首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   414篇
  免费   27篇
各国政治   32篇
工人农民   12篇
世界政治   48篇
外交国际关系   51篇
法律   163篇
中国共产党   2篇
中国政治   10篇
政治理论   108篇
综合类   15篇
  2023年   11篇
  2022年   4篇
  2021年   12篇
  2020年   17篇
  2019年   21篇
  2018年   23篇
  2017年   32篇
  2016年   20篇
  2015年   20篇
  2014年   17篇
  2013年   105篇
  2012年   27篇
  2011年   16篇
  2010年   12篇
  2009年   21篇
  2008年   14篇
  2007年   11篇
  2006年   16篇
  2005年   11篇
  2004年   4篇
  2003年   6篇
  2002年   9篇
  2001年   2篇
  2000年   3篇
  1999年   2篇
  1998年   2篇
  1996年   1篇
  1995年   1篇
  1990年   1篇
排序方式: 共有441条查询结果,搜索用时 15 毫秒
201.
Abstract

Western Muslims have joined jihadi groups in Afghanistan/Pakistan, Somalia and Syria to defend Islam from its perceived enemies. Transnational Islamist networks have played a pivotal role in bringing them to conflict zones by fulfilling three functions: radicalisation through mosques, radical preachers, and the Internet; recruitment which can be conducted either physically or digitally; and identity formation that provides the radicalised recruits with a larger cause to fight for as members of an imagined global community. Transnational Islamist networks are multifunctional entities on the rise.  相似文献   
202.
The current age of technology, mass communication, and globalization makes networks analysis an especially useful tool for understanding cell-based terrorism. Some concepts from traditional networks analysis may be especially relevant. The Strength of Weak Ties hypothesis (SWT) is particularly promising and will be used here to demonstrate the usability of traditional networks analysis for studying modern terrorism. The findings suggest that the strength of weak terrorist ties may improve Al Qaeda's operational capabilities despite the group's decentralization following the U.S.-led military campaign in Afghanistan beginning in 2001.  相似文献   
203.
ABSTRACT

With the accelerating process of globalization and the development of its technological dimension, more and more opportunities and channels are available to the terrorist groups in the world to mobilize resources and advocates. “Islamic State of Iraq and Sham” (ISIS), as the most modern terrorist-excommunicative group (Takfiry), has been able to utilize the Internet and social networks highly adeptly. While ignoring the function of long-term structural and essential factors underlying the formation of ISIS, and also combining the networked society theory and triple forms of identities proposed by Manuel Castells with theoretical discussions on identity making, networking, and mobilization of media, the current article seeks to analyze the role of cyberspace and social networks as accelerating and opportunistic agents in mobilizing resources and disseminating ISIS. Using an explanatory analytical research method, the current article mainly intends to find a reply to the question: What has been the role of online social networks in connection with ISIS as an excommunicative and terrorist group? According to the research hypothesis, due to ISIS’s subtle, prevocational-emotional and targeted utilization of online social networks, the networks have played the role of an accelerator and opportunity maker in some areas including network building, guidance of public opinion, identity making, and the promotion of project identity of this terrorist group. The general conclusion obtained from the article is that ISIS, as the most terrifying and the most modern group equipped with cyber media, has been able to attract many forces out of fanatical religious groups, unemployed people, criminals, etc., worldwide. Additionally, with the recruitment of fanatics, ISIS has been able to accomplish identity making and network building. As a result, regional security and even security in Western countries is also highly endangered.  相似文献   
204.
焦和平 《法律科学》2013,31(1):150-159
现行《著作权法》中的广播权与信息网络传播权已经存在规范漏洞,而以电信传输网、广播电视传输网、计算机互联网相互融通为代表的三网融合技术使问题进一步加剧,形成“一个传播终端、六类传播行为、三种法律定性”的复杂局面.其直接原因表现为传播技术的发展融合,但深层次分析可追溯到技术主义立法路径的弊端.《著作权法(修改草案)》1稿、2稿的“修补型”方案仍不足以应对三网融合带来的问题,因此应借鉴已有的成熟立法例,将广播权与信息网络传播权整合为一项“远程传播权”.  相似文献   
205.
《Global Crime》2013,14(2):131-151
This paper provides a bottom–up view of national corruption in India and presents a framework of corruption involving three actors: bureaucrat, politician and legitimate claimant. The paper then focuses on the public service provision of social security in an Indian village and the role of elites in perpetuating the corrupt practices to access this public provision. This study is based on an extensive fieldwork and uses network data. First, I show that the political elite bridges the ‘structural hole’ between the institutions of state and society, have the advantage of information, referrals and are the main beneficiary of local corrupt practices. Second, factional politics is carried out through the use of corruption and it results in exclusion of the poor persons from the welfare rights to which they are entitled. The paper also explores how the local processes of corruption interact with state-level processes and shows how protest against corruption is silenced.  相似文献   
206.
《Global Crime》2013,14(2):152-171
Participation in mass crime is often approached from a top-down perspective that centralizes the actions of the masses under the order of elites and leaders. While there is some evidence to support this approach, a more complete assessment of participation in mass crime must also consider the grassroots contingencies that unite the collective motivation and capacity that induce such actions. Such a bottoms-up approach is developed in this article with a particular focus on the personal experiences of former Serbian militiamen who took part in scenes of mass violence in Croatia and Bosnia–Herzegovina. Interviews with former militiamen illustrate how political opportunities, diverging nationalistic attitudes, proximity to growing violence in increasingly localized killing fields, incentives to participate in parallel criminal activities, and an influence within community networks that were submerged in mass crimes united to legitimize and facilitate their personal commitment to the events that took place in this region during the 1990s.  相似文献   
207.
《Global Crime》2013,14(1):61-81
Law enforcement agencies rely on data collected from wire taps to construct the organisational chart of criminal enterprises. Recently, a number of academics have also begun to utilise social network analysis to describe relations among criminals and understand the internal organisation of criminal groups. However, before drawing conclusions about the structure or the organisation of criminal groups, it is important to understand the limitations that selective samples such as wire taps may have on network analysis measures. Electronic surveillance data can be found in different kinds of court records and the selection of the data source is likely to influence the amount of missing information and, consequently, the results. This article discusses the impact that the selection of a specific data source for the social network analysis of criminal groups may have on centrality measures usually adopted in organised crime research to identify key players.  相似文献   
208.
Abstract

