首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   798篇
  免费   63篇
各国政治   16篇
工人农民   14篇
世界政治   27篇
外交国际关系   51篇
法律   453篇
中国共产党   5篇
中国政治   74篇
政治理论   86篇
综合类   135篇
  2024年   2篇
  2023年   22篇
  2022年   28篇
  2021年   45篇
  2020年   52篇
  2019年   27篇
  2018年   55篇
  2017年   34篇
  2016年   26篇
  2015年   29篇
  2014年   65篇
  2013年   86篇
  2012年   65篇
  2011年   28篇
  2010年   30篇
  2009年   32篇
  2008年   53篇
  2007年   35篇
  2006年   28篇
  2005年   24篇
  2004年   17篇
  2003年   18篇
  2002年   21篇
  2001年   11篇
  2000年   7篇
  1999年   5篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1983年   3篇
排序方式: 共有861条查询结果,搜索用时 15 毫秒
821.
近年来,全国各地要求户籍制度改革的呼声不断。虽然有些地方陆续进行了改革。但由于改革正处于试验阶段,户籍制度改革面临难题。其原因在于制度上的障碍、利益集团的博弈、资源上的匮乏、政策上的阻碍等。我国应当建立全国统一的户口登记管理制度,实现公民身份的真正平等;注意改革的力度和顺序,在人事、教育、医疗等制度上进行相应的改革;剥离现行户籍制度的社会福利和其它社会功能,促进户籍管理的法制化,建立城乡统筹、行政控制和市场推进相结合的体现平等和实现迁徙自由的户籍制度。  相似文献   
822.
当前司法实践中对现场中处于运行状态的计算机大多采用“二步式”取证的方式来收集数字证据,即先由侦查人员对涉案计算机实施关机分离和保全,尔后再移交专业机构进行数字证据司法鉴定。该方法虽保障了数字证据的原始性和证明力,但无形之中却造成了存储于RAM中的“易挥发”数据以及其他形式的潜在数字证据的丢失。而计算机信息系统中的这些“易挥发数据”可为案件的侦破提供重要线索和潜在的数字证据,因此进行现场动态分析,收集这些“易挥发数据”对数字案件侦查取证意义重大。  相似文献   
823.
公安边防情报资料数据库建设主要包括传统情报资料库建设和数字化情报资料库建设两方面的内容。传统情报资料库建设,可以借鉴国内相关领域资料库建设的经验,并在原有情报资料建设与数字化情报资料库相关联。数字化情报资料库建设主要是情报工作人员运用信息技术设备将传统情报资料数字化,使其能够通过机器阅读并通过网络传输。  相似文献   
824.
Elizabeth Shepherd 《圆桌》2015,104(6):715-726
Many national governments have adopted the idea of the ‘right to access information’ (RTI) or ‘freedom of information’ (FOI) as an essential element of the rights of citizens to freedom of opinion and expression, human rights, trust in public discourse and transparent, accountable and open government. Over 100 countries worldwide have introduced access to information legislation: 50+ in Europe; a dozen in Africa; 20 in the Americas and Caribbean; more than 15 in Asia and the Pacific; and two in the Middle East (Banisar, 2014 Banisar, D. (2014) National Right to Information Laws, Regulations and Bills 2014 Map, http://dx.doi.org/10.2139/ssrn.1857498, accessed 15 May 2015. [Google Scholar]). This article will provide an overview of access to information legislation and focus on the UK Freedom of Information Act 2000 as a case example. It will discuss the impact of the UK FOI Act on public authorities, with particular attention to records management implications, drawing on research undertaken by University College London. In the final section, it will reflect on relationships between access to information and open government data. If governments are moving to more openness, what implications might this have for those charged with implementing FOI and RTI policies, including for records management professionals?  相似文献   
825.
