首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   363篇
  免费   23篇
各国政治   30篇
工人农民   12篇
世界政治   47篇
外交国际关系   48篇
法律   128篇
中国共产党   2篇
中国政治   13篇
政治理论   92篇
综合类   14篇
  2023年   5篇
  2022年   2篇
  2021年   9篇
  2020年   15篇
  2019年   20篇
  2018年   23篇
  2017年   26篇
  2016年   13篇
  2015年   20篇
  2014年   14篇
  2013年   107篇
  2012年   21篇
  2011年   16篇
  2010年   11篇
  2009年   18篇
  2008年   8篇
  2007年   8篇
  2006年   15篇
  2005年   11篇
  2004年   4篇
  2003年   4篇
  2002年   7篇
  2001年   3篇
  2000年   2篇
  1999年   1篇
  1996年   1篇
  1990年   2篇
排序方式: 共有386条查询结果,搜索用时 281 毫秒
311.
312.
Annie Herro 《Global Society》2020,34(4):447-466
ABSTRACT

Recent scholarship in International Relations focuses on the tactics of international non-government organisations and transnational advocacy networks, with scholars mostly explaining the diverse and dynamic tactics of organisations working on similar issues. Based on multiple qualitative data sources, this article explores why the members of a transnational advocacy network, comprising organisations of, and representing, older persons, that are calling for a UN Convention on the Rights of Older Persons adopt tactics that are static, uniform and surprisingly softly-softly, despite their modest gains since the issue was put on the UN’s agenda nine years ago. The article demonstrates many of the existing explanations for tactical choices, but it extends what we know by importing the concept of collective identity from social movement studies. It argues that the older persons’ network has a weak collective identity that is conservative in nature, which influences the tactics deployed at the UN.  相似文献   
313.
Abstract

One of the most fiercely debated questions about EU regulatory governance is the respective role played by functional and political factors in regulatory integration. This article contributes to this debate by focussing on the functional factor. Based on a refined conceptualisation of functional stakes, it finds that they vary across sectors, evolve over time, and that these variations are reflected in the degree of regulatory integration observed. When member states perceive regulatory integration as a solution to one of their most pressing problems of the moment, they value – and sometimes even actively push for – the delegation of regulatory powers to the EU. This argument is subject to a credibility probe based on two within-sector analyses of temporal patterns of regulatory integration in energy and telecommunications. The empirical analysis lends support to the conditioning role of the functional factor in the design of EU regulatory governance.  相似文献   
314.
Bayes factors quantify the evidence in support of the null (absence of an effect) or the alternative hypothesis (presence of an effect). Based on commonly used cut‐offs, Bayes factors between 1/3 and 3 are interpreted as evidentially weak, and one typically concludes there is an absence of evidence. In this commentary on Warmelink, Subramanian, Tkacheva, and McLatchie (Legal Criminol Psychol 24, 2019, 258), we discuss how a Bayesian report can be made more informative. Firstly, this implies a departure from the labels provided by commonly used cut‐offs when reporting Bayes factors. Instead, we encourage researchers to report the value of the Bayes factors, or to convert these values into nominal support for the hypotheses. Secondly, researchers can provide recommendations to design follow‐up studies by examining the posterior distribution of the magnitude of the effect size. Lastly, we show how individual Bayes factors can be evaluated in the context of large‐scale meta‐analyses.  相似文献   
315.
ABSTRACT

