首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   369篇
  免费   49篇
各国政治   5篇
工人农民   20篇
世界政治   7篇
外交国际关系   32篇
法律   134篇
中国共产党   3篇
中国政治   74篇
政治理论   27篇
综合类   116篇
  2023年   15篇
  2022年   22篇
  2021年   16篇
  2020年   32篇
  2019年   20篇
  2018年   19篇
  2017年   9篇
  2016年   11篇
  2015年   12篇
  2014年   21篇
  2013年   32篇
  2012年   15篇
  2011年   23篇
  2010年   24篇
  2009年   32篇
  2008年   18篇
  2007年   34篇
  2006年   19篇
  2005年   6篇
  2004年   9篇
  2003年   9篇
  2002年   11篇
  2001年   5篇
  2000年   3篇
  1999年   1篇
排序方式: 共有418条查询结果,搜索用时 15 毫秒
391.
为境外窃取、刺探、收买、非法提供国家秘密、情报罪是危害国家安全罪中的最重要罪之一。本文就为境外窃取、刺探、收买、非法提供国家秘密、情报罪中犯罪对象、行为若干争议比较大的问题谈了自己的看法 ,并对本罪与非罪、此罪与彼罪界限划分予以了论述  相似文献   
392.
为境外窃取、刺探、收买、非法提供国家秘密、情报罪的犯罪客体为国家安全和利益及国家秘密、情报管理秩序,前者为主要客体,后者为次要客体;犯罪客观方面为为境外机构、组织、人员窃取、刺探、收买、非法提供国家秘密、情报;犯罪主体为一般主体;犯罪主观方面为直接故意。  相似文献   
393.
美国的情报体制形成于1947年,这是一个分散中稍有集中、以分散为主的有限协调体制."9·11"恐怖事件发生后,改革情报体制和国土安全机制,成了美国朝野考虑的主要问题.国家情报主任成为美国情报界名副其实的第一人,但又不可能成为人们担心的"情报沙皇".通过改革,美国后冷战时代的情报管理体制基本成形.美国情报改革给我们的启示是:要建立一个协调的情报体制;情报改革应该理论先行;注重培育积极的情报文化,克服其消极影响.  相似文献   
394.
犯罪模式分析——西方犯罪情报分析技术简介   总被引:1,自引:0,他引:1  
犯罪模式分析是犯罪情报分析的一种主要类型,同时也是一种常用的犯罪情报分析方法,类似于我国并案侦查中的串并案件。在西方警务执法活动中,常见的犯罪模式分析方法主要有初步分析法与犯罪地图标注法。  相似文献   
395.
满铁情报机构的努力,在伪满洲国成立过程中发挥了重要作用。调查课与关东军合作,具体策划了伪满洲国的成立;经调会替伪满政权立案,进行政策起草和项目调查;满铁弘报系、放映班、右翼社团组织则为伪满洲国建立进行舆论造势。  相似文献   
396.
Research Summary Attention to gang issues has dramatically increased in the last several decades, both in the scholarly literature and in law enforcement. Despite widespread attention to the gang problem, researchers, police officers, and lawmakers have yet to agree on definitions used to characterize and understand the problem. This article summarizes the existing literature concerning the importance of accurately defining and classifying gang members, documents and analyzes state and federal gang legislation in the United States, and provides a detailed analysis of one state's system that might serve as a useful model for other states. Policy Implications Serious risks to public safety and civil liberties are associated with Type 1 and Type 2 classification errors regarding gang membership. The wide variation in state statutory definitions of “gang member” and in the construction and administration of gang databases presents major challenges for policymakers and academic researchers. This article addresses these challenges and argues that a more rigorous and unified system, based on one state's existing model, might be possible and could offer significant advantages in our efforts to address the delinquent and criminal behavior of gangs throughout the United States.  相似文献   
397.
Abstract:  Effectively addressing marijuana trade is aided by understanding marijuana geographic sources. We analyzed the 87Sr/86Sr of marijuana samples grown in 79 counties across the United States to determine if a primary geologic signal is retained in marijuana, which could therefore be useful for geographic sourcing. The marijuana results were compared with modeled bedrock 87Sr/86Sr values based on 87Rb decay rates and a generalized geologic map of the U.S.A. A significant correlation was observed between marijuana 87Sr/86Sr and modeled bedrock 87Sr/86Sr. Although values clustered near the 1:1 relationship, there was a predominance of positive anomalies, perhaps attributable to carbonate bedrock. A small number of negative anomalies were also observed, which were generally associated with granitic bedrocks. These results suggest that strontium isotopes in marijuana record the geographic origins of marijuana, and that refinement of the base strontium map (or strontium isoscape) and improved understanding of other strontium sources would be productive.  相似文献   
398.
The changes imposed by new information technologies, especially pervasive computing and the Internet, require a deep reflection on the fundamental values underlying privacy and the best way to achieve their protection. The explicit consent of the data subject, which is a cornerstone of most data protection regulations, is a typical example of requirement which is very difficult to put into practice in the new world of “pervasive computing” where many data communications necessarily occur without the users' notice. In this paper, we argue that an architecture based on “Privacy Agents” can make privacy rights protection more effective, provided however that this architecture meets a number of legal requirements to ensure the validity of consent delivered through such Privacy Agents. We first present a legal analysis of consent considering successively (1) its nature; (2) its essential features (qualities and defects) and (3) its formal requirements. Then we draw the lessons of this legal analysis for the design of a valid architecture based on Privacy Agents. To conclude, we suggest an implementation of this architecture proposed in a multidisciplinary project involving lawyers and computer scientists.  相似文献   
399.
We present preliminary data on the role of emotional intelligence (EI) in mediating the relationship between psychopathy and detention term of authors of property crimes. We assumed that the detention term is an approximation of the severity of criminal behavior. A sample of 24 property offenders were individually administered a brief anamnestic interview, the Psychopathic Personality Inventory—Revised (PPI‐R), and the Mayer–Salovey–Caruso Emotional Intelligence Test (MSCEIT). Information concerning the detention term was obtained from prison records. A mediation model was applied to the data showing that offenders high in psychopathic traits (i.e., total PPI‐R score and Self‐centered dimension of PPI‐R) have a low level of ability EI and this is in turn negatively associated with the duration of their prison sentence. Results encourage the investigation of ability EI as a protective factor against the antisocial outcomes of psychopathic disorder.  相似文献   
400.
Liu KL  Kong B  Guo TY 《法医学杂志》2006,22(2):137-138
目的探讨颅脑外伤的儿童智力特点。方法对43例因车祸导致颅脑外伤儿童和50名正常儿童的韦氏智力测验结果进行比较。结果车祸致颅脑外伤儿童的智力水平普遍下降,其总智商、言语智商和操作智商均显著低于正常对照组,弥漫性颅脑损伤对智力的损伤最大。结论颅脑外伤儿童智力水平普遍下降,弥漫性颅脑损伤对智商的损伤最大。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号