首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   345篇
  免费   22篇
各国政治   28篇
工人农民   12篇
世界政治   47篇
外交国际关系   48篇
法律   114篇
中国共产党   2篇
中国政治   11篇
政治理论   92篇
综合类   13篇
  2023年   5篇
  2022年   1篇
  2021年   9篇
  2020年   14篇
  2019年   16篇
  2018年   21篇
  2017年   26篇
  2016年   13篇
  2015年   20篇
  2014年   14篇
  2013年   104篇
  2012年   21篇
  2011年   14篇
  2010年   10篇
  2009年   17篇
  2008年   8篇
  2007年   7篇
  2006年   14篇
  2005年   11篇
  2004年   4篇
  2003年   4篇
  2002年   7篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1996年   1篇
  1990年   1篇
排序方式: 共有367条查询结果,搜索用时 15 毫秒
321.
1998年以来,日本系统地重建了金融监管体系。其主要内容包括金融监管机构改革和提高金融监管效能,事前金融监管制度重建与提高金融机构经营健全性,事后金融安全网建设和防范系统性风险等三个方面。日本的经验表明,金融监管体制都具有时效性特征。将金融自由化与金融监管对立关系对立起来缺乏合理性,金融监管的作用是评估和检查金融机构的风险控制程序,而不是代替金融机构决策和进行风险控制。  相似文献   
322.
We study the rationale for the use of exclusivity to protect transfer of technology in subcontracting agreements. The legal possibility arises through the EU Notice on Subcontracting. Empirically, the link between exclusive agreements and technology transfer among firms in the automotive supply industry in EU candidate countries is surprisingly weak, although with exclusive-supply or exclusive-buying clauses in subcontracting agreements upstream transfer of technology is more likely. Exclusive agreements are often reciprocal, and are typically passed on. Downstream firms are more likely to face and use vertical restraints. Technology trickles upstream: Multinational final assemblers transfer more technology than lower-tier suppliers.  相似文献   
323.
社会网络的动态过程及理论探索   总被引:3,自引:0,他引:3  
本论文关注社会网络研究经常被忽视的一个层面,即社会网络的动态过程。在对相关理论的批判性回顾基础上,提出了一个整合结构、文化与个人能动性的理论框架以全面洞察个人的社会网络在社会文化脉络下的动态变化。  相似文献   
324.
A major debate among scholars studying Central Asian societies concerns the structure of social and political networks in the region. Still unresolved is the issue of whether to define such networks in terms of ‘clans’, ‘regionalism’, or personal networks. This article, based on data collected during fieldwork in Tajikistan and Uzbekistan, attempts to understand these social and political networks. It suggests that networks are very complex. The networks in Tajikistan and Uzbekistan draw on various loyalties including ties of family, friendship, work, education, and patron-client relationships. They are neither purely regional nor purely clan-based. Personal networks, factions, and self-interest play important roles. At the elite level, networks more closely resemble patron-client networks, which may or may not include regional or kinship ties. Among ordinary people, such ties tend to be based on localism, kinship, and/or patronage relationships.  相似文献   
325.
Virtual Enterprise Networks,是目前欧美及香港特别行政区非常流行的虚拟实习企业网络。基于该基本理论构架,文章提出了二一种能够同时提高参与者专业知识和英语能力的网络虚拟实习模式——实用英语实习企业训练法(PEVE),深入阐述了其建构的必要性和可行性,并辅之以英语实习警务网络(VPIE)为例,论述了该项方法的构成要素、活动内容及功能等,最后对这一新型理念所面临的诸多问题与弊端提出了相应的对策。  相似文献   
326.
Wireless local area networks (WLANs) have enjoyed a rapid increase in usage in recent years. WLANs serve to connect users to the Internet by means of radio or infrared frequencies. The rise in WLAN usage has however served to highlight some of the inadequacies of the present laws governing unauthorised access to WLANs. At present, the legislation serves to make unauthorised access, modification or impairment of electronic communications illegal. It is clear that the provisions prohibit the hacking of computer systems and denial of service attacks. However, it is unclear whether the legislation extends to additional forms of unauthorised access such as wardriving (using software to identify and map freely available WLAN) and joyriding (accessing a network with no further damage to the connection). The liability of Internet Service Providers and those engaged in unauthorised access in public places also remains unclear. Finally, the relationship of the offence of unauthorised access to the tort of trespass and the laws of copyright remain untested. The objective of this paper is to consider the measures necessary to increase the effectiveness of WLAN laws. The paper will begin by considering the nature of WLAN technology and the policy discourse to date. This will be followed by an examination of the present Australian law and an identification of areas of uncertainty. Finally, the paper will consider the measures required to enhance the certainty and effectiveness of the laws governing unauthorised access to WLAN.  相似文献   
327.
CCTV networks are progressively being replaced by more flexible and adaptable video surveillance systems based on internet protocol (IP) technologies. The use of wireless IP systems allows for the emergence of flexible networks and for their customization, while at the same time video analytics is easing the retrieval of the most relevant information. These technological advances, however, bring with them threats of a new kind for fundamental freedoms that cannot always be properly assessed by current legal safeguards. This paper analyses the ability of current data protection laws in providing an adequate answer to these new risks.  相似文献   
328.
网络问政常态化是大势所趋   总被引:1,自引:0,他引:1  
网络问政是社会发展进步的产物。网络特有的广泛性和交互性是传统媒体不可企及的。正因为如此,网络问政才能以其特有的强大生命力不断地向前发展,成为现代人们参政议政的重要平台。网络是当今领导干部了解民情、集中民智,实现科学决策、民主决策的重要渠道。面对日益增多的网民参与,推动网络问政常态化已是大势所趋。  相似文献   
329.
The current paper aimed to investigate the effectiveness of five law enforcement interventions in disrupting and dismantling criminal networks. We tested three law enforcement interventions that targeted social capital in criminal networks (betweenness, degree and cut-set) and two interventions that targeted human capital (actors who possess money and those who possess precursor chemicals). These five interventions are compared with each other and with random (opportunistic) removal of actors in two settings: (i) with network adaptation incorporated into the simulations and (ii) without network adaptation. Results illustrate that the removal of actors based on betweenness centrality was the most efficient strategy, leading to network disruption in the least number of steps and was relatively consistent across replications. Targeting actors who possessed money was the second most effective overall and was also relatively consistent in its disruptive effect.  相似文献   
330.
This study uses wholesale prices of MDMA for 59 cities in the USA published by the National Drug Intelligence Center (NDIC) over the period of 2002–2011 to identify trafficking patterns of MDMA. Price differentials and correlations between pairs of cities are used to infer the presence of a link and the direction of flow of MDMA. The presence of inward and outward links is used to categorise each city as a ‘source’, ‘destination’, ‘transit’, or ‘weakly integrated’ city. The analysis identified low prices close to the Canadian and Mexican borders, in a number of cities such as Chicago, Miami, New York City, a trio of cities in the Carolinas, and along the West Coast. A number of these cities are linked to large numbers of other cities, indicating hub- or source-like status. The findings generate insights into the status of major US cities in the MDMA trafficking network.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号