首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   262篇
  免费   24篇
各国政治   11篇
工人农民   5篇
世界政治   10篇
外交国际关系   39篇
法律   125篇
中国共产党   1篇
中国政治   23篇
政治理论   64篇
综合类   8篇
  2023年   8篇
  2022年   3篇
  2021年   3篇
  2020年   21篇
  2019年   14篇
  2018年   22篇
  2017年   30篇
  2016年   16篇
  2015年   4篇
  2014年   13篇
  2013年   50篇
  2012年   19篇
  2011年   10篇
  2010年   6篇
  2009年   6篇
  2008年   7篇
  2007年   6篇
  2006年   7篇
  2005年   15篇
  2004年   7篇
  2003年   8篇
  2002年   4篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1994年   1篇
  1990年   1篇
  1989年   1篇
排序方式: 共有286条查询结果,搜索用时 62 毫秒
11.
Political parties strive for maximizing their vote shares. One way to achieve this goal is to attract voters from competitors. A precondition for strategies aiming at attracting these voters is that parties perceive their voter potentials among their rivals' electorates correctly. Yet, hardly anything is known about such perceptions. To fill this gap, we develop analogue measures of a party's perceived and its actual voter potential for each competitor in a party system. Combining elite and mass surveys conducted in Germany, we show that perceived and actual voter potentials depend on spatial considerations but also that not all parties are able to correctly evaluate their potentials. These deviations can be traced back to differences in the perceived placement of political actors between elites and citizens. This supports the spatial logic of party competition but it also points to potential pitfalls for strategic behavior of political parties.  相似文献   
12.
樊冰 《国际安全研究》2019,37(2):114-136
作为世界上情报体系最为发达的国家,美国国家安全情报机制一直以来备受各方关注。九一一事件催生了美国情报体系全面而彻底的改革。经过十多年的努力,美国情报界实现了从机构林立的分散体系到由国家情报总监办公室领导的有机整体的重大转型。从总体机制来看,美国情报界现已形成情报机构一体化与任务一体化的双轮驱动体系,其情报传递网络不仅涵盖领导、协调、执行三个层级间的纵向传送,而且包括不同情报机构之间的横向协调,基本实现了情报整合与信息共享。美国国家情报总监办公室成为名副其实的美国情报界统领,其下设的反恐、反扩散、反情报和网络情报中心构成了美国国家安全情报分类传递机制的四大支柱。通过比较,四大分类传递机制中最为成熟的是反恐中心,其次是反情报与安全中心,再次是网络威胁情报整合中心,最后是反扩散中心。由于各类情报机制自身发展程度的不同,其改革过程中所面临的挑战也不一样。美国国家安全情报传递机制的改革“瓶颈”既有发展不足导致的结构性困境,也有外部安全环境变化带来的挑战。此外,特朗普政府上台后的一系列政策举措使得美国国家安全情报体系的发展方向呈现出新的态势。  相似文献   
13.
Vietnam's perception of China is nuanced and complex, a mixture of challenge and opportunity. Given its geographic proximity and overwhelming power, China represents a permanent strategic challenge Vietnam cannot escape. However, the two countries are partners in the defence of socialist ideals and communist rule. These circumstances have clearly shaped Vietnam's China policy, which is a mixture of cooperation and struggle. Vietnam's strategy is not about confronting China directly but finding a way to live with and benefit from its power.  相似文献   
14.
How do political parties react to foreign security threats? There has been very little attention paid in the literature generally to how parties react to international events, particularly how parties react to foreign policy threats. Using data from the Comparative Manifesto Project, we examine how political parties in countries in Europe have reacted to Russian actions in terms of their emphasis on security issues. Based upon our analysis of the manifestoes from 331 parties in 36 countries we find that, generally, interstate threats have no significant effect on the military position adopted by political parties, although these effects vary by party type and by the type of threat. Russian based threats appear to be associated with the Far Left becoming more dovish (which is consistent with what would be expected by the literature) and the Far Right becoming significantly less hawkish.  相似文献   
15.
