首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   588篇
  免费   33篇
各国政治   18篇
工人农民   21篇
世界政治   8篇
外交国际关系   16篇
法律   388篇
中国政治   22篇
政治理论   34篇
综合类   114篇
  2023年   2篇
  2022年   6篇
  2021年   7篇
  2020年   23篇
  2019年   18篇
  2018年   14篇
  2017年   15篇
  2016年   16篇
  2015年   14篇
  2014年   28篇
  2013年   51篇
  2012年   40篇
  2011年   36篇
  2010年   35篇
  2009年   38篇
  2008年   39篇
  2007年   47篇
  2006年   48篇
  2005年   41篇
  2004年   44篇
  2003年   13篇
  2002年   9篇
  2001年   12篇
  2000年   19篇
  1999年   5篇
  1995年   1篇
排序方式: 共有621条查询结果,搜索用时 250 毫秒
81.
王岽兴 《东南亚研究》2005,200(5):66-70
<1998年国际宗教自由法>(以下简称IRFA)是由美国保守派推动制订的一部具有域外效力的美国国内法.由于该法所包含的双重标准以及该法在推行过程中必然会产生的诸多问题,该法实施以来"产生"的域外效力十分有限,未对中美关系造成直接影响.但在美国社会不断保守化的背景下,IRFA对中美关系的间接和负面影响不容小视.针对美国国务院每年发布的<国际宗教自由年度报告>中对中国宗教自由状况的歪曲,中国政府予以外交上的坚决谴责是必须的,但从根本上说,在宗教领域奉行接触政策,勿视美国为敌,怀柔美国应是当前我国韬光养晦外交的较佳选择.  相似文献   
82.
行政许可法的实施与行政审批改革   总被引:2,自引:0,他引:2  
从历史的角度展示中国行政审批的沿革,分析改革中行政审批的现状、问题及原因。在 以行政法法理将不规范的审批行为归类分析之后,指出除适用行政许可法的行政审批行为以外,其它审 批活动也应受相应行政法规范的约束。  相似文献   
83.
本文从伪满中央银行的产生、性质、职能角度研究伪满洲国的中央银行制度。伪满中央银行是在日本操纵下继承四行号业务基础上设立的,所谓"圆活金融、稳定币值、统治金融"不过是日本扩大对伪满洲国侵略与掠夺的手段与工具,其本质是实现日本的利益最大化。基于上述原因,伪满中央银行作为发币行和政府的银行之职能畸形膨胀,却无法承担集中存款准备、充当最后贷款人以及组织商业银行清算等"银行的银行"职能。  相似文献   
84.
The U.S. has dramatically revised its approach to punishment in the last several decades. In particular, people convicted of sex crimes have experienced a remarkable expansion in social control through a wide-range of post-conviction interventions. While this expansion may be largely explained by general punishment trends, there appear to be unique factors that have prevented other penal reforms from similarly modulating sex offender punishment. In part, this continuation of a “penal harm” approach to sex offenders relates to the past under-valuing of sexual victimization. In the “bad old days,” the law and its agents sent mixed messages about sexual violence and sexual offending. Some sexual offending was mere nuisance, some was treatable, and a fraction “deserved” punishment equivalent to other serious criminal offending. In contrast, today's sex offender punishment schemes rarely distinguish formally among gradations of harm or dangerousness. After examining incarceration trends, this article explores the historical context of the current broad brush approach and reviews the unintended consequences. Altogether, this article reinforces the need to return to differentiation among sex offenders, but differentiation based on science and on the experience-based, guided discretion of experts in law enforcement, corrections, and treatment.  相似文献   
85.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
86.
家庭暴力这一带有普遍性的丑恶现象,是一个全球性的社会问题。家庭暴力侵害着妇女的身心健康、破坏家庭和睦、危害社会稳定,为社会所不容。本文将从李阳家庭暴力事件入手,分析我国家暴立法和执法中的不足,简要分析我国与其他国家在处理家暴问题上存在的差距,就如何预防和制止家庭暴力作简单的探讨,呼吁全社会对家庭暴力问题的共同关注和协助,共同来预防和消除家庭暴力。  相似文献   
87.
The article considers the subject of clickstream data from aEuropean/US perspective, taking into account the Data ProtectionFramework (Data Protection Directive 95/46/EC; Directive onPrivacy and Electronic Communications 2002/58/EC) and the USlegal framework and in particular, the Wiretap Act U.S.C. 2701(2004) and related statutes. It examines the extent to whichclickstream data is considered "personal data" within the DataProtection Directive and the implications to consumers and businesses.  相似文献   
88.
The Commons Act 2006 is the first statute since the Commons Registration Act 1965 to address the problems associated with the management of common land in England and Wales. A key focus for the 2006 Act is the introduction of mechanisms for the sustainable management of common land, including self‐regulatory commons councils. This article examines the ‘sustainable’ management of common land in historical and contemporary perspective. It sets the 2006 Act, and the sustainable management of common land, in the wider context of the ongoing debate triggered by Hardin's ‘Tragedy of the Commons’ and subsequent institutional and post‐institutional scholarship on common pool resource management. It uses historical and qualitative research data drawn from three case studies to demonstrate the irrelevance of Hardin's thesis in an English context, and identifies the Commons Registration Act of 1965 as the true ‘tragedy’ of the English and Welsh commons. The case studies also illustrate the challenges posed by the introduction of legal mechanisms to promote the ecologically sustainable management of the modern commons, and inform the critique of the Commons Act 2006 developed in the article.  相似文献   
89.
This article examines the two most influential international initiatives on electronic signatures (UNCITRAL’s 1996 Model Law on Electronic Commerce and the 1999 EU Electronic Signature Directive). It considers whether the legislative approaches in Australia and the United Kingdom based on these initiatives are helpful in deciding whether lower level signature methods such as simple email messages are likely to satisfy a legal requirement for a signature. The conclusion reached is that they are unhelpful. The article goes on to consider whether legislative amendments based on UNCITRAL’s 2001 Model Law on Electronic Signatures or the 2005 UN Convention on the Use of Electronic Communications in International Contracts would improve the identified weaknesses. It concludes that such an update would clarify some issues, but that overall it will not solve the difficulties. The article ends with a brief speculation on the likely attributes of a more helpful approach.  相似文献   
90.
揭示明确暴力手段的内涵,应当注意把握其基本特征。暴力手段的主观特征包括故意性、目的性两个方面,客观特征包括作为性、强制性、对象性三个方面。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号