全文获取类型
收费全文 | 414篇 |
免费 | 27篇 |
专业分类
各国政治 | 32篇 |
工人农民 | 12篇 |
世界政治 | 48篇 |
外交国际关系 | 51篇 |
法律 | 163篇 |
中国共产党 | 2篇 |
中国政治 | 10篇 |
政治理论 | 108篇 |
综合类 | 15篇 |
出版年
2023年 | 11篇 |
2022年 | 4篇 |
2021年 | 12篇 |
2020年 | 17篇 |
2019年 | 21篇 |
2018年 | 23篇 |
2017年 | 32篇 |
2016年 | 20篇 |
2015年 | 20篇 |
2014年 | 17篇 |
2013年 | 105篇 |
2012年 | 27篇 |
2011年 | 16篇 |
2010年 | 12篇 |
2009年 | 21篇 |
2008年 | 14篇 |
2007年 | 11篇 |
2006年 | 16篇 |
2005年 | 11篇 |
2004年 | 4篇 |
2003年 | 6篇 |
2002年 | 9篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 2篇 |
1998年 | 2篇 |
1996年 | 1篇 |
1995年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有441条查询结果,搜索用时 15 毫秒
201.
Emmanuel Karagiannis 《The international spectator : a quarterly journal of the Istituto affari internazionali》2013,48(4):119-134
AbstractWestern Muslims have joined jihadi groups in Afghanistan/Pakistan, Somalia and Syria to defend Islam from its perceived enemies. Transnational Islamist networks have played a pivotal role in bringing them to conflict zones by fulfilling three functions: radicalisation through mosques, radical preachers, and the Internet; recruitment which can be conducted either physically or digitally; and identity formation that provides the radicalised recruits with a larger cause to fight for as members of an imagined global community. Transnational Islamist networks are multifunctional entities on the rise. 相似文献
202.
Jonathan Kennedy 《Terrorism and Political Violence》2013,25(2):201-212
The current age of technology, mass communication, and globalization makes networks analysis an especially useful tool for understanding cell-based terrorism. Some concepts from traditional networks analysis may be especially relevant. The Strength of Weak Ties hypothesis (SWT) is particularly promising and will be used here to demonstrate the usability of traditional networks analysis for studying modern terrorism. The findings suggest that the strength of weak terrorist ties may improve Al Qaeda's operational capabilities despite the group's decentralization following the U.S.-led military campaign in Afghanistan beginning in 2001. 相似文献
203.
ABSTRACTWith the accelerating process of globalization and the development of its technological dimension, more and more opportunities and channels are available to the terrorist groups in the world to mobilize resources and advocates. “Islamic State of Iraq and Sham” (ISIS), as the most modern terrorist-excommunicative group (Takfiry), has been able to utilize the Internet and social networks highly adeptly. While ignoring the function of long-term structural and essential factors underlying the formation of ISIS, and also combining the networked society theory and triple forms of identities proposed by Manuel Castells with theoretical discussions on identity making, networking, and mobilization of media, the current article seeks to analyze the role of cyberspace and social networks as accelerating and opportunistic agents in mobilizing resources and disseminating ISIS. Using an explanatory analytical research method, the current article mainly intends to find a reply to the question: What has been the role of online social networks in connection with ISIS as an excommunicative and terrorist group? According to the research hypothesis, due to ISIS’s subtle, prevocational-emotional and targeted utilization of online social networks, the networks have played the role of an accelerator and opportunity maker in some areas including network building, guidance of public opinion, identity making, and the promotion of project identity of this terrorist group. The general conclusion obtained from the article is that ISIS, as the most terrifying and the most modern group equipped with cyber media, has been able to attract many forces out of fanatical religious groups, unemployed people, criminals, etc., worldwide. Additionally, with the recruitment of fanatics, ISIS has been able to accomplish identity making and network building. As a result, regional security and even security in Western countries is also highly endangered. 相似文献
204.
三网融合下广播权与信息网络传播权的重构——兼析《著作权法(修改草案)》前两稿的相关规定 总被引:1,自引:0,他引:1
现行《著作权法》中的广播权与信息网络传播权已经存在规范漏洞,而以电信传输网、广播电视传输网、计算机互联网相互融通为代表的三网融合技术使问题进一步加剧,形成“一个传播终端、六类传播行为、三种法律定性”的复杂局面.其直接原因表现为传播技术的发展融合,但深层次分析可追溯到技术主义立法路径的弊端.《著作权法(修改草案)》1稿、2稿的“修补型”方案仍不足以应对三网融合带来的问题,因此应借鉴已有的成熟立法例,将广播权与信息网络传播权整合为一项“远程传播权”. 相似文献
205.
