首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5189篇
  免费   233篇
各国政治   148篇
工人农民   104篇
世界政治   110篇
外交国际关系   767篇
法律   845篇
中国共产党   78篇
中国政治   872篇
政治理论   415篇
综合类   2083篇
  2024年   15篇
  2023年   35篇
  2022年   43篇
  2021年   58篇
  2020年   137篇
  2019年   89篇
  2018年   111篇
  2017年   175篇
  2016年   137篇
  2015年   140篇
  2014年   341篇
  2013年   578篇
  2012年   289篇
  2011年   297篇
  2010年   305篇
  2009年   358篇
  2008年   366篇
  2007年   374篇
  2006年   320篇
  2005年   322篇
  2004年   314篇
  2003年   237篇
  2002年   155篇
  2001年   164篇
  2000年   42篇
  1999年   13篇
  1998年   2篇
  1997年   1篇
  1995年   2篇
  1994年   1篇
  1991年   1篇
排序方式: 共有5422条查询结果,搜索用时 31 毫秒
931.
中俄两国的文化交流是两国关系史上的重要组成部分,在一定程度上影响、制约着两国政治经济关系的发展和变化。在早期中俄文化交流中,俄国东正教和传教士团扮演了文化使者的角色,是中俄文化交流最重要的桥梁。尽管他们的活动带有一定的政治目的,但在客观上却为促进中俄两国的文化交流和人民之间的了解发挥了促进作用。  相似文献   
932.
《Communicatio》2012,38(3):261-278
Abstract

This article focuses on the question whether the technologically enabled advent of ‘virtual reality’ or ‘cyberspace’ has a significant impact on human experience of the world. Gilbert Germain's work on Virilio and Baudrillard gives greater insight in this regard, specifically regarding cyberspace as the new ‘frontier’, and focuses on the alienating effects of cyberspace regarding the human life-world. Turkle's recent work regarding robotics similarly points to a fundamental shift in human attitudes towards ‘embodied’ artificial intelligence, especially concerning its capacity for affectivity, which further marks a turning away from the complexity of human relationships in favour of supposedly uncomplicated ‘machine relationships’. Derrida enables one to better understand the changing relation between humans and machines in terms of the reconfiguration of human subjectivity. Together with Turkle's work in this domain, it points to a surprising ‘reconfiguration’ of conceptions regarding being human. Finally, Feenberg's retrospective on the fraught relations between humans and technology, as reflected in various fictional and theoretical works, as well as social developments, provides a suitable conclusion, given his affirmative remarks on the prospects of human autonomy in relation to the Internet.  相似文献   
933.
《Communicatio》2012,38(2):181-194
Abstract

