首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   375篇
  免费   22篇
各国政治   28篇
工人农民   12篇
世界政治   48篇
外交国际关系   48篇
法律   139篇
中国共产党   2篇
中国政治   12篇
政治理论   92篇
综合类   16篇
  2024年   1篇
  2023年   6篇
  2022年   1篇
  2021年   10篇
  2020年   14篇
  2019年   18篇
  2018年   22篇
  2017年   28篇
  2016年   14篇
  2015年   20篇
  2014年   16篇
  2013年   106篇
  2012年   24篇
  2011年   15篇
  2010年   13篇
  2009年   20篇
  2008年   9篇
  2007年   10篇
  2006年   15篇
  2005年   11篇
  2004年   5篇
  2003年   5篇
  2002年   7篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1996年   1篇
  1990年   1篇
排序方式: 共有397条查询结果,搜索用时 15 毫秒
101.
The policy debate over embryonic stem cell (ESC) research in the United States mainly focuses on the extent to which the government ought to provide resources for that research. This article addresses the strategic use of network positions to mobilize an effective coordination system for lifting the moratorium on funding of ESC under the Obama administration since March 2009. By identifying patterns of interactions between members in a network of embedded ties, we can explore the major actors who play the role of brokers or entrepreneurs in stem cell research funding policy under the Obama administration. For that, this article utilizes social network analysis and the G&F brokerage roles framework to identify key brokers in facilitating coordination among various members engaged in funding human stem cell research in the governance network.  相似文献   
102.
Studies have begun to look at the potentially crucial impacts of group decentralization and inter-group global networking in accounting for the extent and severity of violence in insurgencies and terrorism. Groups may be able to survive more effectively, evade anti-terror or counter-insurgency strategies, and inflict greater damage or more civilian attacks by operating under more or less centralized leadership, or by making use of the resources of other like-minded groups scattered across borders. While some analysts have examined each of these possibilities, few if any have done so simultaneously with both structural and networking indicators or examined the joint effects of these indicators. We propose to do so in this study by combining existing datasets on terrorist structure and networks. Hypotheses and findings in prior studies have indicated that structural decentralization may lead to more civilian attacks if not more destruction since local cells are freer to act on their own, and that group size and centrality in the global terror networks lead to greater lethality and group survival rates. We re-examine such assumptions here with OLS and logit models combining these effects, and find that in addition to group size, network reach (eigenvalue centrality) rather than group interconnections per se (number of allies) appears to have primary impacts on group lethality, targeting, and survival, sometimes in conjunction with decentralized organizational structure.  相似文献   
103.
In international development, shared ownership is assumed to be a condition for effectiveness. Academic studies question this relation, claiming shared ownership can instead lead to ineffectiveness. This study analysed the interplay between ownership and effectiveness in a transnational advocacy network for conflict prevention observed 2012–2015. Building on recent discussions about balancing unity and diversity in networks, this article unpacks the ownership/effectiveness relationship into three dimensions: collective identity, accountability processes and a shared advocacy message. We find that the question is not about more or less effectiveness, but about the processes shaping the meaning of effectiveness in particular institutional constellations.  相似文献   
104.
Abstract

In this article, I study the journey of the Finland-Swedish author Monika Fagerholm’s (b. 1961) novel The American Girl to the pages of O, The Oprah Magazine. This event, here called “Fagerholm goes Oprah”, offers an illustrative example of the global movements of literature today, and of the ongoing negotiation of relations between local and global, the Nordic countries and the USA, minor literature and the global market. The article describes the different phases of the transmission of this novel, studies the means by which a novel from a minor body of literature transgresses its geo-linguistic position and, in this specific case, demonstrates the role of gender. In this way, the novel not only creates fictive, transnational spaces for its female characters and readers, but it also enters and contributes to a network of female agents in widely different geographical and cultural contexts. The event “Fagerholm goes Oprah” is a sign of the ongoing globalization of the literary field, but its reception also reveals the presence of an opposing tendency: the continuing significance of localization in literary exchange. All in all, the novel and its reception illustrate the many strategies used to create a connection between two different cultures, and also display the importance of various cultural currents in the transmission of the novel, such as feminism and Nordic Noir.  相似文献   
105.
