首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1125篇
  免费   16篇
各国政治   13篇
工人农民   8篇
世界政治   16篇
外交国际关系   23篇
法律   512篇
中国共产党   17篇
中国政治   34篇
政治理论   72篇
综合类   446篇
  2023年   3篇
  2022年   22篇
  2021年   24篇
  2020年   38篇
  2019年   14篇
  2018年   43篇
  2017年   18篇
  2016年   16篇
  2015年   14篇
  2014年   69篇
  2013年   88篇
  2012年   65篇
  2011年   94篇
  2010年   90篇
  2009年   105篇
  2008年   68篇
  2007年   77篇
  2006年   61篇
  2005年   60篇
  2004年   46篇
  2003年   42篇
  2002年   38篇
  2001年   21篇
  2000年   15篇
  1999年   1篇
  1998年   2篇
  1996年   1篇
  1993年   1篇
  1991年   2篇
  1990年   1篇
  1986年   1篇
  1985年   1篇
排序方式: 共有1141条查询结果,搜索用时 15 毫秒
191.
Research following the "selective exposure" model has focused on avoidance of political messages with which a person might disagree. But positive attention to such "counter-attitudinal" messages is worthy of study, in part because normative theories of democracy value exposure to information that might disturb citizens' political predispositions. Surveys of youth (N = 417) and parents (N = 430) examine attention to newspaper, television, and Web messages about candidates. While there is somewhat more attention to messages about and for a person's favored political candidate or party, forms of political involvement (knowledge, curiosity, and discussion) that predict this "attitude-consistent" attention also predict counter-attitudinal attention at least as strongly. Parents' education and students' exposure to civics lessons also predict both kinds of attention. These results suggest that attention to counterattitudinal political messages is worthy of further study as an important goal of political socialization and a criterion of citizen performance in democracy.  相似文献   
192.
The extent to which the electorate uses issue information to update their candidate evaluations over the course of political campaigns has often raised questions about citizen competence. Using a ten-week panel experiment designed to capture the low-information context of most congressional races this study contributes to our understanding of when and by what processes issue information produces enduring effects. Findings reveal that when voters need to assess an ideologically moderate candidate, they rely less on partisan cues but instead of storing issue information in long-term memory – either via a memory-based or on-line process – considerations in short-term memory remained one of the most powerful predictors of candidate evaluation, particularly when new issue information deviated from partisan norms.  相似文献   
193.
焦佩 《当代韩国》2013,(1):75-83
韩国的环保运动和绿党建设在世界上并不属于先进之列,但在亚洲比很多国家先行一步。正是这先行的一步,为文化相似、经济发展阶段相近的周边国家提供了借鉴经验。20世纪90年代全面展开的韩国环保运动,一直坚持草根政治路线,致力模仿欧洲绿党建党。2012年3月成立的绿党,将政治选举和社会运动结合在一起,具有运动政党的典型特征。但是,由于韩国政治制度和社会环境还没有为绿党的发展提供必要的条件,韩国绿党不仅很难进入国会,甚至不能继续正式注册。如何进一步丰富政党政策,巩固政党组织,增加绿色理念的社会认知度,直接决定韩国绿党能否获得新生。  相似文献   
194.
After the early 1990s, the wave of regionalism covered broader areas in the world, and Northeast Asia, which had weak regional cohesion largely due to history-oriented animosity, gradually developed initiatives for regional cooperation since the late 1990s. This article seeks to address why and how China, Japan, and South Korea have pursued regional cooperation by relying on the concept of ‘regional governance’. It advances two arguments. First, the governments of China, Japan, and South Korea have identified the avoidance of risk from uncertainty as a major objective of promoting trilateral cooperation in specific functional areas. Second, they have gradually intensified the harmonisation of regulatory frameworks in the cooperative process in collaboration with non-state actors. The article examines the arguments by tracing the evolution of trilateral cooperation in environmental protection and information technology (IT) development.  相似文献   
195.