Since communication refers to the sharing of information by any effective means, there is no doubt it entails the ability to make meaning of realities. In this sense, communication is cultural as much as it is human. Since that is the case, its theories cannot be fabricated in the abstract, but must be anchored in people's everyday lifestyles and cultures. Hence, like every other discipline, Africanising communication science is as much a possibility as theorising its perspectives from African contexts and experiences. Focusing on the negative challenges confronting the continent might make scholars see only the difficulties that problematise the application of theories to Africa's reality, which only betrays the Anglo-American stereotypical views of the continent. The argument is made here that the starting point of any theory of communication has to lie with the identity and culture of those involved in the communication process. Specifically by using selected films from Africa, this author considers the exploration of African identity and culture (from a bottom-up paradigm) as the primary starting point to tease out relevant theories of communication for and from an African cultural context.  相似文献   
934.
935.
This article argues that Australia's recently-passed data breach notification legislation, the Privacy Amendment (Notifiable Data Breaches) Act 2017 (Cth), and its coming into force in 2018, makes an internationally important, yet imperfect, contribution to data breach notification law. Against the backdrop of data breach legislation in the United States and European Union, a comparative analysis is undertaken between these jurisdictions and the Australian scheme to elucidate this argument. Firstly, some context to data breach notification provisions is offered, which are designed to address some of the problems data breaches cause for data privacy and information security. There have been various prominent data breaches affecting Australians over the last few years, which have led to discussion of what can be done to deal with their negative effects. The international context of data breach notification legislation will be discussed, with a focus on the United States and European Union jurisdictions, which have already adopted similar laws. The background to the adoption of the Australia legislation will be examined, including the general context of data privacy and security protection in Australia. The reform itself will be then be considered, along with the extent to which this law is fit for purpose and some outstanding concerns about its application. While data breach notification requirements are likely to be a positive step for data security, further reform is probably necessary to ensure strong cybersecurity. However, such reform should be cognisant of the international trends towards the adoption of data security measures including data breach notification, but lack of alignment in standards, which may be burdensome for entities operating in the transnational data economy.  相似文献   
936.
Robust cyber-resilience depends on sound technical controls and testing of those controls in combination with rigorous cyber-security policies and practices. Increasingly, corporations and other organizations are seeking to test all of these, using methods more sophisticated than mere network penetration testing or other technical audit operations. More sophisticated organizations are also conducting so-called “Red Team” exercises, in which the organization tasks a small team of highly skilled and trained individuals to try to gain unauthorized access to physical and logical company assets and information. While such operations can have real value, they must be planned and conducted with great care in order to avoid violating the law or creating undue risk and reputational harm to the organization. This article explores these sometimes tricky issues, and offers practical risk-based guidance for organizations contemplating these types of exercises.  相似文献   
937.
With a focus on India, and drawing on critical scholarship on geo-politics and geo-economics and “relational” state theories, this article examines the ways in which ideational and material processes of state transformation have shaped India’s international engagement in different periods. Prior to 1991, geo-political social forms linked to a national developmentalist state project shaped India’s engagement with global and regional multilateralism and the nature of this engagement fluctuated according to shifts in the legitimacy and viability of this state project. The erosion of the developmentalist state project from the 1970s laid the path for a deeper shift in the national social order in the 1990s with the recasting of statehood wherein India’s future was thought to be best secured through policies of economic openness, growth and competitiveness. This shift in India’s state project has given rise to new forms of global and regional engagement that are distinct to older forms of international engagement and reflect and further processes of state transformation in India. This is illustrated through a case study on energy policy.  相似文献   
938.
A human rights approach to food security seeks to empower vulnerable groups to claim their rights. It also reinforces a government’s obligations to respect, protect and fulfil the right to food. Furthermore, it encourages the integration of the right to food into the design and implementation of food security policies. This article examines the human rights approach to food security, with specific reference to Ethiopia. It assesses the historical causes of Ethiopia’s food insecurity, and examines the legislative and policy measures that the country has adopted over the last three decades in order to achieve food security. Food insecurity in the country is largely explained by the absence of government accountability. In 1973 and 1984, the hunger caused by drought was transitioned to famine not because of overall unavailability of food in the country, but because the government failed to provide food aid to the starved people and concealed the occurrence of famines from the international donors. Despite designing some food security policies over the last three decades, the country has not yet adopted sufficient legislative and judicial measures to enforce the right to food. This article argues that Ethiopia should introduce a framework law on the right to food to end hunger in the context of achieving national food security.  相似文献   
939.
Abstract

The aim of this article is to explain the internal conditions of military security in a non-European context. It utilises securitisation as the theoretical perspective and investigates Iranian and Indonesian case studies to explore how the perception of internal threats and vulnerabilities determines the approaches to military security. It begins with a reiteration of securitisation theory assumptions, followed by clarifying the understanding of security in non-Western contexts. The case studies focus on the conditions which facilitate securitisation, including the nature of securitising actors, assumed concepts of security, and securitisation processes and their outcomes. The analysis indicates a necessity for several alterations in securitisation theory to realise its full potential. Civil–military relations in Asian states differ from those in the West, as both Iran and Indonesia show a high degree of military involvement in political affairs. Military security also becomes securitised as a result of internal political rivalries. The perception of threats is a tool in the struggle to extend the capabilities of security agencies or retain influences.  相似文献   
940.
This article examines the impact of structural reforms and industrial relations changes on the employment security and decision behaviors of middle-level managers in the Australian Taxation Office (ATO). This article is based on an empirical study using focus group and survey data that investigated how structural change and public-sector reforms substantially altered the employment environment. This research reveals that the ATO environment can be characterized by low morale, risk aversion, fear, and distrust brought about, in part, by employment insecurity. Where middle managers perceived organizational threats to their employment security, they engaged in self-protective “survivor” behaviors even when no such threats to their employment security existed. The article concludes that a substantial number of middle-level managers, survivors of years of restructuring, downsizing, and organizational change, were unlikely to display high-quality decision-making behaviors.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号