative and judicial powers. All of these powers are used not only against the Communist Party of the Philippines and the New People's Army but also against the broad masses of the people and all opposition to the perpetuation of a fascist dictatorship. Upon the setting up of this fascist dictatorship, the objective conditions for a civil war of a national scale have arisen. The entire Filipino people vehemently condemn the U.S.-Marcos dictatorship as anti-national, anti-republican, anti-democratic and decadent and are more determined than ever before to struggle for national democracy and, therefore, for a genuine republic that belongs to them.  相似文献   
47.
English contract law has offered protection for the vulnerable and exploited for centuries. The most wide-ranging doctrine of contractual unfairness could be found within the Court of Chancery. In Lord Nottingham's time relief extended to a range of situations, loosely held together, with no real unifying structure. Yet even here some common themes emerged. Transactions which fell outside the usury laws were looked at with particular concern. In the eighteenth century Lord Hardwicke attempted to rationalize relief under the rubric of fraud. This was largely a difference in presentation. Under the influence of the rise of legal literature and ideas derived from Will Theory, the nineteenth century might have seen the emergence of a truly coherent doctrine of contractual unfairness. That this did not happen can be attributed to a combination of factors. These include the durability of the notion of fraud, the complexity of contractual unfairness which could not be reduced to a doctrine based on will and the way in which contractual unfairness was bound up with public policy. The substance of relief may have changed less than has often been supposed. Certainly there was no shift from a world in which the courts offered protection to one in which freedom of contract always prevailed. The failure of nineteenth century judges and writers to be more radical has left a legacy of incoherence that is still felt today.  相似文献   
48.
Is Google in its quest for search engine optimization through the creation of new technologies, which not only improves its search algorithms but also refines its search functions for users, doing it in a manner that makes it a perpetrator of primary copyright infringement or an invaluable facilitator for Internet functionality? How should the balance of interests in the treatment of creative works be recalibrated in the face of changes in search engine technology and operations, and the disputes that have arisen within the last decade in the context of the digital age and its needs? Using Google as a case study, this paper will look at the two main areas of dispute over the operations of information locator tools and services that either threatens search engine functionality and efficiency or weakens copyright holders’ exclusive rights. It proposes a concerted set of solutions through a reassessment and amendment of copyright law to optimize the social benefits and objectives of both the copyright regime and technological innovations in the electronic model of information archiving, indexing and delivery. A fair distribution of responsibilities and allocation of rights and liabilities will be suggested. In the process, due consideration will be given to both public and private interests, with the former taking precedence; while the recommended solutions will be made within the currently outdated framework for Internet intermediary protection (i.e. safe harbor laws) and exceptions (i.e. specific statutory exemptions and the general fair use defense) under the existing copyright regime. Thus, the proposed changes will be far reaching without being too radical a departure from current law, an evolution that will likely be more acceptable and realistic a solution to the problem.This paper is published in two parts. Part One of this paper will deal with the challenges to the copyright regime posed by the operations and technology behind the Google Images Search Engine, while Part Two that will be published in the subsequent edition of the CLSR will assess the benefits of the Google Books Search Project vis-à-vis the effects it will have on the scope of copyright protection. Recommendations are made to copyright law to accommodate both functions while generally preserving the main objectives of copyright protection.  相似文献   
49.
Admiral Harold R. Stark (1880–1972) was appointed Chief of Naval Operations in August 1939 and served in that role until removed in March 1942. It was on his watch that the Japanese raided Pearl Harbor on 7 December 1941. Nowadays the prevailing view of Stark seems to be largely shaped by the official verdict of the Secretary of the Navy, James V. Forrestal, namely that “Admiral Harold R. Stark, USN (Retired), shall not hold any position in the United States Navy which requires the exercise of superior judgment”. Our very different view is that Stark was a patriot who willingly sacrificed his reputation to preserve that of President Franklin D. Roosevelt and to enable him, as the one person capable of leading the Allies to victory in war against Nazi Germany, to assume his proper mantle.  相似文献   
50.
Severely burned or cremated human remains (i.e., cremains) are among the most challenging cases investigated by forensic pathologists, odontologists, and anthropologists. Exposure to extreme heat of long duration destroys all organic components of the body, leaving only the inorganic component of the skeleton. The numerous calcined osseous or dental fragments that remain after the cremation process rarely convey useful information to the investigator. In most cases, it is associated nonosseous artifacts that provide evidence of the decedent's identity. In a case investigated at the University of Florida's C. A. Pound Human Identification Laboratory, as well as in several cases examined during data collection for a research project, several fragments were identified as calcined plaque tubules from sclerotic blood vessels. These tubules provide direct evidence that the cremated individual had a variety of arteriosclerosis.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号