首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6926篇
  免费   208篇
各国政治   53篇
工人农民   60篇
世界政治   100篇
外交国际关系   81篇
法律   2358篇
中国共产党   63篇
中国政治   1025篇
政治理论   295篇
综合类   3099篇
  2024年   4篇
  2023年   19篇
  2022年   45篇
  2021年   53篇
  2020年   140篇
  2019年   87篇
  2018年   91篇
  2017年   107篇
  2016年   123篇
  2015年   122篇
  2014年   395篇
  2013年   625篇
  2012年   456篇
  2011年   434篇
  2010年   473篇
  2009年   484篇
  2008年   500篇
  2007年   539篇
  2006年   516篇
  2005年   447篇
  2004年   408篇
  2003年   370篇
  2002年   298篇
  2001年   210篇
  2000年   73篇
  1999年   27篇
  1998年   14篇
  1997年   4篇
  1996年   4篇
  1995年   7篇
  1994年   8篇
  1993年   5篇
  1992年   10篇
  1991年   7篇
  1990年   3篇
  1989年   4篇
  1988年   3篇
  1987年   7篇
  1986年   6篇
  1985年   6篇
排序方式: 共有7134条查询结果,搜索用时 15 毫秒
881.
从方法论、理论意义和制度创新三个角度把握新时代中国外交理论的丰富内涵和发展方向,是深化新时代中国外交战略和外交理论研究的重要保证。人类命运共同体思想不仅丰富了中国的国际关系理论,也有力推动着理论范式的创新。这种创新表现为中国国际关系理念与价值创新、思维创新、模式创新和话语创新。我们需要深刻辨识中国全球伙伴关系战略对开创国际关系新模式的理论意义和高质量共建"一带一路"对世界共同现代化的制度创新价值。21世纪的国际竞争具有新的特点,更多体现为纵向竞争、间接竞争、错位竞争。由于美国视中国为长期性的竞争对手,这使得国际体系中的大国战略竞争呈现长期化态势。我们应从更广阔的战略图谱中定位竞争,从管控竞争、化解竞争的角度去应对竞争,其中包括推动实现"真正的多边主义"。  相似文献   
882.
王健 《国际展望》2022,14(1):23-37
2017年以来,中国周边安全和经济形势发生重大变化。在安全上,美国以推动"印太"战略、强化美日和美韩同盟、借议题拉拢东盟等手段将战略布局深度集中到中国的周边地区;法国、英国、德国、欧盟也紧随其后,开始深度介入"印太"地区的经济合作、安全事务和互联互通进程。在经济上,全球化已进入"慢速"阶段且越来越以区域化的方式展开;而机器人、3D打印技术和可再生能源的发展和运用将继续推动区域化进程,周边国家与中国的经济联系对双方来说都更为重要。无论是在安全上还是在经济上,周边地区对中国发展的重要性都在迅速上升。中国应更加重视周边外交在总体外交布局中的地位,要总结历史和当代中国营造良好周边环境的经验;争取处理好中美日、中美韩、中日韩、中俄印等一些大三角关系;将周边地区打造成为中国构建新发展格局的节点和高质量推动"一带一路"建设的引领示范地区;积极提供地区公共产品,推动构建周边命运共同体。  相似文献   
883.
推进国家治理体系和治理能力现代化是完善和发展中国特色社会主义制度的必然要求。基层群众自治现代化是国家治理体系和治理能力现代化的题中之义和基础工程。国家治理现代化,涉及国家治理的各个层面,其中,观念和制度的现代化尤为重要。  相似文献   
884.
There is debate as to whether secure hospital treatment for offenders with personality disorder can be effective relative to criminal justice interventions. This study examines the evidence for long-term treatment of such offenders in hospital within in a modified therapeutic community model including accredited offending behaviour programmes. A panel sample of 47 patients were followed up on measures of violence risk (HCR-20, VRS) and symptom severity (SCL90-R). Intention-to-treat analysis with reliability thresholds showed significant positive change between assessment and discharge in both violence risk (VRS) and symptoms (SCL90-R) indicating a positive treatment effect. Threshold effects for treatment effectiveness seemed to occur at 1?year of treatment for risk and 3?years for symptom reduction.  相似文献   
885.
