全文获取类型
收费全文 | 6305篇 |
免费 | 177篇 |
专业分类
各国政治 | 56篇 |
工人农民 | 36篇 |
世界政治 | 91篇 |
外交国际关系 | 113篇 |
法律 | 2241篇 |
中国共产党 | 60篇 |
中国政治 | 861篇 |
政治理论 | 275篇 |
综合类 | 2749篇 |
出版年
2024年 | 5篇 |
2023年 | 16篇 |
2022年 | 23篇 |
2021年 | 34篇 |
2020年 | 92篇 |
2019年 | 75篇 |
2018年 | 77篇 |
2017年 | 92篇 |
2016年 | 112篇 |
2015年 | 102篇 |
2014年 | 333篇 |
2013年 | 523篇 |
2012年 | 420篇 |
2011年 | 388篇 |
2010年 | 452篇 |
2009年 | 528篇 |
2008年 | 454篇 |
2007年 | 477篇 |
2006年 | 452篇 |
2005年 | 428篇 |
2004年 | 393篇 |
2003年 | 342篇 |
2002年 | 281篇 |
2001年 | 200篇 |
2000年 | 78篇 |
1999年 | 30篇 |
1998年 | 11篇 |
1997年 | 2篇 |
1996年 | 4篇 |
1995年 | 6篇 |
1994年 | 7篇 |
1993年 | 4篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 3篇 |
1989年 | 4篇 |
1988年 | 3篇 |
1987年 | 6篇 |
1986年 | 6篇 |
1985年 | 6篇 |
排序方式: 共有6482条查询结果,搜索用时 31 毫秒
851.
王汝惠 《安徽警官职业学院学报》2006,5(4):37-39
控制和惩治洗钱犯罪是包括我国在内的国际社会的共同任务。我国现行刑法关于洗钱罪的规定存在诸多不足,需要进一步加以完善。本文参照国际公约的有关规定,结合我国的国情,就我国反洗钱刑事立法的完善提出建议。 相似文献
852.
The fight against organized crime has become a top security priority for the European Union (EU). While a new policy area is emerging, it is difficult to understand who is in lead and how the process develops. This article delves into the post-Lisbon EU security model, exploring how Washington and Brussels collaborate in combating organized crime in a context of changing definitions, actors and policies. It argues that US definitions, operational models and policies influence EU institutional thinking and policies, shifting the emphasis from prevention and rule of law to execution and intelligence. The dynamics of policy convergence and divergence on criminal matters in the transatlantic community reflect tectonic shifts in the deepest levels of thinking security in the West, affecting the moulding of a European security identity. 相似文献
853.
我国金融监管制度供给过剩的法经济学分析 总被引:1,自引:0,他引:1
中国金融监管存在显著的制度供给过剩。金融监管制度供给过剩会增加交易成本,不符合效率原则。从法经济学的角度分析,中国金融监管制度供给过剩的原因在于金融监管供给与需求不匹配、权力监管模式下监管机关的粗放型制度供给以及金融监管的行政化。改变金融监管制度供给过剩的状况,应当引入金融监管的成本收益理念和问责机制,将金融监管由权力监管向市场化监管转变,并合理处理金融创新与金融监管的关系。 相似文献
854.
855.
Weisburd, Groff, and Yang argue that there is a ‘law of concentrations of crime at place’ within cities. In this paper, we provide a test for this proposition in Tel Aviv-Jaffa. We found that crime concentrations at street segments in 2010 were remarkably similar to those observed in American cities. About 4.5% of the street segments produced approximately 50% of the crime, and about 1% of street segments produced 25% of crime. Our study provides important verification of the broad applicability of the law of crime concentrations at place. 相似文献
856.
ROBERT AGNEW 《犯罪学》2014,52(1):1-32
Most leading crime theories and crime‐control policies are based on the assumption that people are self‐interested. But recent work in a variety of fields has challenged this assumption, suggesting that people are both self‐interested and socially concerned. Social concern involves biologically based inclinations that sometimes lead people to give more consideration to others than to their own interests. These inclinations include caring about others, forming close ties to and cooperating with others, following certain moral intuitions, and conforming. This article describes the nature of and evidence for social concern, as well as the ways in which social factors shape social concern. The article then presents a theory of social concern and crime. Social concern has direct, indirect, mediating, and conditioning effects on crime. Although social concern generally reduces the likelihood of crime, it has little effect on or increases crime under certain conditions. 相似文献
857.
We are the middle of a global identity crisis. New notions of identity are made possible in the online world where people eagerly share their personal data and leave ‘digital footprints’. Multiple, partial identities emerge distributed across cyberspace divorced from the physical person. The representation of personal characteristics in data sets, together with developing technologies and systems for identity management, in turn change how we are identified. Trustworthy means of electronic identification is now a key issue for business, governments and individuals in the fight against online identity crime. Yet, along with the increasing economic value of digital identity, there are also risks of identity misuse by organisations that mine large data sets for commercial purposes and in some cases by governments. Data proliferation and the non-transparency of processing practices make it impossible for the individual to track and police their use. Potential risks encompass not only threats to our privacy, but also knowledge-engineering that can falsify digital profiles attributed to us with harmful consequences. This panel session will address some of the big challenges around identity in the digital age and what they mean for policy and law (its regulation and protection). Questions for discussion include: What does identity mean today? What types of legal solutions are fit for purpose to protect modern identity interests? What rights, obligations and responsibilities should be associated with our digital identities? Should identity management be regulated and who should be held liable and for what? What should be the role of private and public sectors in identity assurance schemes? What are the global drivers of identity policies? How can due process be ensured where automated technologies affect the rights and concerns of citizens? How can individuals be more empowered to control their identity data and give informed consent to its use? How are biometrics and location-tracking devices used in body surveillance changing the identity landscape? 相似文献
858.
With increasing access to information and communication technologies such as the Internet, Ethiopia has recently taken responsive legislative measures. One such legislative measure is enactment of cybercrime rules as part of the Criminal Code of 2004. These rules penalize three items of computer crimes namely hacking, dissemination of malware and denial of service attacks. The cybercrime rules are however slightly outdated due to changes that have occurred in the field of cybercrime since the enactment of the Code. The surge of new varieties of cybercrimes previously uncovered under the Code and the need to legislate tailored evidentiary and procedural rules for investigation and prosecution of cybercrimes have recently prompted the Ethiopian government to draft modern and comprehensive cybercrime legislation, but the draft law still needs further work on cybercrimes in light of other major legislative developments at regional and national levels. This article closely examines major developments in cybercrime law and practice in Ethiopia since the enactment of the first set of cybercrime rules and proffers recommendations towards a unified cybercrime regime. 相似文献
859.
刑法理论发展史上,经由刑事古典学派与刑事实证学派的对立纷争,罪刑关系经历了从罪刑均衡到"人"刑对应的演绎脉络。我国当代刑法理论确定罪责刑相适应原则,藉由刑事责任论的建构和充实,较为完美地实现了罪刑关系范畴中行为考察和行为人评价的统一。梳理从罪刑均衡到罪责刑相适应的发展历程,可以看出,伴随刑法理论的发展,犯罪人逐渐实现从消隐到凸显的地位变迁。当代刑法学的发展方向,应是日益重视行为人主体地位的确立和人格特征的评价。以此为视角,我国刑法学应从理论上更加重视主观因素和行为人因素的植入,在实践中更加关注行为人人身危险性的评价和犯罪恶性的改造。 相似文献
860.