This article examines the extent to which Privacy by Design can safeguard privacy and personal data within a rapidly evolving society. This paper will first briefly explain the theoretical concept and the general principles of Privacy by Design, as laid down in the General Data Protection Regulation. Then, by indicating specific examples of the implementation of the Privacy by Design approach, it will be demonstrated why the implementation of Privacy by Design is a necessity in a number of sectors where specific data protection concerns arise (biometrics, e-health and video-surveillance) and how it can be implemented.  相似文献   
106.
民族旅游的开发是近年来旅游学术界和实践中争论较多的问题,主要围绕民族文化的保护与开发而展开。村寨旅游是民族旅游开发中一种主要的形式,本文在比较几种民族村寨开发模式的基础上,以“中缅第一寨”———勐景来的成功开发实践为案例分析,提出一种以保护开发为前提、公司起主导作用、有鲜明特色主题、村民普遍受益的多赢发展模式,即CCTV模式。  相似文献   
107.
As the closed-circuit television (CCTV) security industry transitioned from analog media to digital video recorders (DVRs) with digital storage, the law enforcement community struggled with the means with which to collect the recordings. New guidelines needed to be established to determine the collection method which would be efficient as well as provide the best quality evidence from live DVRs. A test design was developed to measure, quantify, and rank the quality of acquisition methods used on live systems from DVRs typically used in digital CCTV systems. The purpose was to determine guidelines for acquiring the best quality video for investigative purposes. A test pattern which provided multiple quantifiable metrics for comparison between the methods of acquisition was used. The methods of acquisition included direct data download of the proprietary file and open file format as well as recording the video playback from the DVR via the available display monitor connections including the composite video, Video Graphics Array (VGA), and high-definition multimedia interface (HDMI). While some acquisition methods may provide the best quality evidence, other methods of acquisition are not to be discounted depending on the situation and need for efficiency. As an investigator that needs to retrieve video evidence from live digital CCTV systems, the proprietary file format, overall, provides the best quality evidence. However, depending on the circumstance and as recording technology continues to evolve, options other than the proprietary file format may provide quality that is equal to or greater than the proprietary file format.  相似文献   
108.
This study covers all persons under the age of 20 who were suspected of having committed a crime in the Swedish city of Borlänge (approx. 50,000 inhabitants) during the years of 1975–1977. The juveniles (575 in all) were followed up during a total of 10 years. A sociometric method based on police data was developed for studying co-offending patterns. The method was validated through a smaller number of interviews with the juveniles. This study shows that a large majority of the most delinquency active juveniles was associated with a large network of delinquent relations. The stronger the connection to this network, the more substantial, serious, and long-lasting were the delinquency and other asociality. This network also seemed to be very important with regard to the reproduction of juvenile delinquency in the municipality. At the end of the follow-up period juvenile delinquency in Borlänge had basically the same character as at the beginning, even though the juveniles included in the network were, to a large extent, new. The young offenders who were central figures in the new network had successively learned their roles from the network's old members.This paper is based on results published initially in a report entitledDelinquent Networks (Sarnecki, 1986).  相似文献   
109.
This study follows recent research on criminal earnings and examines the impact of underlying traits (low self-control) and personal organization features (nonredundant networking) on the criminal earnings of a sample of incarcerated offenders previously involved in market and predatory crimes. Controlling for various background factors (age, noncriminal income, lambda and costs of doing crime), both low self-control and nonredundant networking independently explain why some offenders are more successful than others in achieving higher monetary standards through crime. Although efficient, brokerage-like networking enhances market offenders' earnings, low self-control emerges as an asset for predatory offenders: the lower their self-control, the higher their criminal earnings. For market offenders, however, low self-control has no direct effect, but it does mitigate the impact of effective networking on criminal earnings. The results emerging from this study have implications for Gottfredson and Hirschi's theory of crime and the advent of a criminal network perspective. Extensions are also made toward the conventional/criminal embeddedness framework and deterrence research.  相似文献   
110.
As surveillance cameras are increasingly installed, their films are often submitted as evidence of crime, but very scant detailed information such as features and clothes is obtained due to the limited camera performance. Height, however, is relatively not significantly influenced by the camera performance. This paper studied the height measurement method using images from a CCTV. The information on the height was obtained via photogrammetry, including the reference points in the photographed area and the calculation of the relationship between a 3D space and a 2D image through linear and nonlinear calibration. Using this correlation, this paper suggested the height measurement method, which projects a 3D virtual ruler onto the image. This method has been proven to offer more stable values within the range of data convergence than those of other existing methods.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号