Leadership decapitation, as a means of hindering the operations and hastening the demise of terrorist organizations, has been the subject of a growing body of research. However, these studies have not examined how an organization’s position in a broader network impacts its ability to weather decapitation. We argue that highly networked organizations possess characteristics that make decapitation less effective. To test this argument, we combine data on leadership decapitation with network data on terrorist organizations and find that well-networked organizations are resilience to leadership decapitation. Our study has implications for our understanding of how terrorist organizations respond to counterterrorism efforts.  相似文献   
316.
《Justice Quarterly》2012,29(5):872-899
Criminologists’ understanding of peer influences has been greatly advanced by social network methods; however, relatively scant attention has been paid to improving measurement. In particular, research has continued to measure peer influence by averaging the level of delinquency within a peer network, thereby neglecting the role of behavioral heterogeneity. The present study seeks to advance theory and research into peer influences on delinquency by explicitly modeling behavioral heterogeneity in peer networks measured as the variance. Drawing on social learning and opportunity theories, we argue that behavioral heterogeneity should attenuate the effect of average peer delinquency on individual offending. Models using social network data from the Add Health were estimated predicting involvement in two delinquent substance-use acts (cigarette smoking and getting drunk) as a function of peer influences. The results are consistent with our hypothesis, indicating that behavioral heterogeneity matters. Findings suggest that future research employing network models could incorporate peer behavioral heterogeneity to get a more accurate portrait of the processes of peer influence.  相似文献   
317.
Governments' demands for results in a complex and rapidly changing policy environment call for more strategic and nuanced ways of approaching policy. Drawing on the work of the British interpretive ‘turn’, evidenced in the network governance literature and the differentiated polity critique of Westminster narratives, and of Liedkta on strategy as design, this paper suggests that shared strategic narratives, more consciously applied to policy development and implementation, could deliver better results; that consensus from shared meaning‐making may have depth, and that it could emphasise the transformative over the conservative forces of individuals' traditions and beliefs. Data for the paper came from a micro‐study on the implementation of SmartGate automated border processing system in New Zealand.  相似文献   
318.
Interstate relations are highly interdependent: a change in relations between a pair of states can impact the relationship each of those states has with third parties, as well as relations among those third party states. This is particularly salient in cases where emerging security threats have the potential to destabilize existing patterns of interstate behavior. While the interdependent nature of states’ strategic responses to varied security challenges is often discussed and theorized in the international relations (IR) literature, it is less frequently modeled empirically. We present an approach for analyzing state relations that takes into account higher-order dependencies in the position of states within a network. We apply the approach to a unique context: diplomatic relations between Middle East and North African (MENA) states during a period in which the Islamic State of Iraq and the Levant (ISIL) becomes a significant destabilizing force in the region. We find that the emergence of ISIL dramatically reshaped the region’s politics, improving relations among the region’s major powers while worsening relations for the states facing territorial threats from the group.  相似文献   
319.
Online forms of harassment, stalking and bullying on social network and communication platforms are now arguably wide-spread and subject to regular media coverage. As these provision continue to attract millions of users, generating significant volumes of traffic, regulating abuse and effectively reprimanding those who are involved in it, is a difficult and sometimes impossible task. This article collates information acquired from 22 popular social network and communication platforms in order to identify current regulatory gaps. Terms of service and privacy policies are reviewed to assess existing practices of data retention to evaluate the feasibility of law enforcement officials tracking those whose actions breach the law. For each provision, account sign-up processes are evaluated and policies for retaining Internet Protocol logs and user account information are assessed along with the availability of account preservation orders. Finally, recommendations are offered for improving current approaches to regulating social network crime and online offender tracking.  相似文献   
320.
Mehlman and Li offer a framework for approaching the bioethical issues raised by the military use of genomics that is compellingly grounded in both the contemporary civilian and military ethics of medical research, arguing that military commanders must be bound by the two principles of paternalism and proportionality. I agree fully. But I argue here that this is a much higher bar than we may fully realize. Just as the principle of proportionality relies upon a thorough assessment of harms caused and military advantage gained, the use of genomic research, on Mehlman and Li''s view, will require an accurate understanding of the connection between genotypes and phenotypes – accurate enough to ameliorate the risk undertaken by our armed forces in being subject to such research. Recent conceptual work in evolutionary theory and the philosophy of biology, however, renders it doubtful that such knowledge is forthcoming. The complexity of the relationship between genotypic factors and realized traits (the so-called ‘G→P map’) makes the estimation of potential military advantage, as well as potential harm to our troops, incredibly challenging. Such fundamental conceptual challenges call into question our ability to ever satisfactorily satisfy the demands of a sufficiently rigorous ethical standard.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号