首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   593篇
  免费   8篇
各国政治   7篇
工人农民   7篇
世界政治   6篇
外交国际关系   20篇
法律   233篇
中国共产党   10篇
中国政治   20篇
政治理论   44篇
综合类   254篇
  2023年   2篇
  2022年   8篇
  2021年   13篇
  2020年   14篇
  2019年   9篇
  2018年   26篇
  2017年   11篇
  2016年   5篇
  2015年   11篇
  2014年   37篇
  2013年   53篇
  2012年   27篇
  2011年   61篇
  2010年   46篇
  2009年   65篇
  2008年   24篇
  2007年   36篇
  2006年   33篇
  2005年   35篇
  2004年   30篇
  2003年   16篇
  2002年   23篇
  2001年   9篇
  2000年   5篇
  1999年   1篇
  1998年   1篇
排序方式: 共有601条查询结果,搜索用时 15 毫秒
81.
冷战结束以来,日本政府在加紧走向"政治强国"、"军事强国"的同时,也在加紧走向"情报强国"。设立"国家安全会议",强化国家安全战略的决策机制;整顿战后建立的情报体制,加强情报的搜集和分析能力;加紧建立太空情报体系,编织严密的卫星侦察网络;拓展对外情报合作,建立国际性情报网络。日本正从上述多个方面不断加强情报搜集的组织、体制和情报搜集功能的建设。  相似文献   
82.
This study compares the original pair‐matching osteometric sorting model (J Forensic Sci 2003 ;48:717) against two new models providing validation and performance testing across three samples. The samples include the Forensic Data Bank, USS Oklahoma, and the osteometric sorting reference used within the Defense POW/MIA Accounting Agency. A computer science solution to generating dynamic statistical models across a commingled assemblage is presented. The issue of normality is investigated showing the relative robustness against non‐normality and a data transformation to control for normality. A case study is provided showing the relative exclusion power of all three models from an active commingled case within the Defense POW/MIA Accounting Agency. In total, 14,357,220 osteometric t‐tests were conducted. The results indicate that osteometric sorting performs as expected despite reference samples deviating from normality. The two new models outperform the original, and one of those is recommended to supersede the original for future osteometric sorting work.  相似文献   
83.
This article analyses, defines, and refines the concepts of ownership and personal data to explore their compatibility in the context of EU law. It critically examines the traditional dividing line between personal and non-personal data and argues for a strict conceptual separation of personal data from personal information. The article also considers whether, and to what extent, the concept of ownership can be applied to personal data in the context of the Internet of Things (IoT). This consideration is framed around two main approaches shaping all ownership theories: a bottom-up and top-down approach. Via these dual lenses, the article reviews existing debates relating to four elements supporting introduction of ownership of personal data, namely the elements of control, protection, valuation, and allocation of personal data. It then explores the explanatory advantages and disadvantages of the two approaches in relation to each of these elements as well as to ownership of personal data in IoT at large. Lastly, this article outlines a revised approach to ownership of personal data in IoT that may serve as a blueprint for future work in this area and inform regulatory and policy debates.  相似文献   
84.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
85.
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.  相似文献   
86.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
87.
The United States pictured a bright future with a strategic country when the new South African government took power in 1994. They envisioned a strong partnership in political, economic and security realms. The bilateral relationship did not turn out to be as easy as many in America might have envisioned. Despite notable camaraderie during the Mandela–Clinton administrations, there was a considerable downward swing in US–South African relations during the Bush administration. This situation has since appeared to reverse itself during the current Obama and Zuma administrations. This paper, through the lens of ‘asymmetry theory’ as developed by Brantly Womack, seeks to shed light on how a rollercoaster relationship such as this can go through such fluctuations and not end in extreme tension.  相似文献   
88.
Abstract

This research compares resident, peer and staff reports of bullying and victimization in one open facility and one secure facility for young offenders. The prevalence of bullies and victims was higher according to resident reports (self-reports) than according to peer or staff reports. There was significant agreement between residents, peers, and staff in identifying bullies and victims. The majority of bullies and victims identified by peers and/or staff were also identified by self-reports. Making the plausible assumption that bullies and victims tend to be concealed, it is concluded that self-reports (in the context of an individual interview) provide the most reliable and valid information about bullies and victims in young offender institutions. Hence, anti-bullying strategies should be based on self-report data.  相似文献   
89.
信息技术与课程整合是指将信息技术有机地与教学结构、课程内容、课程资源以及课程实施等融合为一体,使其成为课程的有机组成部分,成为与课程内容和课程实施高度和谐自然的有机部分。上海公安高等专科学校正是基于以上理念,对治安类课程与信息技术整合进行了为期三年的实践探索,并取得了一定的成效。  相似文献   
90.
Research following the "selective exposure" model has focused on avoidance of political messages with which a person might disagree. But positive attention to such "counter-attitudinal" messages is worthy of study, in part because normative theories of democracy value exposure to information that might disturb citizens' political predispositions. Surveys of youth (N = 417) and parents (N = 430) examine attention to newspaper, television, and Web messages about candidates. While there is somewhat more attention to messages about and for a person's favored political candidate or party, forms of political involvement (knowledge, curiosity, and discussion) that predict this "attitude-consistent" attention also predict counter-attitudinal attention at least as strongly. Parents' education and students' exposure to civics lessons also predict both kinds of attention. These results suggest that attention to counterattitudinal political messages is worthy of further study as an important goal of political socialization and a criterion of citizen performance in democracy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号