全文获取类型
收费全文 | 345篇 |
免费 | 22篇 |
专业分类
各国政治 | 28篇 |
工人农民 | 12篇 |
世界政治 | 47篇 |
外交国际关系 | 48篇 |
法律 | 114篇 |
中国共产党 | 2篇 |
中国政治 | 11篇 |
政治理论 | 92篇 |
综合类 | 13篇 |
出版年
2023年 | 5篇 |
2022年 | 1篇 |
2021年 | 9篇 |
2020年 | 14篇 |
2019年 | 16篇 |
2018年 | 21篇 |
2017年 | 26篇 |
2016年 | 13篇 |
2015年 | 20篇 |
2014年 | 14篇 |
2013年 | 104篇 |
2012年 | 21篇 |
2011年 | 14篇 |
2010年 | 10篇 |
2009年 | 17篇 |
2008年 | 8篇 |
2007年 | 7篇 |
2006年 | 14篇 |
2005年 | 11篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 7篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1996年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有367条查询结果,搜索用时 15 毫秒
321.
1998年以来,日本系统地重建了金融监管体系。其主要内容包括金融监管机构改革和提高金融监管效能,事前金融监管制度重建与提高金融机构经营健全性,事后金融安全网建设和防范系统性风险等三个方面。日本的经验表明,金融监管体制都具有时效性特征。将金融自由化与金融监管对立关系对立起来缺乏合理性,金融监管的作用是评估和检查金融机构的风险控制程序,而不是代替金融机构决策和进行风险控制。 相似文献
322.
We study the rationale for the use of exclusivity to protect transfer of technology in subcontracting agreements. The legal possibility arises through the EU Notice on Subcontracting. Empirically, the link between exclusive agreements and technology transfer among firms in the automotive supply industry in EU candidate countries is surprisingly weak, although with exclusive-supply or exclusive-buying clauses in subcontracting agreements upstream transfer of technology is more likely. Exclusive agreements are often reciprocal, and are typically passed on. Downstream firms are more likely to face and use vertical restraints. Technology trickles upstream: Multinational final assemblers transfer more technology than lower-tier suppliers. 相似文献
323.
社会网络的动态过程及理论探索 总被引:3,自引:0,他引:3
何雪松 《上海行政学院学报》2005,6(3):78-85
本论文关注社会网络研究经常被忽视的一个层面,即社会网络的动态过程。在对相关理论的批判性回顾基础上,提出了一个整合结构、文化与个人能动性的理论框架以全面洞察个人的社会网络在社会文化脉络下的动态变化。 相似文献
324.
İdil Tunçer-Kılavuz 《Central Asian Survey》2009,28(3):323-334
A major debate among scholars studying Central Asian societies concerns the structure of social and political networks in the region. Still unresolved is the issue of whether to define such networks in terms of ‘clans’, ‘regionalism’, or personal networks. This article, based on data collected during fieldwork in Tajikistan and Uzbekistan, attempts to understand these social and political networks. It suggests that networks are very complex. The networks in Tajikistan and Uzbekistan draw on various loyalties including ties of family, friendship, work, education, and patron-client relationships. They are neither purely regional nor purely clan-based. Personal networks, factions, and self-interest play important roles. At the elite level, networks more closely resemble patron-client networks, which may or may not include regional or kinship ties. Among ordinary people, such ties tend to be based on localism, kinship, and/or patronage relationships. 相似文献
325.
Virtual Enterprise Networks,是目前欧美及香港特别行政区非常流行的虚拟实习企业网络。基于该基本理论构架,文章提出了二一种能够同时提高参与者专业知识和英语能力的网络虚拟实习模式——实用英语实习企业训练法(PEVE),深入阐述了其建构的必要性和可行性,并辅之以英语实习警务网络(VPIE)为例,论述了该项方法的构成要素、活动内容及功能等,最后对这一新型理念所面临的诸多问题与弊端提出了相应的对策。 相似文献
326.