《Global Crime》2013,14(2):131-151
This paper provides a bottom–up view of national corruption in India and presents a framework of corruption involving three actors: bureaucrat, politician and legitimate claimant. The paper then focuses on the public service provision of social security in an Indian village and the role of elites in perpetuating the corrupt practices to access this public provision. This study is based on an extensive fieldwork and uses network data. First, I show that the political elite bridges the ‘structural hole’ between the institutions of state and society, have the advantage of information, referrals and are the main beneficiary of local corrupt practices. Second, factional politics is carried out through the use of corruption and it results in exclusion of the poor persons from the welfare rights to which they are entitled. The paper also explores how the local processes of corruption interact with state-level processes and shows how protest against corruption is silenced. 相似文献
206.
《Global Crime》2013,14(2):152-171
Participation in mass crime is often approached from a top-down perspective that centralizes the actions of the masses under the order of elites and leaders. While there is some evidence to support this approach, a more complete assessment of participation in mass crime must also consider the grassroots contingencies that unite the collective motivation and capacity that induce such actions. Such a bottoms-up approach is developed in this article with a particular focus on the personal experiences of former Serbian militiamen who took part in scenes of mass violence in Croatia and Bosnia–Herzegovina. Interviews with former militiamen illustrate how political opportunities, diverging nationalistic attitudes, proximity to growing violence in increasingly localized killing fields, incentives to participate in parallel criminal activities, and an influence within community networks that were submerged in mass crimes united to legitimize and facilitate their personal commitment to the events that took place in this region during the 1990s. 相似文献
207.
《Global Crime》2013,14(1):61-81
Law enforcement agencies rely on data collected from wire taps to construct the organisational chart of criminal enterprises. Recently, a number of academics have also begun to utilise social network analysis to describe relations among criminals and understand the internal organisation of criminal groups. However, before drawing conclusions about the structure or the organisation of criminal groups, it is important to understand the limitations that selective samples such as wire taps may have on network analysis measures. Electronic surveillance data can be found in different kinds of court records and the selection of the data source is likely to influence the amount of missing information and, consequently, the results. This article discusses the impact that the selection of a specific data source for the social network analysis of criminal groups may have on centrality measures usually adopted in organised crime research to identify key players. 相似文献
208.
Michel Ferrary 《Economy and Society》2013,42(2):326-359
Abstract We still poorly understand why Silicon Valley has originated so many breakthrough innovations and large companies. The durability of Silicon Valley's innovative competence over the last seventy years also needs more explanation. The failure of several policy-makers around the world to reproduce the Silicon Valley cluster reveals the misunderstanding of the innovative dynamic in Silicon Valley. This study uses complex network theory – CNT (Barabási, Newman & Watts, 2006; Jen, 2006; Thompson, 2004a) to analyse the complex innovative capability of Silicon Valley and to understand the heterogeneity of agents and the multiplexity of ties that support creation and development of high-tech start-ups. As proposed by Barabási (2002, p. 200), we view the economy as a complex network, whose nodes are companies and whose links represent the various economic and financial ties connecting them. Innovation and entrepreneurship are understood as resulting from the interactions of numerous economic agents. In a systemic perspective, by definition, the presence of a specific agent in a network induces specific interactions with other agents that could not take place if this agent were not there. Thus, the diversity of agents influences the dynamics of the system. The presence of venture capital (hereafter VC) firms in an innovative cluster opens potential specific interactions with other agents in the network (universities, large companies, laboratories) that determine a particular dynamic of innovation. In this perspective, what is distinctive about Silicon Valley is its complete and robust complex system of innovation supported by social networks of interdependent economic agents in which the VC firms have a specific function. Our perspective examines five different contributions of VC firms to Silicon Valley: financing, selection, collective learning, embedding and signalling. These five functions are different ways for the VC firms to interact with the other members of the complex network of innovation and to support the robustness of the system. 相似文献
209.
Hannah Knox 《Economy and Society》2013,42(1):113-140
Abstract Networks have recently become fashionable in social analysis but most of the new network approaches have paid scant attention to the long history of reflections upon the potential of networks as an analytical device in the social sciences. In this paper we chart the developments in networking thinking in two disciplinary areas – social network analysis and social anthropology – in order to highlight the enduring difficulties and problems with network thinking as well as its potential. The first half of the paper explores the uses of network approaches over the past fifty years, situating theoretical and methodological questions in their broader disciplinary contexts. The authors then show how emerging issues from both bodies of work offer the promise of new kinds of networking thinking. 相似文献
210.
Abstract In this paper we analyse the decline of the Swiss corporate network between 1980 and 2000. We address the theoretical and methodological challenge of this transformation by the use of a combination of network analysis and multiple correspondence analysis (MCA). Based on a sample of top managers of the 110 largest Swiss companies in 1980 and 2000 we show that, beyond an adjustment to structural pressure, an explanation of the decline of the network has to include the strategies of the fractions of the business elites. We reveal that three factors contribute crucially to the decline of the Swiss corporate network: the managerialization of industrial leaders, the marginalization of law degree holders and the influx of hardly connected foreign managers. 相似文献