首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   250篇
  免费   6篇
各国政治   15篇
世界政治   9篇
外交国际关系   49篇
法律   32篇
中国共产党   6篇
中国政治   51篇
政治理论   18篇
综合类   76篇
  2023年   1篇
  2022年   1篇
  2021年   2篇
  2020年   11篇
  2019年   7篇
  2018年   5篇
  2017年   3篇
  2016年   5篇
  2015年   8篇
  2014年   37篇
  2013年   30篇
  2012年   20篇
  2011年   8篇
  2010年   24篇
  2009年   17篇
  2008年   23篇
  2007年   6篇
  2006年   7篇
  2005年   7篇
  2004年   7篇
  2003年   6篇
  2002年   11篇
  2001年   8篇
  2000年   1篇
  1999年   1篇
排序方式: 共有256条查询结果,搜索用时 15 毫秒
91.
作为一种政治现象,政治参与是衡量民主的重要尺度。本文分析考察了延安时期陕甘宁边区农民为什么参与政治(动力机制)、怎样参与政治(方式)以及政治参与的发展程度等问题。边区农民的政治参与支持了对共产党政权的政治认同,有助于共产党实现广泛的社会动员,进一步推动了边区的民主化进程,也为边区广大农民从传统农民向现代农民转型创造了条件。  相似文献   
92.
A Way With Words     
正Language service providers in China face staunch challenges in terms of pricing and quality controlIn an era of globalization,the language ser-vice industry has become an indispensable support factor for cross-border trade and corporate overseas expansion.In fact,the language service industry has far exceeded the scope of translation and interpre-tation and become a major part of the global  相似文献   
93.
公安边防部队是一支代表国家和人民在边境地区,以武装的形式依法打击各类违法犯罪活动,维护边境地区稳定与安全的部队。近一时期,国际恐怖组织经过数十年的发展演变,呈现组织严密、技术先进、目标泛化等诸多新特征,已严重危害我国边境地区的安全与稳定。因此,现阶段反恐作战已成为边防部队主要的作战任务,反恐怖人力资源也成为边防部队的客观需求。所以探析公安边防部队反恐怖人力资源建设对边防部队遂行反恐怖作战任务具有重要意义。  相似文献   
94.
Widespread use of cloud computing and other off-shore hosting and processing arrangements make regulation of cross border data one of the most significant issues for regulators around the world. Cloud computing has made data storage and access cost effective but it has changed the nature of cross border data. Now data does not have to be stored or processed in another country or transferred across a national border in the traditional sense, to be what we consider to be cross border data. Nevertheless, the notion of physical borders and transfers still pervades thinking on this subject. The European Commission (“EC”) is proposing a new global standard for data transfer to ensure a level of protection for data transferred out of the EU similar to that within the EU. This paper examines the two major international schemes regulating cross-border data, the EU approach and the US approach, and the new EC and US proposals for a global standard. These approaches which are all based on data transfer are contrasted with the new Australian approach which regulates disclosure. The relative merits of the EU, US and Australian approaches are examined in the context of digital identity, rather than just data privacy which is the usual focus, because of the growing significance of digital identity, especially to an individual's ability to be recognized and to transact. The set of information required for transactions which invariably consists of full name, date of birth, gender and a piece of what is referred to as identifying information, has specific functions which transform it from mere information. As is explained in this article, as a set, it literally enables the system to transact. For this reason, it is the most important, and most vulnerable, part of digital identity. Yet while it is deserving of most protection, its significance has been largely under-appreciated. This article considers the issues posed by cross border data regulation in the context of cloud computing, with a focus on transaction identity and the other personal information which make up an individual's digital identity. The author argues that the growing commercial and legal importance of digital identity and its inherent vulnerabilities mandate the need for its more effective protection which is provided by regulation of disclosure, not just transfer.  相似文献   
95.
公安边防部门的重要职能之一就是打击偷渡犯罪,在侦办偷渡案件过程中证据的收集至关重要。然而实践中却不同程度存在着证据收集不及时、不全面,忽视痕迹性证据的收集,缺乏对电子证据的收集能力等问题。因此,公安边防部门只有不断的增强证据意识,充分利用科学技术,发挥痕迹性物证的作用,提高偷渡案件的证据收集水平,才能有效打击偷渡犯罪,维护社会稳定,维护我国在国际上的良好形象和声誉。  相似文献   
96.
