首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   375篇
  免费   22篇
各国政治   28篇
工人农民   12篇
世界政治   48篇
外交国际关系   48篇
法律   139篇
中国共产党   2篇
中国政治   12篇
政治理论   92篇
综合类   16篇
  2024年   1篇
  2023年   6篇
  2022年   1篇
  2021年   10篇
  2020年   14篇
  2019年   18篇
  2018年   22篇
  2017年   28篇
  2016年   14篇
  2015年   20篇
  2014年   16篇
  2013年   106篇
  2012年   24篇
  2011年   15篇
  2010年   13篇
  2009年   20篇
  2008年   9篇
  2007年   10篇
  2006年   15篇
  2005年   11篇
  2004年   5篇
  2003年   5篇
  2002年   7篇
  2001年   2篇
  2000年   2篇
  1999年   1篇
  1996年   1篇
  1990年   1篇
排序方式: 共有397条查询结果,搜索用时 31 毫秒
361.
362.
借鉴社会交换理论,将腐败网络视为非法社会交换网络,进而揭示其两种典型结构,即外排式联接腐败网络与内含式联接腐败网络。外排式联接网络形成了"资源排斥性"权力结构,迫使权力劣势者进行竞争以获得资源;内含式联接网络形成了"功能互补性"权力结构,要求各方行动者进行合作以获得收益。权力分配的不均等造成了网络结构中各方之间的冲突,导致了网络的分裂趋势。而关系承诺因其对权力运作的削弱,发挥着重要的网络整合功能。权力结构和关系承诺,作为腐败网络能否持续运行的决定因素,为当前反腐提供了重要突破口。  相似文献   
363.
《Global Crime》2013,14(2-3):119-122
This paper introduces the contributions included in the special issue of ‘Advances in Research on Illicit Networks’. It situates the collection of papers in the growing trend of studies applying network methods to illicit networks.  相似文献   
364.
This paper explores the impact of informal communication in voters’ social networks and the formal communication of the mass media on individuals’ propensity to take part in elections. Analyzing survey data from a recent local election in Germany it shows how both forms of communication may not only mobilize, but also demobilize voters. On the whole, personal communication appears more influential than mass communication. The media’s effects are generally weaker than those of social networks. Moreover, they are mediated by attitudes, while social networks have strong direct effects. These originate mainly from information conveyed through personal contact with voters and abstainers in one’s immediate social environment. Social voting norms are only influential, if they originate from persons’ families and are in favor of electoral participation.  相似文献   
365.
关于互联网对社会关系影响的研究正在成为学术热点。早期一些学者争论这种行为领域是否能够产生一种通常意义上的持续的人际关系;其次争论的是这种关系是“疏离”还是“延伸”了日常人际关系;以及对关于网络互动所支持的关系属性的研究。系列研究表明,网络互动可以产生具有高度信任、互惠和广泛支持性的人际关系。而这种关系并不必然“疏离”或“延伸”日常关系,其对后者的影响由多种因素综合决定。网络互动倾向于形成弱纽带,但不排斥强纽带的产生。进一步研究可以关注:借助于电脑网络形成的社会关系的动态发展过程、这些社会网络的属性和结构、对社会资本的生产与再生产的影响等等。  相似文献   
366.
Although Howard Becker defines art worlds as networks of cooperating people and a broad range of studies has applied this idea of the network to art markets, research on fairs remains a neglected issue. This article aims to advance the idea of the network and the art fair with regard to the art fair boom, the differentiation of art fairs and their interlinking, and the role of networks with regard to the participating galleries and their interlinking within art fairs. Quantitative and qualitative data are brought forward to shed some light on these issues, including statistical information, along with interviews.  相似文献   
367.
This article investigates networks and political actions by migrant organisations in five European cities. It examines how political opportunity structures moderate the impact of organisational networks on organisations' political contacts and protests using data from organisational surveys undertaken between 2005 and 2008 in Budapest, Lyon, Madrid, Milan and Zurich. Results suggest that the political context moderates the role that different types of networks have on mobilisation. It is found that migrant organisational networks may be sources compensating for the lack of contextual opportunities, thus fostering the use of protest by migrant organisations. However, migrant organisational networks can also favour the creation of political subcultures, marginalised from mainstream politics. Finally, migrant networks are likely to foster migrant organisations' political integration in multicultural contexts through conventional as well as non‐conventional politics.  相似文献   
368.
CCTV surveillance systems are ubiquitous IoT appliances. Their forensic examination has proven critical for investigating crimes. DAHUA Technology is a well-known manufacturer of such products. Despite its global market share, research regarding digital forensics of DAHUA Technology CCTV systems is scarce and currently limited to extracting their video footage, overlooking the potential presence of valuable artifacts within their log records. These pieces of evidence remain unexploited by major commercial forensic software, yet they can hide vital information for an investigation. For instance, these log records document user actions, such as formatting the CCTV system's hard drive or disabling camera recording. This information can assist in attributing nefarious actions to specific users and hence can be invaluable for understanding the sequence of events related to incidents. Therefore, in this paper, several DAHUA Technology CCTV systems are thoroughly analyzed for these unexplored pieces of evidence, and their forensic value is presented.  相似文献   
369.
《Digital Investigation》2014,11(3):187-200
A recent increase in the prevalence of embedded systems has led them to become a primary target of digital forensic investigations. Embedded systems with DVR (Digital Video Recorder) capabilities are able to generate multimedia (video/audio) data, and can act as vital pieces of evidence in the field of digital forensics.To counter anti-forensics, it is necessary to derive systematic forensic techniques that can be used on data fragments in unused (unallocated) areas of files or images. Specifically, the techniques should extract meaningful information from various types of data fragments, such as non-sequential fragmentation and missing fragments overwritten by other data.This paper proposes a new digital forensic system for use on video data fragments related to DVRs. We demonstrate in detail special techniques for the classification, reassembly, and extraction of video data fragments, and introduce an integrated framework for data fragment forensics based on techniques described in this paper.  相似文献   
370.
《Digital Investigation》2014,11(3):179-186
Given a disk image of a CCTV system with a non-standard file system, how is the data interpreted? Work has been done in the past detailing the reverse engineering of proprietary file systems and on the process of recovering data from CCTV systems. However, if given a disk image without the CCTV system itself, or if under time constraints, the task becomes much more difficult. This paper explains a different approach to recovering the data and how to make sense of data on a CCTV disk. The method does not require extensive reverse engineering of the CCTV system, or even to have access to the CCTV system itself.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号