全文获取类型
收费全文 | 758篇 |
免费 | 1篇 |
专业分类
各国政治 | 28篇 |
世界政治 | 39篇 |
外交国际关系 | 384篇 |
法律 | 139篇 |
中国政治 | 27篇 |
政治理论 | 48篇 |
综合类 | 94篇 |
出版年
2024年 | 5篇 |
2023年 | 1篇 |
2021年 | 10篇 |
2020年 | 23篇 |
2019年 | 36篇 |
2018年 | 42篇 |
2017年 | 44篇 |
2016年 | 31篇 |
2015年 | 23篇 |
2014年 | 44篇 |
2013年 | 281篇 |
2012年 | 24篇 |
2011年 | 9篇 |
2010年 | 15篇 |
2009年 | 24篇 |
2008年 | 20篇 |
2007年 | 15篇 |
2006年 | 19篇 |
2005年 | 26篇 |
2004年 | 27篇 |
2003年 | 22篇 |
2002年 | 16篇 |
2001年 | 2篇 |
排序方式: 共有759条查询结果,搜索用时 15 毫秒
521.
Megan K. McBride 《Terrorism and Political Violence》2013,25(4):560-581
Drawing from the work of political theorists, theologians, anthropologists, journalists, philosophers, and contemporary psychologists studying Terror Management Theory (TMT), it becomes possible to see that the concepts of existentialism and ideology may be useful for modern thinkers attempting to understand a problem such as terrorism. Integrating work from these fields makes it possible to see that terrorism may be driven by an existential-terroristic feedback loop: a cycle in which people support or engage in terrorism to alleviate existential anxiety but ultimately find this anxiety exacerbated in the wake of the violence they create or sanction. The loop is closed when this exacerbated anxiety compels them to reaffirm their support of, or participation in, terrorist violence. If this model is valid, then effectively addressing the problem of terrorism requires joining existing U.S. policies with policies that address ideologies. Specifically, policies must aspire to a) mitigate existential anxiety, b) provide a compelling counter-narrative, c) address environmental factors conducive to radicalization, d) prevent the formation of radicalized groups, and e) deradicalize existing ideologues. 相似文献
522.
This article attempts to consolidate theorizing about the radicalization of Western homegrown jihadists. Five major models of radicalization are reviewed. The commonalities and discrepancies among these models are identified and analyzed in the context of empirical evidence in the field of terrorism research and social psychology. Three psychological factors emerge as contributors to radicalization: group relative deprivation, identity conflicts, and personality characteristics. Avenues for future research concerning the radicalization of homegrown jihadists are suggested, focusing on research that may not only be practical for counter-terrorism, but also feasible given the challenges of research with radicalized individuals. 相似文献
523.
Omar Ashour 《Terrorism and Political Violence》2013,25(3):377-397
This article analyzes the global transformations of jihadist movements towards abandoning and de-legitimizing political violence in general and terrorism in particular. It focuses on the de-radicalization process of Libya's largest armed Islamist movement: the Islamic Fighting Group. It analyzes the causes behind those transformations and outlines the necessary conditions for, and policy implications of, successful de-radicalization. The article is mainly based on primary sources, field work, and interviews with former jihadist leaders, mid-ranking commanders, grassroots activists, security and intelligence officers, and state officials. 相似文献
524.
Nicholas Hughes Allen 《公共行政管理与发展》2006,26(5):439-447
Following 9/11, the Department of Homeland Security established the Container Security Initiative (CSI) programme in 2002 in response to the threat from terrorist attacks involving weapons of mass destruction transported by cargo containers. This project establishes the tracking and targeting of ‘high risk’ containers and their subsequent scanning with X‐ray machines before loading onto the U.S. bound ships. To date, 44 of the world's largest ports have agreed to become CSI‐compliant, the majority of which are located in industrialised countries, while developing and least developed countries are under‐represented. CSI‐eligibility requires that ports represent a considerable volume of U.S. bound container traffic and invest in container scanning devices. Every non‐intrusive inspecting device (NII) costs several million dollars while investments in IT and existing infrastructure often triple the compliance costs. Containers originating in a CSI port are expedited through U.S. customs, representing a comparative trade barrier for exporters from non‐CSI ports. Thus, CSI acts as a tool for the U.S. to improve security, while representing a challenge to exporting countries' market access. This article provides an evaluation of the impacts this plan will have on the export competitiveness of developing countries. It reviews the potential benefits this programme offers in terms of improved trade facilitation, as well as proposing recommendations for its expansion to include developing countries. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
525.
