首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1196篇
  免费   24篇
各国政治   34篇
工人农民   17篇
世界政治   17篇
外交国际关系   30篇
法律   404篇
中国共产党   42篇
中国政治   85篇
政治理论   72篇
综合类   519篇
  2023年   4篇
  2022年   25篇
  2021年   32篇
  2020年   50篇
  2019年   13篇
  2018年   20篇
  2017年   7篇
  2016年   15篇
  2015年   15篇
  2014年   55篇
  2013年   95篇
  2012年   72篇
  2011年   81篇
  2010年   73篇
  2009年   92篇
  2008年   87篇
  2007年   93篇
  2006年   84篇
  2005年   56篇
  2004年   74篇
  2003年   65篇
  2002年   48篇
  2001年   39篇
  2000年   18篇
  1999年   4篇
  1993年   1篇
  1991年   1篇
  1990年   1篇
排序方式: 共有1220条查询结果,搜索用时 15 毫秒
181.
This article discusses some important aspects of thetreatment of minorities in the Republic of Slovakia.It discusses the 1992 Constitution and subsequentdevelopments such as the State language law 1995, therestriction of political rights of Hungarians,educational policies, the setback of EU entry talks,the September 1998 general elections, the Dzurindagovernment's ``De-Meciarization', the 1999 MinorityLanguage Law, and recent electoral legislation. Thespecial condition of the Romany is considered. Theeffectiveness of international mechanisms for theprotection of minority rights (the Organisation forSecurity and Cooperation in Europe, the InternationalCovenant for Civil and Political Rights, the EuropeanConvention of Human Rights, the Framework Conventionfor the Protection of National Minorities) isassessed, as is the involvement of the EU. Finally,the role of the judiciary is reflected upon.  相似文献   
182.
期待可能性理论人性视角探微   总被引:1,自引:0,他引:1  
刑法是以规制人的行为作为其内容的。任何一种刑法理论,只有建立在对人性的科学假设的基础之上,其存在与适用才具有本质上的合理性。  相似文献   
183.
董涛 《学理论》2010,(3):193-194
非物质文化遗产是国家珍贵的宝藏,而随着现代文明的日新月异,承载民族记忆的非物质遗产正渐渐走向消亡,对非物质文化遗产的保护已然迫在眉睫。本文在总结高校图书馆在非物质文化保护中的经验基础上,从图书馆提高服务质量和承担文化重任的角度出发,为高校图书馆在非物质文化遗产保护方面提出了些许建议。  相似文献   
184.
The success of electronic filing services largely depends on their continuance usage. This study examines the factors affecting the continuance usage intention of the online tax filing services in Mauritius. An integrated model comprising Trust Theory and Information System Success Model (ISSM) is applied to assess the continuance usage behaviour of e-filing systems. The model has been extended by adding two additional variables: Perceived Usefulness and Perceived Risk. The model was tested using a sample of 315 users of e-filing services in Mauritius. A structural equation modelling technique using partial least square structural equation modelling verified the hypotheses. The results reveal that the continuance usage intention of an electronic tax filing system is influenced by Perceived Usefulness, User Satisfaction, and Service Quality. However, Perceived Risk does not influence the continuance usage intention of e-filing systems since the importance of Perceived Risk diminishes as trust in the e-service provider increases. The theoretical and practical implications derived from the findings of this study are also discussed. This paper makes several contributions to the literature on electronic tax filing systems.  相似文献   
185.
The COVID-19 pandemic provides a unique opportunity to study which factors drive compliance and how the evolving context in society –virus fluctuations and changing government measures – changes the impact of these factors. Extant literature lists many factors that drive compliance – notably enforcement, trust, legitimacy. Most of these studies, however, do not look across time: whether a changing context for citizens changes the impact of factors driving compliance. In this study, we use Lindenberg's Goal Framing Theory to explain the dynamics of these drivers of compliance during the COVID-19 pandemic. We formulate hypotheses for pro-socialness, trust in government, observed respect for rules, rule effectiveness, rule appropriateness, fear of COVID-19 (severity and proximity), opportunities for pleasure and happiness, as well as worsened income position. We test our hypotheses with data collected at three different moments during the beginning of the COVID-19 crisis in Flanders, Belgium. Findings show that over time the constellations of factors that drive compliance change and, later in the pandemic, more distinct groups of citizens with different motivations to comply are identified. The overall conclusion is that the voluntary basis for compliance becomes more fragile over time, with a more differentiated pattern of drivers of compliance emerging. Public policy and communication need to adapt to these changes over time and address different groups of citizens.  相似文献   
186.