广西中越陆地边境口岸资源丰富,口岸基础设施建设日益完善,与越南边境经济合作领域宽广,涉及边境贸易、跨境旅游、跨境运输、商品展销、劳务合作等多领域。通过开展陆地边境口岸经济合作,增进两国边民的友好往来,实现共同发展的目标,有利于促进中越友好关系的发展。  相似文献   
97.
泰缅边境的缅甸难民问题,透过内战的表象,缅甸长期的民族政治纷争与民生凋敝才是其根源所在。大量缅甸难民长期滞留在泰国境内,对泰国造成巨大负面影响的同时,却为泰北地方经济的发展贡献不菲。虽然缅甸的民主转型为缅甸的难民问题的解决带来了希望,但难民问题已经发展到了不再是单纯的缅甸内政问题,难民问题的影响已经扩散至周边国家和地区,难民问题的最终解决仍需时日。  相似文献   
98.
This article examines Russian Government policy towards Northeast Asia as an interplay between aspirations, which have been expressed by government leaders, parliamentary figures and prominent academics and journalists and actual results. The article uses three levels, global, regional and bilateral, as a basis for the analysis. In terms of global interests the Russian leadership has sought diplomatic balance against the US, in terms of regional interests the leadership has pursued the aim of economic and security integration while at the bilateral level Russian leadership has sought specific benefits from particular relations with China, Japan and South Korea. The article notes that Russia has obtained certain diplomatic benefits from the relationship with China which serve its interests at the global level. At the regional level policy aspirations have been frustrated by Russia's dire economic condition and the tendency to be treated as an ‘outsider’. Russia has benefited from an improvement of bilateral relations with China, Japan and South Korea but these gains do not translate into an improved position at the regional level yet. while the Russian leadership has been nurturing the development of bilateral relationships problems particular to those relationships hinder its wider regional acceptance.  相似文献   
99.
The new technologies of bio-informatic border security and remote surveillance that have emerged as key infrastructures of reconfigured mobility regimes depend on various kinds of labor to produce the effect of bordering. The current retrofitting and technological remediation of borders suggests their transformation away from static demarcators of hard territorial boundaries toward much more sophisticated, flexible, and mobile devices of tracking, filtration, and exclusion. Borders require the labor of software developers, designers, engineers, infrastructure builders, border guards, systems experts, and many others who produce the “smart border”; but they also depend on the labor of “data-ready” travelers who produce themselves at the border, as well as the underground labor of those who traffic in informal and illegalized economies across such borders. Bordering increasingly relies on technological forms of mediation that are embedded within hi-tech, military and private corporate logics, but are also resisted by electronic and physical “hacks” or bypassing of informational and infrastructural architectures. In this paper we consider three socio-technological assemblages of the border, and the labor which makes and unmakes them: (1) the interlocking “cyber-mobilities” of contemporary airports including visual technologies for baggage, cargo, and passenger inspection, as well as information technologies for passenger dataveillance, air traffic control, and human resource systems; (2) the development of the Schengen Information System database of the EU, and its implications for wider migrant rights and internal mobility within the EU, as well as radical border media that have attempted to intervene in that border space; and (3) elements of the US–Mexico “smart border” regime known as the Secure Border Initiative Network (2006–2011), and those who have tried to tactically evade, disrupt, or undermine the working of this border.  相似文献   
100.

Mothers who kill or injure their children highlight crucial disjunctions between the status ‘mother’ and the practices and expectations of mothering. Failures of ‘mothering’ reconstruct the meaning of the maternal, while being themselves given meaning by it. Violent mothers may be pathologised and excused, demonised and condemned, but the explanatory narratives that are used draw centrally on notions of the maternal and, more broadly, the feminine. These discourses are reproduced in legal proceedings and sentences, and in the media reports of these proceedings. This paper will analyse the construction of the bad mother in legal proceedings in one prominent recent Victorian case, and in the print media reports of this case.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号