威胁我国安全的恐怖主义特点分析 总被引:1,自引:0,他引:1
恐怖主义对我国的威胁日益突出,对国家安全、社会稳定和人民生命财产安全构成了严重危害。威胁的主要来源,一是国际恐怖势力和极端组织实施的恐怖活动;二是境内外民族分裂势力实施的恐怖活动;三是邪教组织实施的恐怖活动;四是黑社会等严重刑事犯罪组织和其他极端分子实施的恐怖活动。威胁我国安全的恐怖主义除了具有一般恐怖主义的政治性、暴力性、刑事违法性等共同特征以外,还具有主体结构多元、国际背景复杂、宗教色彩浓厚、组织运作联合、方式手段诡秘、发展态势趋强等突出特点。 相似文献
526.
大数据及其分析技术的发展极大地推动了国际关系研究的发展,使得传统国际关系研究无法完成的任务变为可能。恐怖主义是当今全球治理中重大而棘手的问题,也是国际关系领域长期关注的议题。本文运用海量事件数据和地理信息系统(GIS)技术,将恐怖袭击的地理单元细粒化到以0.5×0.5经纬度作为分辨率的时空网格,寻找微观分析单元上恐怖袭击的时空规律,并运用分离总体持续期模型对恐怖袭击风险的空间分布和发生时机进行解释和预测。通过对非洲10674个时空网格在1994-2013年间恐怖袭击的时空特征进行分析,本文对非洲恐怖袭击发生时机进行精准捕捉,对恐袭地点进行细粒化定位,并对恐袭地理分布进行疫区与免疫区区分,不但深化了对恐怖主义的认识,而且提高了恐袭预测的精度和实际应用价值。本文的研究尝试表明,在大数据时代进行国际关系研究,不仅要充分利用海量数据提供的前所未有的丰富信息,更要选择和运用恰当的统计技术对复杂时空相关性进行细粒度分析,从而形成有效的创新路径。 相似文献
527.
闭路电视监控器与大型公共交通系统反恐问题研究 总被引:1,自引:0,他引:1
马忠红 《吉林公安高等专科学校学报》2008,23(4):47-51
伦敦地铁爆炸事件、西班牙马德里火车站爆炸事件等一系列袭击公共交通系统的恐怖事件,使人们越来越关注大型公共交通系统的安全和防范问题。大型公共交通系统由于流量大,无法运用航空系统的安全检查模式。在大型公共交通系统安装闭路监控器,恰恰可以在不影响这些大流量公共交通工具运行速度和效率的情况下,有效地起到安全防范的作用。英国和美国在大型公共交通系统安装闭路电视监控器的经验和模式,可以为我国大型公共交通系统的安全防范提供借鉴和参考。 相似文献
528.
《Journal of Intervention and Statebuilding》2013,7(3):307-332
Abstract A central hypothesis in the articulated rationale inspiring the war on terror suggests that failed states play a key role in the international terrorist nexus and require external intervention and guided democratization. This logic is based on two related premises; first that there is a direct link between failed states and international terrorism, second that democratic governance reduces the recourse to terrorism. This article suggests that there is no causal link between failed states and international terrorism and that the asserted ability of democratic governance to catalyze a reduction in terrorism is exaggerated if not wholly inaccurate. 相似文献
529.
530.
Dominique Clément 《Terrorism and Political Violence》2017,29(1):27-51
Montreal's Summer Olympics in 1976 was a turning point in Olympic history: it was the Games' first highly visible security operation. It was also a transformative moment in the history of security planning in Canada: preparations for the games contributed to shifting the Security Services' focus from communism towards domestic and international terrorism. The following article documents, for the first time, the scope of this operation. It is based on five years of requests and appeals under the federal Access to Information Act, which led to the release of over fifty thousand pages of Royal Canadian Mounted Police documents. I argue that security for the Montreal Olympics was based largely on imagined threats. In addition, I argue that security costs for the Montreal Olympics were high but modest as compared to the overall budget. Nonetheless, Montreal set a precedent for high security costs that have since become the standard for hosting the Olympics. Finally, I argue that the Montreal Olympics had long-term implications for policing in Canada. The scale of the operation produced new resources and inter-agency links that were only made possible as a result of hosting the games. 相似文献