In the era of re-entry, a great deal of attention has been paid to the ‘risk-need-responsivity’ model. Most attention to the utilization of services designed to meet need has focused on post-release behaviors. However, little attention has been paid to the pre-incarceration utilization of services that might influence receptivity to post-release utilization. Using constructs borrowed from health services utilization, the current paper examines the associations among CJ-involvement, social and health services utilization, and health status in a cohort of CJ-involved men living in the community. Results from the current cohort, combined with those of previous research, suggest that follow-through on services by released individuals’ remains problematic. Suggestions for future research and questions about the role of criminal justice agencies in improving follow-through are raised.  相似文献   
886.
887.
Weisburd, Groff, and Yang argue that there is a ‘law of concentrations of crime at place’ within cities. In this paper, we provide a test for this proposition in Tel Aviv-Jaffa. We found that crime concentrations at street segments in 2010 were remarkably similar to those observed in American cities. About 4.5% of the street segments produced approximately 50% of the crime, and about 1% of street segments produced 25% of crime. Our study provides important verification of the broad applicability of the law of crime concentrations at place.  相似文献   
888.
ROBERT AGNEW 《犯罪学》2014,52(1):1-32
Most leading crime theories and crime‐control policies are based on the assumption that people are self‐interested. But recent work in a variety of fields has challenged this assumption, suggesting that people are both self‐interested and socially concerned. Social concern involves biologically based inclinations that sometimes lead people to give more consideration to others than to their own interests. These inclinations include caring about others, forming close ties to and cooperating with others, following certain moral intuitions, and conforming. This article describes the nature of and evidence for social concern, as well as the ways in which social factors shape social concern. The article then presents a theory of social concern and crime. Social concern has direct, indirect, mediating, and conditioning effects on crime. Although social concern generally reduces the likelihood of crime, it has little effect on or increases crime under certain conditions.  相似文献   
889.
We are the middle of a global identity crisis. New notions of identity are made possible in the online world where people eagerly share their personal data and leave ‘digital footprints’. Multiple, partial identities emerge distributed across cyberspace divorced from the physical person. The representation of personal characteristics in data sets, together with developing technologies and systems for identity management, in turn change how we are identified. Trustworthy means of electronic identification is now a key issue for business, governments and individuals in the fight against online identity crime. Yet, along with the increasing economic value of digital identity, there are also risks of identity misuse by organisations that mine large data sets for commercial purposes and in some cases by governments. Data proliferation and the non-transparency of processing practices make it impossible for the individual to track and police their use. Potential risks encompass not only threats to our privacy, but also knowledge-engineering that can falsify digital profiles attributed to us with harmful consequences. This panel session will address some of the big challenges around identity in the digital age and what they mean for policy and law (its regulation and protection). Questions for discussion include: What does identity mean today? What types of legal solutions are fit for purpose to protect modern identity interests? What rights, obligations and responsibilities should be associated with our digital identities? Should identity management be regulated and who should be held liable and for what? What should be the role of private and public sectors in identity assurance schemes? What are the global drivers of identity policies? How can due process be ensured where automated technologies affect the rights and concerns of citizens? How can individuals be more empowered to control their identity data and give informed consent to its use? How are biometrics and location-tracking devices used in body surveillance changing the identity landscape?  相似文献   
890.
With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer crimes namely hacking, dissemination of malware and denial of service attacks. The cybercrime rules are however slightly outdated due to changes that have occurred in the field of cybercrime since the enactment of the Code. The surge of new varieties of cybercrimes previously uncovered under the Code and the need to legislate tailored evidentiary and procedural rules for investigation and prosecution of cybercrimes have recently prompted the Ethiopian government to draft modern and comprehensive cybercrime legislation, but the draft law still needs further work on cybercrimes in light of other major legislative developments at regional and national levels. This article closely examines major developments in cybercrime law and practice in Ethiopia since the enactment of the first set of cybercrime rules and proffers recommendations towards a unified cybercrime regime.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号