全文获取类型
收费全文 | 375篇 |
免费 | 22篇 |
专业分类
各国政治 | 28篇 |
工人农民 | 12篇 |
世界政治 | 48篇 |
外交国际关系 | 48篇 |
法律 | 139篇 |
中国共产党 | 2篇 |
中国政治 | 12篇 |
政治理论 | 92篇 |
综合类 | 16篇 |
出版年
2024年 | 1篇 |
2023年 | 6篇 |
2022年 | 1篇 |
2021年 | 10篇 |
2020年 | 14篇 |
2019年 | 18篇 |
2018年 | 22篇 |
2017年 | 28篇 |
2016年 | 14篇 |
2015年 | 20篇 |
2014年 | 16篇 |
2013年 | 106篇 |
2012年 | 24篇 |
2011年 | 15篇 |
2010年 | 13篇 |
2009年 | 20篇 |
2008年 | 9篇 |
2007年 | 10篇 |
2006年 | 15篇 |
2005年 | 11篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 7篇 |
2001年 | 2篇 |
2000年 | 2篇 |
1999年 | 1篇 |
1996年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有397条查询结果,搜索用时 31 毫秒
361.
362.
借鉴社会交换理论,将腐败网络视为非法社会交换网络,进而揭示其两种典型结构,即外排式联接腐败网络与内含式联接腐败网络。外排式联接网络形成了"资源排斥性"权力结构,迫使权力劣势者进行竞争以获得资源;内含式联接网络形成了"功能互补性"权力结构,要求各方行动者进行合作以获得收益。权力分配的不均等造成了网络结构中各方之间的冲突,导致了网络的分裂趋势。而关系承诺因其对权力运作的削弱,发挥着重要的网络整合功能。权力结构和关系承诺,作为腐败网络能否持续运行的决定因素,为当前反腐提供了重要突破口。 相似文献
363.
《Global Crime》2013,14(2-3):119-122
This paper introduces the contributions included in the special issue of ‘Advances in Research on Illicit Networks’. It situates the collection of papers in the growing trend of studies applying network methods to illicit networks. 相似文献
364.
This paper explores the impact of informal communication in voters’ social networks and the formal communication of the mass media on individuals’ propensity to take part in elections. Analyzing survey data from a recent local election in Germany it shows how both forms of communication may not only mobilize, but also demobilize voters. On the whole, personal communication appears more influential than mass communication. The media’s effects are generally weaker than those of social networks. Moreover, they are mediated by attitudes, while social networks have strong direct effects. These originate mainly from information conveyed through personal contact with voters and abstainers in one’s immediate social environment. Social voting norms are only influential, if they originate from persons’ families and are in favor of electoral participation. 相似文献
365.
郑中玉 《甘肃行政学院学报》2011,(4):46-55,127
关于互联网对社会关系影响的研究正在成为学术热点。早期一些学者争论这种行为领域是否能够产生一种通常意义上的持续的人际关系;其次争论的是这种关系是“疏离”还是“延伸”了日常人际关系;以及对关于网络互动所支持的关系属性的研究。系列研究表明,网络互动可以产生具有高度信任、互惠和广泛支持性的人际关系。而这种关系并不必然“疏离”或“延伸”日常关系,其对后者的影响由多种因素综合决定。网络互动倾向于形成弱纽带,但不排斥强纽带的产生。进一步研究可以关注:借助于电脑网络形成的社会关系的动态发展过程、这些社会网络的属性和结构、对社会资本的生产与再生产的影响等等。 相似文献
366.
Lee Loevinger 《Journal of Arts Management, Law & Society》2013,43(1):33-40
Although Howard Becker defines art worlds as networks of cooperating people and a broad range of studies has applied this idea of the network to art markets, research on fairs remains a neglected issue. This article aims to advance the idea of the network and the art fair with regard to the art fair boom, the differentiation of art fairs and their interlinking, and the role of networks with regard to the participating galleries and their interlinking within art fairs. Quantitative and qualitative data are brought forward to shed some light on these issues, including statistical information, along with interviews. 相似文献
367.
This article investigates networks and political actions by migrant organisations in five European cities. It examines how political opportunity structures moderate the impact of organisational networks on organisations' political contacts and protests using data from organisational surveys undertaken between 2005 and 2008 in Budapest, Lyon, Madrid, Milan and Zurich. Results suggest that the political context moderates the role that different types of networks have on mobilisation. It is found that migrant organisational networks may be sources compensating for the lack of contextual opportunities, thus fostering the use of protest by migrant organisations. However, migrant organisational networks can also favour the creation of political subcultures, marginalised from mainstream politics. Finally, migrant networks are likely to foster migrant organisations' political integration in multicultural contexts through conventional as well as non‐conventional politics. 相似文献
368.
Evangelos Dragonas MSc Costas Lambrinoudakis PhD Michael Kotsis MSc 《Journal of forensic sciences》2024,69(1):117-130
CCTV surveillance systems are ubiquitous IoT appliances. Their forensic examination has proven critical for investigating crimes. DAHUA Technology is a well-known manufacturer of such products. Despite its global market share, research regarding digital forensics of DAHUA Technology CCTV systems is scarce and currently limited to extracting their video footage, overlooking the potential presence of valuable artifacts within their log records. These pieces of evidence remain unexploited by major commercial forensic software, yet they can hide vital information for an investigation. For instance, these log records document user actions, such as formatting the CCTV system's hard drive or disabling camera recording. This information can assist in attributing nefarious actions to specific users and hence can be invaluable for understanding the sequence of events related to incidents. Therefore, in this paper, several DAHUA Technology CCTV systems are thoroughly analyzed for these unexplored pieces of evidence, and their forensic value is presented. 相似文献
369.
《Digital Investigation》2014,11(3):187-200
A recent increase in the prevalence of embedded systems has led them to become a primary target of digital forensic investigations. Embedded systems with DVR (Digital Video Recorder) capabilities are able to generate multimedia (video/audio) data, and can act as vital pieces of evidence in the field of digital forensics.To counter anti-forensics, it is necessary to derive systematic forensic techniques that can be used on data fragments in unused (unallocated) areas of files or images. Specifically, the techniques should extract meaningful information from various types of data fragments, such as non-sequential fragmentation and missing fragments overwritten by other data.This paper proposes a new digital forensic system for use on video data fragments related to DVRs. We demonstrate in detail special techniques for the classification, reassembly, and extraction of video data fragments, and introduce an integrated framework for data fragment forensics based on techniques described in this paper. 相似文献
370.
《Digital Investigation》2014,11(3):179-186
Given a disk image of a CCTV system with a non-standard file system, how is the data interpreted? Work has been done in the past detailing the reverse engineering of proprietary file systems and on the process of recovering data from CCTV systems. However, if given a disk image without the CCTV system itself, or if under time constraints, the task becomes much more difficult. This paper explains a different approach to recovering the data and how to make sense of data on a CCTV disk. The method does not require extensive reverse engineering of the CCTV system, or even to have access to the CCTV system itself. 相似文献