首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1165篇
  免费   65篇
各国政治   29篇
工人农民   17篇
世界政治   46篇
外交国际关系   71篇
法律   495篇
中国共产党   31篇
中国政治   109篇
政治理论   194篇
综合类   238篇
  2024年   4篇
  2023年   24篇
  2022年   31篇
  2021年   53篇
  2020年   65篇
  2019年   43篇
  2018年   60篇
  2017年   47篇
  2016年   35篇
  2015年   35篇
  2014年   106篇
  2013年   117篇
  2012年   82篇
  2011年   55篇
  2010年   56篇
  2009年   38篇
  2008年   68篇
  2007年   54篇
  2006年   54篇
  2005年   43篇
  2004年   36篇
  2003年   43篇
  2002年   32篇
  2001年   14篇
  2000年   12篇
  1999年   5篇
  1998年   1篇
  1997年   3篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1985年   3篇
  1983年   3篇
排序方式: 共有1230条查询结果,搜索用时 31 毫秒
851.
Abstract

Using existing data from the FBI's Uniform Crime Reporting (UCR) Program, time series analyses were conducted on hate crime data from 2001 around the terrorist attacks of September 11, 2001. A statistically significant increase in anti-Islamic hate crime occurred after 9/11, and anti-Islamic hate crime leveled off within 8 weeks of the occurrence. News stories reporting anti-Islamic hate crimes, stories reporting fear of such bias crime, and public calls for calm, tolerance, and/or reaction to anti-Islamic bias crime followed a similar pattern found within the official data. A city-by-city analysis found that UCR reported anti-Islamic hate crime was essentially non-existent in New York City and Washington, DC. It is suggested that public calls for calm and tolerance and in-group/out-group dynamics may have impacted anti-Islamic hate crime frequency, thus accounting for rises and reductions in this form of bias crime over time.  相似文献   
852.
853.
The principle of information security safeguards is a key information privacy principle contained in every privacy legislation measure, framework, and guideline. This principle requires data controllers to use an adequate level of safeguards before processing personal information. However, privacy literature neither explains what this adequate level is nor how to achieve it. Hence, a knowledge gap has been created between privacy advocates and data controllers who are responsible for providing adequate protection. This paper takes a step toward bridging this knowledge gap by presenting an analysis of how Data Protection and Privacy Commissioners have evaluated the adequacy level of security protection measures given to personal information in selected privacy invasive cases. This study addresses both security measures used to protect personal information against unauthorized activities and the use of personal information in authentication mechanisms. This analysis also lays a foundation for building a set of guidelines that can be used by data controllers for designing, implementing, and operating both technological and organizational measures used to protect personal information.  相似文献   
854.
明代宗室禄饷收入丰厚,随着宗室人口日蕃,既有的宗室制度渐渐不合时宜,宗室耗费财富的增加,成为政府财政陷入窘境的一个重要原因。为了增加财政收入,有司百计周转,最终还是增加税赋,小民负担加重,民土分离增加,宗室等阶层趁机占有土地及户口,揽取商税收入,国帑渐入私家,国家财政状况陷入恶性循环。虽有改革措施,但效果不彰。总的来看,明代宗室制度利弊兼有,但在后期,众所认同,弊端明显,积重难返,宗室随明王朝覆亡。明太祖朱元璋遗泽子孙太厚,积世而不斩,小民不堪,各种因素叠加,易流于乱。  相似文献   
855.
The influence of national administrative institutions on contemporary reforms has often been noted but insufficiently tested. This article enriches the comparative perspective of administrative reform policies by focusing on four interrelated dimensions: the choices of reformers, institutional constraints, timing and sequencing and long-term trajectories. This article tries to determine whether most similar administrative systems exhibit analogous contemporary reform trajectories in content, timing and sequence. By comparing the administrative reform policies of two ‘most similar’ Napoleonic countries, France and Spain, this article analyses the commonalities and divergences of decentralisation, territorial state reorganisation, civil service reforms and policies that focus on performance management and organisational design. The article identifies the ‘causal mechanisms’ that characterise the specific role of institutions and considers both the role of context and the importance of policy intersections.  相似文献   
856.
ABSTRACT

This essay reviews the macro or aggregate-level academic literature on campaign mobilization and voter turnout in the United States. The conclusion that emerges from this literature is that hard-fought, high-stimulus electoral contests get out the vote. In part, the level of turnout on election day is a product of the efforts of strategic political actors (e.g., candidates, campaign contributors, and political parties) in the pursuit of elective office. The essay suggests that the academic literature on campaign mobilization would benefit from greater appreciation of how real world campaigns operate. A lesson that academics should draw from the practitioners is that strategic campaigns target and attempt to get out their voters. Careful consideration of the flows of information in campaigns would lead to a richer theory of mobilization. Looking at campaigns in a differentiated fashion, future research should recognize some fundamental points about their turnout implications: what campaigns do and whom they target may be more important than simply how much they do.  相似文献   
857.
Abstract

It is generally assumed that mobilizing young voters is infeasible. This belief can be broken into two separate questions: (1) Are young people responsive to Get Out The Vote appeals? (2) Is it possible to deliver the message to the intended audience? By pooling together the results of six GOTV field experiments, this paper demonstrates that young voters are equally responsive to blandishments to vote as mature voters, but that they are roughly three times more difficult to contact.  相似文献   
858.
Former partners comprise the most important subgroup of stalkers. However, contextual factors related to the breakup are hardly examined to explain ex-partner pursuit. In a community sample of 194 separated persons, about one-fifth perpetrated at least one unwanted pursuit behavior in the past 2 weeks. Being female, lowly educated, and socially undesirable raised the number of perpetrated behaviors. Beyond these effects, the number of behaviors increased when the cause of the break was attributed to the ex-partner or external factors and when the ex was appraised as the breakup initiator. Breakup reasons, the ex-partner's lack in meeting family obligations and own infidelity, also related to pursuit behaviors albeit inferior to subjective attributions and appraisals of initiation. Finally, participants who felt more anxious or lonely negative showed more behaviors. The results enlighten that the breakup context gains further attention. Clinical treatment might benefit from fostering cognitive reconstructions and breakup adjustment.  相似文献   
859.
The EU and the United States signed the Terrorist Finance Tracking Program (also known as SWIFT Agreement) agreement giving the US authorities access to bulk data containing the millions of records in the EU to enable the US authorities to trace financial transactions related to suspected terrorist activity (or to put it bluntly, against US interest). The SWIFT Agreement added some data protection safeguards, but the United States has been found to circumvent the agreement with the aid of the Europol. The EU Commission and the Europol have classified all documents concerning the SWIFT Agreement as secret. EU citizens confront a dark future where unelected EU bureaucrats continue to betray the trust of the people handing out bulk data to “counter terrorism” but at the same time undermining cherished values and violating human right standards and principles.  相似文献   
860.
The Council of Europe is engaging in a process of revising its Data Protection Convention (Convention 108) to meet and overcome these challenges. The Council of Europe celebrates this year the 30th Anniversary of its Data Protection Convention (usually referred to as Convention 108) which has served as the backbone of international law in over 40 European countries and has influenced policy and legislation far beyond Europe’s shores. With new data protection challenges arising every day, the Convention is revising its Data Protection Convention. Computer Law and Security Review (CLSR) together with the Intl. Association of IT Lawyers (IAITL) and ILAWS have submitted comments in response to the Expert Committee’s public consultation on this document. CLSR aims to position itself at the forefront of policy discussion drawing upon the high quality scholarly contributions from leading experts around the world.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号