论卧底警察的保护与规制   总被引:1,自引:0,他引:1  
随着有组织犯罪的日益猖獗,公安机关运用卧底警察进行侦查破案的策略日益受到人们的关注。然而由于我国相较于其他世界发达国家在这方面的立法及制度建设还存在极大的滞后性,因此,理论界学者有必要对卧底警察这一被广泛运用的现象给以正确评价、规制和保护,以满足当今刑事侦查工作的切实需要。  相似文献   
187.
执法为民是公安工作的出发点和落脚点,也是公安工作的根本要求;“执法为民”理论的确  立,对公安工作的发展具有里程碑的意义;在实践中,应狠抓五个强化,切实提升执法为民的效应。  相似文献   
188.
Der Beitrag analysiert den zunehmenden Horizontalföderalismus im politischen Mehrebenensystem der Schweiz und fragt nach den Gefahren und Chancen für die Weiterentwicklung der Schweizer Demokratie. Die Evaluierung erfolgt auf der Basis der komplexen Demokratietheorie von Fritz Scharpf, ergänzt um die konstitutiven Perspektiven einer reflexiven Demokratietheorie. Insgesamt wird deutlich, dass der Horizontalföderalismus vor allem aus einer liberalen Position innerhalb einer Output‐ orientierten Demokratietheorie als problematisch angesehen werden muss, da die kantonale Exekutive gegenüber der Legislative gestärkt wird. Der Aufsatz betont aber die Chancen für die schweizerische Demokratie, da der Horizontalföderalismus grosse Ähnlichkeiten mit den Entscheidungsfindungsprozessen auf internationaler Ebene besitzt. Er liefert damit der Schweiz ein Übungsfeld, um ihr traditionell sehr introvertiertes Verständnis von demokratischer Selbstbestimmung zu überwinden und anzuerkennen, dass in einer interdependenten und mobilen Welt die “Einbeziehung des (externen) Anderen” ein Bestandteil einer legitimen demokratischen Ordnung darstellt.  相似文献   
189.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
190.
The present paper1 aims both at introducing the legal aspects of the protection of minors in cyberspace and analysing and criticizing certain main features embedded in this legal approach of young people protection. After a short introduction underlining the concept of child’s rights and the reason why this right has been particularly proclaimed in the context of the cyberspace, the first section describes the new technological features of the ICT environment and linked to this evolution the increasing risks the minors are confronted with. A typology of cyber abuses is proposed on the basis of these considerations. A list of EU or Council of Europe texts directly or indirectly related to the minors’ protection into the cyberspace is provided. The second section intends to analyse certain characteristics of the legal approach as regards the ways by which that protection is conceived and effectively ensured. Different principles and methods might be considered as keywords summarizing the legal approach and to a certain extent, fixing a partition of responsibilities taking fully into account the diversity of actors might be deduced from the different regulatory documents.The third section comes back to the different complementary means by which the Law is envisaging the minors’ protection. The obligation to create awareness about the potential risks minors might incur definitively is the first one. The omnipresent reference in all the legal texts to the role of self-regulatory interventions constitutes another pillar of the protection envisaged by the Law. After having described the multiple instruments developed in the context of this self-regulation (labels, codes of conduct, hotlines, ODR…) or even co-regulation, the paper examines the conditions set by the European legislators as regards these instruments. Technology might be considered as a fourth method for protecting children. Our concern will be to see how the Law is addressing new requirements as regards the technological solutions and their implementation. The present debates about the liability of the actors involved in applications or services targeted or not vis-à-vis the minors like SNS or VSP operators are evoked. As a final point the question of the increasing competences of LEA and the reinforcement of the criminal provisions in order to fight cyber abuses against minors will be debated. In conclusion, we will address final recommendations about the way by which it would be possible to reconcile effective minors’ protection and liberties into the cyberspace.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号