Niloufer SelvaduraiAuthor VitaeMd. Rizwanul IslamAuthor Vitae Peter GilliesAuthor Vitae 《Computer Law & Security Report》2009
Wireless local area networks (WLANs) have enjoyed a rapid increase in usage in recent years. WLANs serve to connect users to the Internet by means of radio or infrared frequencies. The rise in WLAN usage has however served to highlight some of the inadequacies of the present laws governing unauthorised access to WLANs. At present, the legislation serves to make unauthorised access, modification or impairment of electronic communications illegal. It is clear that the provisions prohibit the hacking of computer systems and denial of service attacks. However, it is unclear whether the legislation extends to additional forms of unauthorised access such as wardriving (using software to identify and map freely available WLAN) and joyriding (accessing a network with no further damage to the connection). The liability of Internet Service Providers and those engaged in unauthorised access in public places also remains unclear. Finally, the relationship of the offence of unauthorised access to the tort of trespass and the laws of copyright remain untested. The objective of this paper is to consider the measures necessary to increase the effectiveness of WLAN laws. The paper will begin by considering the nature of WLAN technology and the policy discourse to date. This will be followed by an examination of the present Australian law and an identification of areas of uncertainty. Finally, the paper will consider the measures required to enhance the certainty and effectiveness of the laws governing unauthorised access to WLAN. 相似文献
327.
Fanny CoudertAuthor Vitae 《Computer Law & Security Report》2009,25(2):145-154
CCTV networks are progressively being replaced by more flexible and adaptable video surveillance systems based on internet protocol (IP) technologies. The use of wireless IP systems allows for the emergence of flexible networks and for their customization, while at the same time video analytics is easing the retrieval of the most relevant information. These technological advances, however, bring with them threats of a new kind for fundamental freedoms that cannot always be properly assessed by current legal safeguards. This paper analyses the ability of current data protection laws in providing an adequate answer to these new risks. 相似文献
328.
网络问政常态化是大势所趋 总被引:1,自引:0,他引:1
彭健 《中共桂林市委党校学报》2009,9(3):43-47
网络问政是社会发展进步的产物。网络特有的广泛性和交互性是传统媒体不可企及的。正因为如此,网络问政才能以其特有的强大生命力不断地向前发展,成为现代人们参政议政的重要平台。网络是当今领导干部了解民情、集中民智,实现科学决策、民主决策的重要渠道。面对日益增多的网民参与,推动网络问政常态化已是大势所趋。 相似文献
329.
David Bright Catherine Greenhill Thomas Britz Alison Ritter Carlo Morselli 《Global Crime》2017,18(4):424-441
The current paper aimed to investigate the effectiveness of five law enforcement interventions in disrupting and dismantling criminal networks. We tested three law enforcement interventions that targeted social capital in criminal networks (betweenness, degree and cut-set) and two interventions that targeted human capital (actors who possess money and those who possess precursor chemicals). These five interventions are compared with each other and with random (opportunistic) removal of actors in two settings: (i) with network adaptation incorporated into the simulations and (ii) without network adaptation. Results illustrate that the removal of actors based on betweenness centrality was the most efficient strategy, leading to network disruption in the least number of steps and was relatively consistent across replications. Targeting actors who possessed money was the second most effective overall and was also relatively consistent in its disruptive effect. 相似文献
330.
This study uses wholesale prices of MDMA for 59 cities in the USA published by the National Drug Intelligence Center (NDIC) over the period of 2002–2011 to identify trafficking patterns of MDMA. Price differentials and correlations between pairs of cities are used to infer the presence of a link and the direction of flow of MDMA. The presence of inward and outward links is used to categorise each city as a ‘source’, ‘destination’, ‘transit’, or ‘weakly integrated’ city. The analysis identified low prices close to the Canadian and Mexican borders, in a number of cities such as Chicago, Miami, New York City, a trio of cities in the Carolinas, and along the West Coast. A number of these cities are linked to large numbers of other cities, indicating hub- or source-like status. The findings generate insights into the status of major US cities in the MDMA trafficking network. 相似文献