首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   312篇
  免费   6篇
各国政治   8篇
工人农民   3篇
世界政治   6篇
外交国际关系   57篇
法律   115篇
中国共产党   4篇
中国政治   9篇
政治理论   11篇
综合类   105篇
  2023年   2篇
  2022年   2篇
  2021年   12篇
  2020年   12篇
  2019年   5篇
  2018年   18篇
  2017年   5篇
  2016年   6篇
  2015年   6篇
  2014年   17篇
  2013年   27篇
  2012年   11篇
  2011年   24篇
  2010年   13篇
  2009年   41篇
  2008年   35篇
  2007年   27篇
  2006年   13篇
  2005年   9篇
  2004年   12篇
  2003年   7篇
  2002年   4篇
  2001年   8篇
  2000年   1篇
  1999年   1篇
排序方式: 共有318条查询结果,搜索用时 15 毫秒
51.
After the early 1990s, the wave of regionalism covered broader areas in the world, and Northeast Asia, which had weak regional cohesion largely due to history-oriented animosity, gradually developed initiatives for regional cooperation since the late 1990s. This article seeks to address why and how China, Japan, and South Korea have pursued regional cooperation by relying on the concept of ‘regional governance’. It advances two arguments. First, the governments of China, Japan, and South Korea have identified the avoidance of risk from uncertainty as a major objective of promoting trilateral cooperation in specific functional areas. Second, they have gradually intensified the harmonisation of regulatory frameworks in the cooperative process in collaboration with non-state actors. The article examines the arguments by tracing the evolution of trilateral cooperation in environmental protection and information technology (IT) development.  相似文献   
52.
信息化是全球范围内推动经济和社会变革的重要力量,是增强国家竞争力的制高点。与此同时,由信息技术所带来的信息安全问题亦日益凸显,已成为各国高度关注的问题。应对新一代信息技术挑战的对策主要有:加强管理体制与机制创新,加强信息化软硬件建设,加强网络舆情引导,加大对网络犯罪活动的打击力度与加强公众信息安全教育等。  相似文献   
53.
在视频侦查新技术和新思维的视域下,刑事技术工作应从转变思维方式,树立深度应用理念。在宏观层面,推进刑事技术工作在视频侦查条件下的发展,需要抓好以下工作:一是修改《公安机关刑事案件现场勘验检查规则》,为勘查技术工作向视频侦查拓展提供制度支撑。二是构建"四侦合一"勘查工作模式,注重对现有信息资源的充分应用。三是加强天网工程和视频侦查数据库的基础建设。四是大力开展人才培训、引进和岗位技术比武。在微观层面,要切实打好"合成战",要配合视频侦查人员做好视频图像的获取、视频图像的侦查价值的挖掘和痕迹物证与视频图像的碰撞等工作。  相似文献   
54.
随着我国公务员录用面试信息化建设工作的深入推进,各地陆续在公务员面试过程中采用了公务员面试计算机评分系统。该系统对考官基本信息库、考官的原始计分表、监督员(复核员)的统计表等数据的加密存贮和传输非常重要。为避免泄密,基于PKI技术的“混合签密”方案应用于面试计算机评分系统,能很好地提供机密性、完整性、可认证和不可否认性保证数据的安全性。  相似文献   
55.
由于明朝海禁政策的限制,在以福建东南沿海区域为中心的全球化初期的历史背景下,有许多关于闽商的真实史实都被边缘化,甚至没有记载,因此,借由弗兰克的观点,我们需要用一种全球视野来看当时的世界经济,从人口、技术和制度三方面来还原全球化初期16到18世纪里真实的闽商和真实的中国。  相似文献   
56.
This is a summary of the Baker & McKenzie columns on developments in EU law relating to IP, IT and telecommunications. This summarises the principal developments in 2008 that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas and which were reported on in this column in 2008. It seeks also to update any further development which may have taken place in relation to the specific topics since originally reported. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
57.
This is the latest edition of Baker & McKenzie's column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
58.
This column provides a country by country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or developments.  相似文献   
59.
University spin-offs are defined as firms founded by university employees. Using a large database on venture-backed start-up companies, I describe the characteristics of university spin-offs and investigate whether they perform differently than other firms. I find that venture-backed university spin-offs are concentrated in the biotechnology and information technology industries. Moreover, a spin-off tends to stay close to the university, suggesting that technology transfer through spin-offs is largely a local phenomenon. Multivariate regression analyses show that university spin-offs have a higher survival rate but are not significantly different from other start-ups in terms of the amount of venture capital raised, the probability of completing an initial public offering (IPO), the probability of making a profit, or the size of employment.
Junfu ZhangEmail:
  相似文献   
60.
Why do university researchers decide to start-up a new venture? How can we distinguish between the different factors influencing such an important decision? To what extent are specific policies activated within universities relevant in the process of new venture creation? In this paper we try to answer these very significant questions, through an empirical analysis performed on a sample of 88 Italian academics involved in the creation of 47 spin-offs between 1999 and 2005. Our findings show that the availability of technologies with a potential for commercial exploitation, the possibility to access university infrastructures and the personal benefits are the most important incentives for academics. More generally, academics’ involvement in creating new ventures is not driven by an entrepreneurial attitude, but rather by the expectation of generating results which will enhance their academic position. Additional investments and efforts made by some universities to create more mechanisms to support spin-offs are not perceived as additional incentives. These results hold after controlling for academic founders’ institutional affiliation, status, and the companies’ growth over their first two years of existence. Implications for public policy and organizational processes are discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号