首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5464篇
  免费   153篇
各国政治   92篇
工人农民   88篇
世界政治   355篇
外交国际关系   124篇
法律   1242篇
中国共产党   337篇
中国政治   838篇
政治理论   753篇
综合类   1788篇
  2024年   3篇
  2023年   31篇
  2022年   43篇
  2021年   64篇
  2020年   147篇
  2019年   84篇
  2018年   103篇
  2017年   94篇
  2016年   109篇
  2015年   93篇
  2014年   265篇
  2013年   512篇
  2012年   368篇
  2011年   417篇
  2010年   358篇
  2009年   333篇
  2008年   414篇
  2007年   381篇
  2006年   389篇
  2005年   350篇
  2004年   364篇
  2003年   274篇
  2002年   205篇
  2001年   128篇
  2000年   65篇
  1999年   16篇
  1998年   2篇
  1997年   1篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
  1987年   1篇
排序方式: 共有5617条查询结果,搜索用时 15 毫秒
991.
政府购买公共服务是政府提供公共服务的一种新理念、新方法,它有利于实现政府职能的转变,有利于提高公共服务的供给效率,也有利于促进社会组织的发展。积极推进这项改革,需要树立服务型政府理念,健全政府购买公共服务制度,完善监督和评估机制,促进社会组织的发展,同时也需要为其营造良好发展环境。  相似文献   
992.
在“毛泽东思想和中国特色社会主义理论体系概论”课程教学中开展“听、说、读、评、研”教学活动,是深化教学改革,培养创新型人才的可行途径之一。在教学中结合课程内容让学生读一些相关的书目,搞一些同学们有兴趣又能参与其中的活动,使同学们在了解历史但又不脱离现实生活的状态下,既掌握了知识又活跃了课堂气氛,提高了同学们的理论素养以及分析问题和解决问题的能力,从而坚定在中国共产党的领导下走中国特色社会主义道路的理想信念。  相似文献   
993.
《国际相互影响》2012,38(4):345-368

This article presents the underlying rationale for a theory of foreign policy dynamics, and is the second part of a two‐part series which specifies a theoretical perspective for explaining the exchanges between nations. The task of the first paper was to discuss the substantive thrust of the research, and to give a view of the Monte Carlo simulation which lies at its core. The theory deals with the relevance of such concepts as reciprocity, uncertainty, third party effects, bureaucratic politics and domestic events for explaining foreign policy. This article provides the axioms which structure our theory and formal theorems that follow from these axioms.  相似文献   
994.
Thirty‐eight participants took part in a study that investigated the potential cascading effects of initial exposure to extraneous context upon subsequent decision‐making. Participants investigated a mock crime scene, which included the excavation of clandestine burials that had a male skeletal cast dressed either in female or gender neutral clothing. This was followed by a forensic anthropological assessment of the skeletal remains, with a control group assessing the same male skeletal cast without any clothing context. The results indicated that the sex assessment was highly dependent upon the context in which participants were exposed to prior to the analysis. This was especially noticeable in the female clothing context where only one participant determined the male skeletal cast to be male. The results demonstrate the importance of understanding the role of context in forensic anthropology at an early stage of an investigation and its potential cascading effect on subsequent assessments.  相似文献   
995.
反垄断与保护知识产权均仅是实现其共同目标的手段,其本身并非最终制度目的。就著作权法律制度而言,这体现在其应当建立完善的内在利益平衡机制,从"护权——限权"两个角度对著作权既加以保护、又防止其滥用。在这方面,美国的DPRSR制度堪称典范,我国与之对应的信息网络传播权制度却有待完善。著作权内在利益平衡机制一旦失灵,根据其失灵的情形,可能产生不同的损害。其中对于可能产生竞争损害的,在必要条件下,反垄执法机构应当及时介入,保护市场竞争和消费者利益不受著作权滥用行为的损害,保障反垄断和保护知识产权共同目标的实现。  相似文献   
996.
997.
998.
This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, this article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.  相似文献   
999.
This article describes a New Zealand forensic agency's contextual information management protocol for bloodstain pattern evidence examined in the laboratory. In an effort to create a protocol that would have minimal impact on current work-flow, while still effectively removing task-irrelevant contextual information, the protocol was designed following an in-depth consultation with management and forensic staff. The resulting design was for a protocol of independent-checking (i.e. blind peer-review) where the checker's interpretation of the evidence is conducted in the absence of case information and the original examiner's notes or interpretation(s). At the conclusion of a ten-case trial period, there was widespread agreement that the protocol had minimal impact on the number of people required, the cost, or the time to complete an item examination. The agency is now looking to adopt the protocol into standard operating procedures and in some cases the protocol has been extended to cover other laboratory-based examinations (e.g. fabric damage, shoeprint examination, and physical fits). The protocol developed during this trial provides a useful example for agencies seeking to adopt contextual information management into their workflow.  相似文献   
1000.
Robust cyber-resilience depends on sound technical controls and testing of those controls in combination with rigorous cyber-security policies and practices. Increasingly, corporations and other organizations are seeking to test all of these, using methods more sophisticated than mere network penetration testing or other technical audit operations. More sophisticated organizations are also conducting so-called “Red Team” exercises, in which the organization tasks a small team of highly skilled and trained individuals to try to gain unauthorized access to physical and logical company assets and information. While such operations can have real value, they must be planned and conducted with great care in order to avoid violating the law or creating undue risk and reputational harm to the organization. This article explores these sometimes tricky issues, and offers practical risk-based guidance for organizations contemplating these types of exercises.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号