We still poorly understand why Silicon Valley has originated so many breakthrough innovations and large companies. The durability of Silicon Valley's innovative competence over the last seventy years also needs more explanation. The failure of several policy-makers around the world to reproduce the Silicon Valley cluster reveals the misunderstanding of the innovative dynamic in Silicon Valley. This study uses complex network theory – CNT (Barabási, Newman & Watts, 2006; Jen, 2006; Thompson, 2004a) to analyse the complex innovative capability of Silicon Valley and to understand the heterogeneity of agents and the multiplexity of ties that support creation and development of high-tech start-ups. As proposed by Barabási (2002, p. 200), we view the economy as a complex network, whose nodes are companies and whose links represent the various economic and financial ties connecting them. Innovation and entrepreneurship are understood as resulting from the interactions of numerous economic agents.

In a systemic perspective, by definition, the presence of a specific agent in a network induces specific interactions with other agents that could not take place if this agent were not there. Thus, the diversity of agents influences the dynamics of the system. The presence of venture capital (hereafter VC) firms in an innovative cluster opens potential specific interactions with other agents in the network (universities, large companies, laboratories) that determine a particular dynamic of innovation. In this perspective, what is distinctive about Silicon Valley is its complete and robust complex system of innovation supported by social networks of interdependent economic agents in which the VC firms have a specific function. Our perspective examines five different contributions of VC firms to Silicon Valley: financing, selection, collective learning, embedding and signalling. These five functions are different ways for the VC firms to interact with the other members of the complex network of innovation and to support the robustness of the system.  相似文献   
209.
Abstract

Networks have recently become fashionable in social analysis but most of the new network approaches have paid scant attention to the long history of reflections upon the potential of networks as an analytical device in the social sciences. In this paper we chart the developments in networking thinking in two disciplinary areas – social network analysis and social anthropology – in order to highlight the enduring difficulties and problems with network thinking as well as its potential. The first half of the paper explores the uses of network approaches over the past fifty years, situating theoretical and methodological questions in their broader disciplinary contexts. The authors then show how emerging issues from both bodies of work offer the promise of new kinds of networking thinking.  相似文献   
210.
Abstract

In this paper we analyse the decline of the Swiss corporate network between 1980 and 2000. We address the theoretical and methodological challenge of this transformation by the use of a combination of network analysis and multiple correspondence analysis (MCA). Based on a sample of top managers of the 110 largest Swiss companies in 1980 and 2000 we show that, beyond an adjustment to structural pressure, an explanation of the decline of the network has to include the strategies of the fractions of the business elites. We reveal that three factors contribute crucially to the decline of the Swiss corporate network: the managerialization of industrial leaders, the marginalization of law degree holders and the influx of hardly connected foreign managers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号