首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   285篇
  免费   15篇
各国政治   6篇
工人农民   15篇
世界政治   12篇
外交国际关系   34篇
法律   74篇
中国共产党   5篇
中国政治   36篇
政治理论   33篇
综合类   85篇
  2023年   3篇
  2022年   7篇
  2021年   9篇
  2020年   14篇
  2019年   15篇
  2018年   14篇
  2017年   16篇
  2016年   15篇
  2015年   9篇
  2014年   26篇
  2013年   43篇
  2012年   21篇
  2011年   27篇
  2010年   20篇
  2009年   13篇
  2008年   10篇
  2007年   10篇
  2006年   8篇
  2005年   7篇
  2004年   3篇
  2003年   5篇
  2002年   4篇
  2001年   1篇
排序方式: 共有300条查询结果,搜索用时 31 毫秒
291.
In this article we offer a first attempt at providing a set of universal grading criteria for determining on what basis, and how far, an item of discursive content can be considered “terroristic.” In doing so, we draw loosely on the existing COPINE scale for child abuse images. The scale described in the article is not intended to reflect actual risk of engagement in terrorist violence, nor is it intended to have evidential validity in relation to offenses in certain jurisdictions relating to “terrorist publications.” Rather, by formalising assumptions which seem already to be latent in the literature on terrorist use of the Internet, it aspires to serve as a starting point for a more methodologically coherent approach to relationships between content—particularly online content—and terrorism.  相似文献   
292.
ABSTRACT