Violence characterized by similar actions, actor motivations, group structures, or level of damage still poses qualitatively distinct genera of threats to states. For instance, “terrorism” can threaten a particular state, be used by a state, or threaten the entire state system. Building on the threat construction literature, this study argues that threat is best understood through narratives on the relationship between violence and the boundary-producing practices that construct the state. Four ideal-typical basic narratives on this relationship are produced—entrant, resource, revisionist, and criminal. Each narrative is then demonstrated by looking at how it was used in a historical case of piracy. The action (piracy as raiding at sea) is held constant while the threat in each varies with the narrative. Understanding how threat is narratively constructed can help us to understand particular historical episodes of violence and state responses to them.  相似文献   
16.
Right-wing populist parties portray immigrants as economic or symbolic threats in their political advertisements by constructing a moral divide between the “good” ordinary people and “bad” immigrants. Yet, it remains unclear how these different threat appeals contribute to the formation of anti-immigrant attitudes among citizens and what role visual elements play in producing these effects. A survey-experiment with a quota sample of 471 participants reveals that, overall, symbolic threat appeals exert stronger effects on anti-immigrant attitudes than economic ones. When presented via text alone, only symbolic—not economic—threat appeals increased anti-immigrant attitudes via the activation of heuristic processing such as the reliance on negative stereotypes or feelings of anxiety, in particular among lower-educated citizens. When visuals were present, both types of threat appeals enhanced anti-immigrant attitudes among citizens across all education levels based on heuristic processing. Additionally, high image-text congruency induced cognitive argument approval resulting in higher anti-immigrant attitudes.  相似文献   
17.
Although agricultural biotechnology has been a seminal reference point in risk perception studies, public awareness of their exposure to risk deriving from this new technology has been minimal at best. However, recent events indicate there may be growing public concern as new variations of this technology appear. Understanding what drives perceptions of benefits from the third generation of the agricultural biotechnology and what determines public worries are keys for the future of this technology. To this end, this study analyzes survey data from the midsouth region of the United States to construct four separate regression models of perceived benefits from and worries over plant‐made industrial products and plant‐made pharmaceuticals. Findings suggest that while prior experience with and knowledge about agricultural biotechnology has an impact on perceptions of benefits and worries, trust in farmers plays a highly important role in determining perceptions.  相似文献   
18.
It has been common, at least since 1945, to exaggerate and to overreact to foreign threats, something that seems to be continuing with current concerns over international terrorism. This paper sketches threat exaggeration during the Cold War and applies the experience from that era to the current one. Alarmism and overreaction can be harmful, particularly economically. And, in the case of terrorism, it can help create the damaging consequences the terrorists seek but are unable to perpetrate on their own. Moreover, many of the forms alarmism has taken verge on hysteria. The United States is hardly "vulnerable" in the sense that it can be toppled by dramatic acts of terrorist destruction, even extreme ones. The country can, however grimly, readily absorb that kind of damage, and it has outlasted considerably more potent threats in the past.  相似文献   
19.
Many recent cross-national studies analyse the causes and electoral consequences of party policy shifts, using party position measures derived from election manifestos, expert surveys or voter surveys. However few studies validate their findings by analysing multiple measures of party policy shifts. In this article, data on European parties’ position shifts on both European integration and left-right ideology is analysed, showing that this is problematic because, while alternative measures of party policy positions correlate strongly in cross-sectional analyses, alternative measures of parties’ policy shifts are essentially uncorrelated in longitudinal analyses. Suggestions are offered on how to address this problem.  相似文献   
20.
Despite the fact that the Korean nuclear crisis is one of the most protracted security issues in the world, the research analysing the crisis from the perspective of securitisation theory is curiously absent. This article attempts to pin down some distinguishing features of South Korea’s securitisation of the nuclear threat posed by North Korea, thereby investigating why one rarely sees the implications of securitisation theory in the way that the Copenhagen School theorists would suggest. Borrowing the key components of securitisation theory—existential threats, referent objects and extraordinary measures—this article suggests three elusive characteristics of the South Korean actors’ speech acts as sources highlighting the dilemma. To make the article’s arguments clearer, I hold Floyd’s classification of securitisation theory, which separated the securitisation process into two different stages: securitising move and security practice. While acknowledging the importance of the differences between illocution and perlocution in a securitisation process, this article takes this logic one step further by suggesting the limits of the perlocutionary effect in making the securitisation process complete.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号