首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   143篇
  免费   3篇
各国政治   1篇
世界政治   3篇
外交国际关系   41篇
法律   26篇
中国政治   18篇
政治理论   5篇
综合类   52篇
  2023年   1篇
  2021年   2篇
  2020年   5篇
  2019年   3篇
  2018年   9篇
  2017年   5篇
  2015年   2篇
  2014年   22篇
  2013年   32篇
  2012年   3篇
  2011年   4篇
  2010年   6篇
  2009年   9篇
  2008年   4篇
  2007年   1篇
  2006年   7篇
  2005年   9篇
  2004年   7篇
  2003年   8篇
  2002年   6篇
  2000年   1篇
排序方式: 共有146条查询结果,搜索用时 15 毫秒
131.
编造虚假恐怖信息犯罪既是《中华人民共和国刑法修正案 (三 )》增加的一种新型的恐怖活动犯罪 ,又是实践中发生率高、影响面广的恐怖活动犯罪之一。它的法律特征是什么、发生的原因有哪些、我们应当采取什么对策来遏止 ?等等 ,都值得研究。  相似文献   
132.
反恐怖劫持应急指挥系统构建和程序研究   总被引:2,自引:0,他引:2  
突发事件应急指挥,是协调各级应急处置力量“有效行动”的关键,是处置行动的核心和灵魂。科学合理的反恐怖劫持应急指挥系统是实现高效、稳定指挥的重要保证。对恐怖劫持人质事件的处置,必须针对我国恐怖活动的特点、反恐怖武装力量体制的特点及反恐怖斗争方针政策的特点,建立固定的、强有力的、权威性的、能集中统一指挥和协调各方力量的反恐怖组织机构和指挥体系。反恐怖劫持处置是一个人工控制系统,处置过程必须通过系统工程方法进行调控,以公安指挥中心为平台,按照接警、出警、应急启动、救援行动等程序进行。  相似文献   
133.
爆炸和人质劫持是人口密集场所恐怖事件的主要类型,对人口密集场所恐怖事件的处置应遵循正确的危机管理过程方法:建立实时的动态指挥体系及格式化的处置模式,采取妥当的现场处置与救援措施,加强对媒体的正确管理与引导,实现与媒体的良性互动,充分凸现人本理念,正确把握紧急状态下的人权保障问题。  相似文献   
134.
The social sciences have mostly focused on the formation of social opinions from a semantic point of view: given a certain semantic field, interviews, statistics, and other analytical instruments are commonly deployed in order to map the distribution of views, their evolution, their conflicts and their agreements. Socio-semiotics, social semiotics, and the other semiotic branches that bear on social inquiry have contributed to the effort by providing semiotic grids of categorization. These grids too, however, have been mostly related to semantic contents circulating through societies and their cultures. The present article pursues a different hypothesis. After briefly recalling the events of 7–9 January 2015 in the Parisian area, the article seeks to survey and map the syntax of progressive differentiation of opinions circulating in the social networks about such events. Some patterns are identified and semiotically described: (1) cleavage; (2) comparative relativizing; (3) blurring sarcasm; (4) anonymity; (5) unfocused responsibility; (6) conspiracy thought. A new semiotic square is created to visually display these patterns, their positions, their relations, and their evolution.  相似文献   
135.
In this article we offer a first attempt at providing a set of universal grading criteria for determining on what basis, and how far, an item of discursive content can be considered “terroristic.” In doing so, we draw loosely on the existing COPINE scale for child abuse images. The scale described in the article is not intended to reflect actual risk of engagement in terrorist violence, nor is it intended to have evidential validity in relation to offenses in certain jurisdictions relating to “terrorist publications.” Rather, by formalising assumptions which seem already to be latent in the literature on terrorist use of the Internet, it aspires to serve as a starting point for a more methodologically coherent approach to relationships between content—particularly online content—and terrorism.  相似文献   
136.
ABSTRACT

The conventional wisdom that religious conflicts are more intense than other types of conflicts is tested in this study using a cross-sectional time series analysis. The statistical test evaluates the intensity of 278 territorial conflict phases in the International Peace Research Institute in Oslo, Norway (PRIO) Armed Conflict Dataset. The results indicate support for the assumption that religious conflicts are more intense than other types of conflicts; however, the relationship disappears when the relevance of religion is taken into account. Furthermore, this study evaluates the relationship of conflict intensity with the type of religion involved in the conflict and determines that no religion exhibits a significantly higher or lower intensity than the others.  相似文献   
137.
This study aims to investigate how Al Qaeda uses the Internet for military training and preparation. What kind of training material is available on jihadi webpages, who produces it, and for what purpose? The article argues that in spite of a vast amount of training-related literature online, there have been few organized efforts by Al Qaeda to train their followers by way of the Internet. The Internet is per today not a “virtual training camp” organized from above, but rather a resource bank maintained and accessed largely by self-radicalized sympathizers.  相似文献   
138.
Using data from the University of Maryland's Global Terrorism Database II, this paper first provides information on the nature of terrorist incidents in India in the period 1998-2004: the Indian states that were worst affected by terrorist incidents and fatalities; the terrorist groups responsible for such incidents and their modus operandi. Next, the paper focuses on the issue of fatalities from terrorist incidents. It inquires into the extent to which the number of fatalities following an incident was influenced by the type of attack (bombings, armed assault, etc.) and the extent to which it was influenced by the type of terrorist group. By examining the number of fatalities resulting from terrorist attacks in India, the paper disentangles the influence on this number of attack type and attack group. Lastly, the paper applies Atkinson's concept of equality-adjusted income to terrorism to arrive at the concept of equality-adjusted deaths from terrorist incidents: in order to avoid spectacular incidents resulting in the loss of a large number of lives—as in New York on September 11, 2001 and in Mumbai 26–29 November 2008—“society” might be prepared to tolerate “low-grade” terrorism which resulted in a larger number of deaths in total but avoided a large number of deaths from a single iconic incident.  相似文献   
139.
This article presents an empirical analysis of a unique dataset of 1240 former members of the Provisional Irish Republican Army (PIRA). We highlight the shifting sociological and operational profile of PIRA's cadre, and highlight these dynamics in conjunction with primary PIRA documents and secondary interview sources. The effect of these changes in terms of the scale and intensity of PIRA violence is also considered. Although this is primarily a study of a disbanded violent organization, it contains broad policy implications beyond the contemporary violence of dissident movements in both Northern Ireland and the Republic of Ireland. We conclude with a consideration of how a shifting sociological profile impacts upon group effectiveness, resilience, homogeneity, and the turn toward peaceful means of contention.  相似文献   
140.
Researchers increasingly conduct quantitative studies of terrorist groups, which is an important advance in the literature. However, there has been little discussion of what constitutes a “terrorist group,” regarding conceptualization or measurement. Many studies of terrorist groups do not define the term, and among those that do, definitions vary considerably. The lack of clarity leads to conceptual confusion as well as sample selection issues, which can affect inferences. To address these issues, this article offers an in-depth analysis of the term and its use. It explores definitions in the literature, and then discusses different samples used. Empirically, the article demonstrates how sample selection can affect variable values. It also shows that a non-representative sample, such as the U.S. Foreign Terrorist Organization list, can lead to inaccurate generalizations. Ultimately, I present a straightforward “inclusive” definition, and argue for its practicality. Other suggestions are made for a more effective and cohesive research program.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号