The commentary by academics on the proposed European General Data Protection Regulation in [2013] 29 CLSR 180 has provoked thoughts in response. The responder strongly agrees with the doubts expressed about the definition of personal data, anonymisation and the identifiability of individuals. On the other hand, he disagrees with the views on consent and legitimacy and proposes support for a risk-based approach to data protection. He suggests that data protection does not need to be defended from the attack that it stifles business, but is justifiable for its assertion of fundamental rights. In conclusion, he shares the criticism of the European Commission's delegated and implementing powers and is concerned that the Regulation will be rushed to a conclusion for reasons of political ambition.  相似文献   
196.
EU update     
This is the latest edition of the Bristows column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
197.
Privacy by Design is now enjoying widespread acceptance. The EU has recently expressly included it as one of the key principles in the revised data protection legal framework. But how does Privacy by design and data anonymisation work in practise? In this article the authors address this question from a practical point of view by analysing a case study on EU Financial Intelligence Units (“FIUs”) using the Ma3tch technology as additional feature to the existing exchange of information via FIU.NET decentralised computer network. They present, analyse, and evaluate Ma3tch technology from the perspective of personal data protection. The authors conclude that Ma3tch technology can be seen as a valuable example of Privacy by Design. It achieves data anonymisation and enhances data minimisation and data security, which are the fundamental elements of Privacy by Design. Therefore, it may not only improve the exchange of information among FIUs and allow for the data processing to be in line with applicable data protection requirements, but it may also substantially contribute to the protection of privacy of related data subjects. At the same time, the case study clearly shows that Privacy by Design needs to be supported and complemented by appropriate organisational and technical procedures to assure that the technology solutions devised to protect privacy would in fact do so.  相似文献   
198.
New technologies permit online businesses to reduce expenses and increase efficiency by, for example, storing information in “the cloud”, engaging in online tracking and targeted advertising, location and tracking technologies, and biometrics. However, the potential for technology to facilitate long term retention of customers' personal information raises concerns about the competing right of individuals to the privacy of their personal information. Although the European Commission has recently released a proposal for regulation to “provide a data subject with the right to be forgotten and to erasure”, neither the OECD Privacy Guidelines nor the APEC Privacy Framework includes any requirement to delete personal information. While New Zealand includes a “limited retention principle” in the Privacy Act 1993, apart from one limited exception the privacy principles cannot be enforced in court. Taking New Zealand privacy law as an example, this paper examines the issue of retention of customer data, explains why this is a serious problem and argues that although it could be addressed by appropriate amendments to domestic laws, domestic privacy legislation may not be sufficient in an online environment. In the same way as other areas of law, such as the intellectual property regime, have turned to global regulatory standards which reflect the international nature of their subject matter, international privacy regulation should be the next stage for the information privacy regime.  相似文献   
199.
格式条款因其有助于交易的迅捷而被广泛应用于各种消费领域,但其亦日益沦为经营者侵害消费者利益的工具,并愈演愈烈。因此,此次《消费者权益保护法》着重从防范格式条款滥用的角度对其进行修缮。但是,如果深入剖析格式条款制度所蕴涵的效率与公平法价值及两者间的运行机理,则会发现此次防范和规制格式条款的修改思路依然是旧有规整思路,难以取得法律修改的预期效果。合理而正确的规整思路应当是,区分不同消费领域对公平与效率价值的强弱需求,然后在遵循不同法价值机理的基础上配置相称的规制手段。  相似文献   
200.
信息化是全球范围内推动经济和社会变革的重要力量,是增强国家竞争力的制高点。与此同时,由信息技术所带来的信息安全问题亦日益凸显,已成为各国高度关注的问题。应对新一代信息技术挑战的对策主要有:加强管理体制与机制创新,加强信息化软硬件建设,加强网络舆情引导,加大对网络犯罪活动的打击力度与加强公众信息安全教育等。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号