首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1552篇
  免费   87篇
各国政治   94篇
工人农民   35篇
世界政治   77篇
外交国际关系   103篇
法律   954篇
中国共产党   4篇
中国政治   60篇
政治理论   196篇
综合类   116篇
  2024年   4篇
  2023年   20篇
  2022年   19篇
  2021年   30篇
  2020年   48篇
  2019年   43篇
  2018年   58篇
  2017年   85篇
  2016年   52篇
  2015年   42篇
  2014年   89篇
  2013年   208篇
  2012年   91篇
  2011年   64篇
  2010年   82篇
  2009年   115篇
  2008年   100篇
  2007年   112篇
  2006年   84篇
  2005年   43篇
  2004年   53篇
  2003年   43篇
  2002年   39篇
  2001年   31篇
  2000年   16篇
  1999年   15篇
  1998年   8篇
  1997年   4篇
  1996年   4篇
  1995年   4篇
  1994年   3篇
  1993年   3篇
  1992年   3篇
  1991年   4篇
  1990年   3篇
  1989年   3篇
  1988年   1篇
  1987年   2篇
  1986年   1篇
  1985年   2篇
  1984年   3篇
  1983年   2篇
  1981年   3篇
排序方式: 共有1639条查询结果,搜索用时 31 毫秒
251.
《国际相互影响》2012,38(3):352-364
Recent studies examining the political impact of individuals' connections to the victims of international violence find these ties have a powerful effect on people's attitudes and feelings. How reliable, however, are self-reported claims of ties to a conflict's casualties? Using data from 9/11 and the Iraq War, I examine these claims, analyzing: 1) their influence on both public assessments of foreign policy and voting behavior, 2) whether critical demographic and political factors predict the likelihood of individuals reporting a tie to a conflict casualty, 3) the predicted, aggregate likelihood of survey respondents having connections to conflict victims, and 4) the theoretical distinction between actual vs. perceived casualty connections. The results strongly support the use of casualty connection data for understanding individuals' responses to international violence, and encourage future applications of social network approaches to the study of war and politics.  相似文献   
252.
The ability to determine the age of fingerprints would be immeasurably beneficial in criminal investigations. We explore the possibility of determining the age of fingerprints by analyzing various compounds as they diffuse from the ridges to the valleys of fingerprints using matrix‐assisted laser desorption/ionization mass spectrometry imaging. The diffusion of two classes of endogenous fingerprint compounds, fatty acids and triacylglycerols (TGs), was studied in fresh and aged fingerprints on four surfaces. We expected higher molecular weight TGs would diffuse slower than fatty acids and allow us to determine the age of older fingerprints. However, we found interactions between endogenous compounds and the surface have a much stronger impact on diffusion than molecular weight. For example, diffusion of TGs is faster on hydrophilic plain glass or partially hydrophilic stainless steel surfaces, than on a hydrophobic Rain‐x treated surface. This result further complicates utilizing a diffusion model to age fingerprints.  相似文献   
253.
ABSTRACT

Retention of public child welfare (PCW) workers is the focus of much scholarly research. Examinations of the topic have ranged from assessments of workers’ background to job factors and attitudinal components about the workplace. Unlike most studies, the present study uses agency administrative data on retention. In it, 502 PCW workers responded to a point-in-time survey covering a wide range of topics including job satisfaction, commitment to child welfare, perceptions of culture and climate, Title IV-E status, and demographic variables. While Title IV-Es were more likely to leave the agency, several significant interactions between Title IV-E and retention status showed that Title IV-Es who left the agency had significantly lower supervisor satisfaction and influence than Title IV-Es who stayed; and lower efficacy scores than non-Title IV-Es who left. No such differences were found for non-Title IV-E stayers and leavers. Implications for these differences for county agencies and universities are discussed.  相似文献   
254.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
255.
Access by law enforcement authorities to personal data initially collected by private parties for commercial or operational purposes is very common, as shown by the transparency reports of new technology companies on law enforcement requests. From a data protection perspective, the scenario of law enforcement access is not necessarily well taken into account. The adoption of the new data protection framework offers the opportunity to assess whether the new ‘police’ Directive, which regulates the processing of personal data for law enforcement purposes, offers sufficient safeguards to individuals. To make this assessment, provisions contained in Directive 2016/680 are tested against the standards established by the ECJ in Digital Rights Ireland and Tele2 Sverige on the retention of data and their further access and use by police authorities. The analysis reveals that Directive 2016/680 does not contain the safeguards identified in the case law. The paper further assesses the role and efficiency of the principle of purpose limitation as a safeguard against repurposing in a law enforcement context. Last, solutions to overcome the shortcomings of Directive 2016/680 are examined in conclusion.  相似文献   
256.
