首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1221篇
  免费   24篇
各国政治   75篇
工人农民   5篇
世界政治   24篇
外交国际关系   122篇
法律   131篇
中国共产党   5篇
中国政治   49篇
政治理论   80篇
综合类   754篇
  2024年   2篇
  2023年   6篇
  2022年   10篇
  2021年   24篇
  2020年   16篇
  2019年   11篇
  2018年   22篇
  2017年   19篇
  2016年   16篇
  2015年   21篇
  2014年   63篇
  2013年   118篇
  2012年   69篇
  2011年   77篇
  2010年   75篇
  2009年   74篇
  2008年   91篇
  2007年   88篇
  2006年   112篇
  2005年   62篇
  2004年   74篇
  2003年   58篇
  2002年   52篇
  2001年   55篇
  2000年   30篇
排序方式: 共有1245条查询结果,搜索用时 31 毫秒
191.
缅甸政府在军人执政22年后,改文官为主组成新政府,22个政党中有17个为少数民族党派,这些党派大部分生存于中缅边界,组成人员大多与中国华人血脉相连,无论从政府、经济、人文、民族甚至习俗都不可分割。本文从缅甸局势对中国安全战略的不稳定因素及影响做分析并提出对策。  相似文献   
192.
在我国犯罪防控的诸多措施与机制中,基层公安机关即基层派出所的犯罪治安预防以其最贴近社会面、最贴近社会底层而在犯罪防控体系中发挥着中流砥柱的作用。基层公安机关除了常规的警务日常管理工作与治安案件处置外,其针对犯罪而采取的治安预防工作不仅能使地区发案率下降,而且一旦发生恶性案件,日常良好的防控工作也会为案件的侦破提供快速反应的基础以及协作刑侦部门破案的高效率性。目前,基层公安派出所的工作机制与犯罪防控基本要求的不匹配现象仍然存在,怎样使基层公安机关在犯罪防控工作及在协助刑侦部门案件侦破工作上做到基础扎实、反应快速、协作高效,减少社会恶性案件的频繁发生,并提高配合刑侦部门的侦查工作的能力,是摆在基层公安机关尤其是公安派出所面前的难点与重点。  相似文献   
193.
National security planners have begun to look beyond reactive, tactical cyber defense to proactive, strategic cyber defense, which may include international military deterrence. The incredible power of nuclear weapons gave birth to deterrence, a military strategy in which the purpose of armies shifted from winning wars to preventing them. Although cyber attacks per se do not compare to a nuclear explosion, they do pose a serious and increasing threat to international security. Real-world examples suggest that cyber warfare will play a lead role in future international conflicts. This article examines the two deterrence strategies available to nation-states (denial and punishment) and their three basic requirements (capability, communication, and credibility) in the light of cyber warfare. It also explores whether the two most challenging aspects of cyber attacks – attribution and asymmetry – will make cyber attack deterrence an impossible task.  相似文献   
194.
信息化的发展给公安政治工作带来前所未有的变革,公安政治工作信息化代表着公安政治工作的未来和方向,如何进行信息化建设是公安机关政工部门急需深入研究的一个课题。为此,需要在对公安政治工作信息化的概念、基本特征、构成要素、当前现状和不足进行研究的基础上,提出建设规划和展望,力求解决认识上的模糊性和片面性,给公安政治工作信息化建设提供基础性的帮助。  相似文献   
195.
新闻媒体为了获取第一手新闻资讯,在案发现场容易与警方发生对峙或冲突,实际工作中频频出现此类事件。为了减少不必要的冲突,提高公安机关应对媒体的技巧,首先要分析当前媒体与警方发生冲突的原因,如当前法律制度不健全、现场警察的素质不高、执法经验不足等,并在此基础上提出应对媒体的策略,包括确立应对媒体的基本原则,以及划定警戒区域、检查登记媒体证件、告知知情人等具体措施,以最大程度减少冲突,实现共赢。  相似文献   
196.
2008年以来,四川公安先后经历了抗击"5.12"特大地震灾害和支援青海玉树抗震救灾的严峻考验。面对特大灾难,公安政治工作大胆解放思想,超常规加速拓展传统公安政治工作的方式、方法和手段,为卓有成效地应对一系列重大特殊事件提供了强有力的思想保障、组织保障、素质保障、机制保障和舆论保障。经验主要是:1.打破思维定势,科学定位公安政治工作应急机制;2.尊重抗震救灾实践,科学架构公安政治工作应急机制;3.服务实战需要,科学实施公安政治工作的"平战转换"。  相似文献   
197.
党的群众观点、群众立场、群众路线始终是我们党安身立命的根本,专群结合是公安工作的重要方针原则。云南公安群众工作应立足云南省情,突出强化社会矛盾化解、禁毒防艾、爱民固边等工作,积极推进公安重点工作;云南公安机关当前的"三访三评"深化大走访活动,应抓住全省"四群教育"活动开展的重要契机,总结历年大走访成功经验做法,丰富群众工作方法和载体,积极推进公安群众工作制度化、常态化,实现云南经济社会发展的总体目标,营造和谐稳定的社会环境。  相似文献   
198.
This article addresses the unsuccessful attempts to suppress free speech during the Korean War, and in particular explains the attempts to silence three reporters of alleged atrocities by United Nations forces. In the absence of carefully targeted legislation, the three individuals – Alan Winnington (a journalist), Monica Felton (a women's movement activist) and Jack Gaster (a solicitor) ‐ were threatened with or investigated for prosecution for treason or sedition, and Winnington was unable to renew his passport until 1968. Drawing heavily on archival sources (including MI5 files, which unusually fail to redact the identity of one of the lawyers who was reporting to Special Branch about Gaster's activities), the article explores the threat to civil liberties from the administrative as well as the legislative and the judicial power of the state. The article concludes by drawing contemporary parallels, and highlighting the continuing relevance of the writings of Winnington, Felton and Gaster.  相似文献   
199.
Access by law enforcement authorities to personal data initially collected by private parties for commercial or operational purposes is very common, as shown by the transparency reports of new technology companies on law enforcement requests. From a data protection perspective, the scenario of law enforcement access is not necessarily well taken into account. The adoption of the new data protection framework offers the opportunity to assess whether the new ‘police’ Directive, which regulates the processing of personal data for law enforcement purposes, offers sufficient safeguards to individuals. To make this assessment, provisions contained in Directive 2016/680 are tested against the standards established by the ECJ in Digital Rights Ireland and Tele2 Sverige on the retention of data and their further access and use by police authorities. The analysis reveals that Directive 2016/680 does not contain the safeguards identified in the case law. The paper further assesses the role and efficiency of the principle of purpose limitation as a safeguard against repurposing in a law enforcement context. Last, solutions to overcome the shortcomings of Directive 2016/680 are examined in conclusion.  相似文献   
200.
The highly connected nature of the current era has raised the need for more secure systems, and hence the demand for biometric-based authentication methods. In 2013, the Mauritian Government invested massively in the collection of data, and implementation of the national biometric identity card scheme. The latter has suffered a number of contestations among the population, and several cases were consequently filed at the Supreme Court of Mauritius to oppose the use of this biometric card. The main concern was the collection of biometric data which posed threats to the privacy of individuals. Additionally, the collection and retention of biometric data lead to security issues. In this paper, the challenges with respect to the usage of the biometric card are analysed. The laws governing data protection are discussed, together with the legal framework used for data collection and retention. Following the court decisions, several amendments have been made to the existing laws in order to cater for the usage of biometric data for the public interest. Finally, recommendations are made with regards to a legal framework which will enhance the security of biometric data, and eventually encouraging public acceptance of this biometric identification system.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号