This study examines whether Criminology's Routine Activities Theory (RAT) and related Lifestyle Theory (LST) can account for variation between the attributes of victims of fatal ideologically motivated attacks (akin to terrorism) and the victims of non-ideologically motivated homicide incidents committed by far-Right extremists in the United States. This article makes four contributions. First, we empirically test Criminology theory in the context of terrorism by using routine activities to devise four core hypotheses to explain differences between the two types of victims. Second, our investigation uniquely includes a non-terrorist comparison group (i.e., victims of homicides committed by extremists for personal reasons like greed). Third, our study focuses on ideological victimization. Terrorism researchers have usually ignored victims because of the difficulty in accessing the necessary data. Finally, we also make a methodological contribution by showing that criminology can build upon the terrorism literature by utilizing open-sources. Using data from the Extremist Crime Database (ECDB), the results of a multivariate analysis partially supported the hypotheses, showing that RAT and LST offer empirically supported theoretical constructs that have the ability to differentiate between ideological and non-ideological homicides.  相似文献   
826.
In the Google Spain judgment, the Grand Chamber of the EU Court of Justice determined the circumstances in which a search engine is obliged to remove links to data pertaining to an individual from the results displayed. The Court also considered the material and territorial scope of the EU data protection rules. This note argues that the Court's findings, which have been heavily criticised, are normatively coherent. The broad scope of application of data protection rules and the right of individuals to have their data deleted when certain conditions are fulfilled both play a part in granting individuals effective control over their personal data – an objective of EU data protection law.  相似文献   
827.
The 1996 Bermuda Principles launched a new era in data sharing, reflecting a growing belief that the rapid public dissemination of research data was crucial to scientific progress in genetics. A historical review of data sharing policies in the field of genetics and genomics reflects changing scientific norms and evolving views of genomic data, particularly related to human subjects’ protections and privacy concerns. The 2013 NIH Draft Genomic Data Sharing (GDS) Policy incorporates the most significant protections and guidelines to date. The GDS Policy, however, will face difficult challenges ahead as geneticists seek to balance the very real concerns of research participants and the scientific norms that propel research forward. This article provides a novel evaluation of genetic and GDS policies’ treatment of human subjects’ protections. The article examines not only the policies, but also some of the most pertinent scientific, legal, and regulatory developments that occurred alongside data sharing policies. This historical perspective highlights the challenges that future data sharing policies, including the recently disseminated NIH GDS Draft Policy, will encounter.  相似文献   
828.
反恐怖预警是防范和打击恐怖主义的重要环节。大数据为反恐怖预警带来了极大便利的同时,也为反恐怖预警提出诸多挑战。比如,软、硬件设施,领导管理体制,相关法规制度还需进一步完善等。对此,必须从反恐怖预警信息的收集、分析、决策和执行四个阶段对上述矛盾加以克服,才能适应大数据时代的客观要求,才能适应反恐怖行动的客观要求。  相似文献   
829.
The analysis presented in this article finds little evidence to suggest that individuals' preferences for owning versus renting a home have been affected by their exposure to recent house price declines and loan delinquency rates, or by knowing others in their neighborhood who have defaulted on their mortgages. Instead, this analysis finds individual characteristics, particularly current housing tenure, to be the strongest predictors of postrecession demand for homeownership.  相似文献   
830.
《Global Crime》2013,14(1):41-69
This article presents the Mafia Index (MI), an index measuring the presence of mafias at the provincial level. In the abundant literature on Italian mafias, relatively few studies have attempted to measure the presence of mafias across the country. A review of previous attempts points out the limitations and methodological shortcomings of existing measurements. The study provides an operational definition of ‘mafia’ and selects the most appropriate indicators and variables according to multiple criteria. The MI combines data on mafia-type associations, mafia murders, city councils dissolved for infiltration by organised crime, and assets confiscated from organised crime and covers the period between 1983 and 2009. The MI highlights not only the strong concentration of the mafias in their original territories but also their significant presence in the central and northern provinces. This confirms that mafias should not be regarded as typically Southern Italian phenomena, but rather as a national problem.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号