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.  相似文献   
257.
This article envisions an iterative regulatory process for robot governance. In the article, we argue that what lacks in robot governance is actually a backstep mechanism that can coordinate and align robot and regulatory developers. In order to solve that problem, we present a theoretical model that represents a step forward in the coordination and alignment of robot and regulatory development. Our work builds on previous literature, and explores modes of alignment and iteration towards greater closeness in the nexus between research and development (R&D) and regulatory appraisal and channeling of robotics’ development. To illustrate practical challenges and solutions, we explore different examples of (related) types of communication processes between robot developers and regulatory bodies. These examples help illuminate the lack of formalization of the policymaking process, and the loss of time and resources that the waste of knowledge generated for future robot governance instruments implies. We argue that initiatives that fail to formalize the communication process between different actors and that propose the mere creation of coordinating agencies risk being seriously ineffective. We propose an iterative regulatory process for robot governance, which combines the use of an ex ante robot impact assessment for legal/ethical appraisal, and evaluation settings as data generators, and an ex post legislative evaluation instrument that eases the revision, modification and update of the normative instrument. In all, the model breathes the concept of creating dynamic evidence-based policies that can serve as temporary benchmark for future and/or new uses or robot developments. Our contribution seeks to provide a thoughtful proposal that avoids the current mismatch between existing governmental approaches and what is needed for effective ethical/legal oversight, in the hope that this will inform the policy debate and set the scene for further research.  相似文献   
258.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
259.
On 26 July 2017, the Grand Chamber of the European Court of Justice rendered its seminal Opinion 1/15 about the agreement on Passenger Name Record data between the EU and Canada. The Grand Chamber considered that the decision of the Council about the conclusion, on behalf of the Union, of the agreement between the EU and Canada about the transfer and processing of PNR data must be based jointly on Article 16(2) about the protection of personal data and Article 87(2)(a) about police co-operation among member states in criminal matters, but not on Article 82(1)(d) about judicial co-operation in criminal matters in the EU of the Treaty on the Functioning of the EU. The Grand Chamber also considered that the agreement is incompatible with Article 7 on the right to respect for private life, Article 8 on the right to the protection of personal data, Article 21 on non-discrimination and Article 52(1) on the principle of proportionality of the Charter of Fundamental Rights of the EU since it does not preclude the transfer, use and retention of sensitive data. In addition to the requirement to exclude such data, the Grand Chamber listed seven requirements that the agreement must include, specify, limit or guarantee to be compatible with the Charter.The opinion of the Grand Chamber has far-reaching implications for the agreement on PNR data between the EU and Canada. It has also far-reaching implications for international agreements on PNR data between the EU and other third states. Last, it has far-reaching implications for Directive 681 of 27 April 2016 on PNR data.  相似文献   
260.
The Marikana massacre ruptured the South African sociopolitical horizon in August 2012. This analysis aims to expose or make visible the scopic regimes at work when interpreting the event. By referencing Judith Butler’s “frame theory” (2009) and Nicholas Mirzoeff’s “the right to look” (2011), the event is unpacked, among other things, as the volatile intersection of differing world views and technics of vision. Three scopic frames are used to interrogate the event: the first aims to unmask “oversights” during the event, whereas the remaining two deal more with inversions of sight which bear on “foresight” and “insight”. In terms of oversight, the first frame refers to the overseeing or invigilation of the event via instruments of visuality or vision machines (e.g. satellites, unmanned aerial vehicles, and helicopters), promising complete transparency. The second oversight comes in the representations of the events as media spectacle, becoming part of a new mediated visibility. The final oversight refers to the miners as subalterns becoming visible in a system that renders them invisible from the start. The second cluster of the visual complex, namely the appeal to foresight, surfaces through the calling on a Sangoma (traditional healer) for muti (traditional medicine) to render the miners invincible/invisible to the enemy. The third and final cluster refers to artists Ayanda Mabulu’s Yakhal’inkomoBlack man’s cry (2013) and Mary Wafer’s Mine exhibition (2012), aiming to provide some insight into the unrepresentability of the event.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号