Why do women become extremists? To what extent might they have self-agency? This paper examines the motivations and processes of female radicalization into the so-called Islamic State (IS) by drawing on a case study of Indonesian IS sympathizers, including the three migrant workers-turned-female suicide bombers whose radicalization was facilitated by social media. It argues that far from being coerced, most women join IS of their own free will. Prompted by a mix of personal crisis and socioeconomic and political grievances, the women embark on a religious seeking, exploring the various Islamic options available to them. Ideational congruence might spark the initial interest in IS, but it is generally emotional factors such as a feeling of acceptance and empowerment that make them stay. Contrary to common assumptions, women’s subordination in jihadist organizations is not absolute; it can be negotiated after joining. Most women try to conform to jihadist strict gender rules, but some, often with the support of male allies, try to bend the norms, including on female combat roles. The findings suggest that counter-terrorism agencies should abandon the binary view that women are either just brainwashing victims or terrorist provocateurs, and try to understand the gendered nuances of radicalization in order to formulate suitable preventive measures.  相似文献   
293.
《Global Crime》2013,14(2-3):175-196
This paper focuses on criminals who could easily be labelled as entrepreneurs and who deal in compromised computer systems. Known as botmasters, these individuals use their technical skills to take over and control personal, business and governmental computers. These networks of hijacked computers are known as botnets in the security industry. With this massive computing power, these criminals can send large amounts of spam, attack web servers or steal financial data – all for a fee. As entrepreneurs, the botmasters' main goal is to achieve the highest level of success possible. In their case, this achievement can be measured in the illegitimate revenues they earn from the leasing of their botnet. Based on the evidence gathered in literature on legitimate and illegitimate markets, this paper sets to understand how reputation could relate to criminal achievement as well as what factors impact a heightened level of reputation in a criminal market.  相似文献   
294.
This article examines content homogeneity, understood as the degree to which different media focus on the same stories during a particular news cycle, in Argentina's leading print and online newspapers. It focuses on the role of technical practices across media and over time—during a decade for print and during 24 hours for online. The analysis shows three main patterns of homogenization: (a) an increase in the level of homogeneity in print newspapers tied to their online counterparts' practice of publishing breaking and developing stories during the day, (b) an increase in the level of homogeneity in online newspapers as the day unfolds, and (c) a densely interconnected web of homogeneity across print and online newspapers in 2005. We draw from these findings to make contributions to research on online news and media sociology and to reflect upon the direction and meaning of changes in journalistic form in the current media environment.  相似文献   
295.
Partisan, pundit-based media gets blamed for making political discourse more uncivil, and studies on incivility in mediated discourse have found that uncivil political media can induce negative reactions in audiences. However, how use of uncivil media affects the way individuals express their political views has yet to receive substantial scholarly attention. I hypothesize that tuning in to uncivil political media leads to an increased propensity to use incivility in textual political expression. I develop an index to identify incivility in political expressions, and test my hypothesis using panel data analysis and an open-ended survey item in the 2008 National Annenberg Election Survey. I find that, consistent with my hypothesis, use of uncivil media—specifically pundit cable news and political talk radio—leads to an increased use of incivility when expressing text-based political opinions. Furthermore, this only occurs with reception of like-minded uncivil political media. I note the implications this has for online political discourse and effective deliberation.  相似文献   
296.
In recent years ‘movement parties’ such as Syriza in Greece, the Movimento 5 Stelle in Italy, Podemos in Spain and—to a lesser extent—Bloco de Esquerda in Portugal shook national party systems, breaking the consolidated dynamics of political competition. Despite growing interest in movement parties, there has been scant attention to the role of citizens adopting unconventional forms of action and using digital media in accounting for their electoral performance. To fill this gap, four original internet-based post-electoral surveys are employed showing that protesters and digital media users are more likely to vote for these parties, despite important country differences.  相似文献   
297.
正In a span of less than three months, I’ve amassed a fairly impressive portfolio of things I’ve purchased online. Going from a complete newb on the Chinese Internet to an online shopping maven, I’ve bought things ranging from clothes, cellphone cases, wine, ribbons, a humidifier, stickers, coffee filters, pans,butter, sugar, facial wash, film, an air purifier…the list goes on.  相似文献   
298.
This article addresses debates on the formulation of public policy, building upon a body of literature which has focused on the interconnectedness between the venues of policy action and the way issues are defined. It does so by focusing on the strategic role of policy actors in a policy subfield and their attempts at manipulating either frames or venues in order to shape policy. The novelty here consists in pointing to the involvement of regulators in such strategic action. An emerging body of research has indeed shown that the activity of formally independent regulators is not necessarily limited to the implementation of delegated regulatory competencies and that they are increasingly engaged in policy‐making activities. Thus, by resorting to the agenda‐setting and framing literature, the article sheds light on novel pathways through which regulators intervene in policy‐making activities, making a claim that they have very good ‘tools’ at their disposal in order to shape policy. These dynamics are examined in the case of the last piece of the EU's pharmaceutical framework – the 2004 Directive on Traditional Herbal Medicines – which provoked intense debate among manufacturers of herbals, retailers, consumers, and both EU‐level and domestic‐level regulatory authorities.  相似文献   
299.
网络声誉维护能力是指执政党对网络舆论关注的政党主体的理念、政策和形象的统一管理。具体来说,应该从四个方面着手加强能力建设:一是加强形象管理,密切党群关系;二是发挥理论引导,增强政治认同;三是规范权力运行,践行宗旨使命;四是树立阵地意识,坚持守土负责。  相似文献   
300.

Research Summary

The current study examined 1055 stolen data products across 40 vendors on the Open and Dark Web to determine whether different product- and vendor-level behaviors predicted vendors’ trustworthiness as reflected in their product price point. Understanding the mechanisms that convey trust in the underground marketplace is crucial as it could help law enforcement target serious actors and disrupt the larger marketplace. Findings suggest the online stolen data market may resemble an uninformative cost condition where buyers are unable to accurately differentiate credible sellers due to the obscure nature of signaling behaviors.

Policy Implications

Law enforcement would benefit from designing fake shops and deceptive forum posts that transmit mixed signals to complicate market participants’ process of interpreting trust signals as intended. These interventions would generate high levels of risk that encourage both buyers and sellers to exit the online illicit marketplace without needing law enforcement arrests. Law enforcement could also target prominent market facilitators to generate a larger disruption that prevents actors from continuing their illicit behavior.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号