首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   495篇
  免费   20篇
各国政治   24篇
工人农民   22篇
世界政治   25篇
外交国际关系   48篇
法律   156篇
中国共产党   5篇
中国政治   35篇
政治理论   107篇
综合类   93篇
  2023年   6篇
  2022年   7篇
  2021年   10篇
  2020年   22篇
  2019年   25篇
  2018年   27篇
  2017年   25篇
  2016年   29篇
  2015年   15篇
  2014年   30篇
  2013年   96篇
  2012年   38篇
  2011年   35篇
  2010年   24篇
  2009年   25篇
  2008年   15篇
  2007年   16篇
  2006年   15篇
  2005年   13篇
  2004年   9篇
  2003年   6篇
  2002年   9篇
  2001年   9篇
  2000年   2篇
  1999年   2篇
  1998年   3篇
  1997年   2篇
排序方式: 共有515条查询结果,搜索用时 15 毫秒
441.
目前,我国P2P平台准入制度尚存在准入方式不当、准入条件混乱和准入标准模糊等不足,导致P2P市场出现野蛮增长、良莠不齐、鱼目混珠的乱象。重构P2P平台准入制度,应遵循"理念--模式--制度"的路径,以"适度"为理念设置控制与激励双重标准,选择差异化准入监管模式,具化准入方式、条件和标准等实质性要件。  相似文献   
442.
目前,关于精装房的交付标准并没有法律规范作出具体的要求。然而精装房的特殊性决定了其对于装修质量有着更高的要求,比如空气质量等。但是如果业主与开发商在商品房预售合同中没有作出关于交付标准的特别约定,业主并不能以交付房屋的空气质量不符合相关文件规定为由主张开发商违约。类似纠纷在司法实务中日趋常见,相关装饰装修验收标准法律位阶较低且不具统一性,很难成为业主抗辩开发商的有力依据。所以,根据精装房的特点,修改并完善目前的住宅交付使用标准是保护业主权益,保障房地产市场健康发展的必然选择。  相似文献   
443.
ABSTRACT

Studies on Small States, ‘unattractive’ markets, namely those from Africa, are very scarce. São Tomé and Príncipe (STP), a Small State, insular economy, has had considerable momentum in attracting FDI in the last decade albeit its geographical and demographic constraints and relative weak economic growth. The current study uncovers the potential determinants of FDI in unattractive markets using STP as a case study. Based on (robust) logistic estimations on a sample of 56 Portuguese companies that have trade relations with African countries, we show that in the case of Small States economies and unattractive markets, the relevance of institutional factors and resource seeking strategies surpass internalisation and location factors related to market size and dynamics. We further uncovered that foreign companies’ characteristics, namely size and (general) human capital, are critical in explaining companies’ likelihood to invest in an ‘unattractive’ market.  相似文献   
444.
It is impossible to understand the gendered relation between women and public space without taking into account its other, that is, male engagements with and in space. Our joint paper contrasts the public spaces of a market and a bus station in central Accra, Ghana. While the former is historically associated with female entrepreneurship, masculinity is deeply inscribed in the activities defining the latter. However, recent developments gradually undermine these gendered divides. By focusing on interpersonal claims to entrepreneurial places in the two locations, we illustrate how the configurations and co-constructions of gender and space are exposed to on-going, often subtle shifts, which are impelled by dialectically grounded transformations of quotidian spatial practices and social relations. Expanding upon the notion of viri–/uxorilocality, we explore shifts in the gendered strategies of newcomers establishing their presence in the two spaces and the extent to which these practices may alter gendered spatial significations.  相似文献   
445.
裁判文书公开是司法公开的核心,裁判文书上网公开又是目前裁判文书公开的重要形式。虽然裁判文书上网公开的普遍性和便捷性能满足公众对于司法知情权的需求,但不可避免在一定程度上会对相关人员的隐私权造成侵害。互联网的广泛应用为裁判文书公开提供了良好的载体,但也使得知情权与隐私权的碰撞更为激烈。通过比例原则和可分割性原则,对于涉及个人隐私的不同情况进行区别对待,并赋予当事人充分的程序保障权,以此对裁判文书上网公开中的知情权与隐私权的冲突予以平衡。  相似文献   
446.
The aim of this study was to add to the emerging knowledge about the role of bystanders in cyberbullying. To differentiate online versus offline bystander behaviors, 292 Australian children (mean age = 15.2; female = 54.4%) reviewed hypothetical scenarios experimentally manipulated by bystander sex, relationship to target and perpetrator, and severity of bullying incident. In both environments, bystander helping behaviors were more likely when the target was a close friend, perceived harm to the target was high, and when bystanders were female. Bystanders also reported being less likely to approach teachers or publicly defend targets in online versus offline environments. This suggests programs designed to encourage positive bystander behaviors online can be similar to face-to-face approaches, but they need to recognize some aspects unique to the online environment.  相似文献   
447.
In this article we offer a first attempt at providing a set of universal grading criteria for determining on what basis, and how far, an item of discursive content can be considered “terroristic.” In doing so, we draw loosely on the existing COPINE scale for child abuse images. The scale described in the article is not intended to reflect actual risk of engagement in terrorist violence, nor is it intended to have evidential validity in relation to offenses in certain jurisdictions relating to “terrorist publications.” Rather, by formalising assumptions which seem already to be latent in the literature on terrorist use of the Internet, it aspires to serve as a starting point for a more methodologically coherent approach to relationships between content—particularly online content—and terrorism.  相似文献   
448.
ABSTRACT

Why do women become extremists? To what extent might they have self-agency? This paper examines the motivations and processes of female radicalization into the so-called Islamic State (IS) by drawing on a case study of Indonesian IS sympathizers, including the three migrant workers-turned-female suicide bombers whose radicalization was facilitated by social media. It argues that far from being coerced, most women join IS of their own free will. Prompted by a mix of personal crisis and socioeconomic and political grievances, the women embark on a religious seeking, exploring the various Islamic options available to them. Ideational congruence might spark the initial interest in IS, but it is generally emotional factors such as a feeling of acceptance and empowerment that make them stay. Contrary to common assumptions, women’s subordination in jihadist organizations is not absolute; it can be negotiated after joining. Most women try to conform to jihadist strict gender rules, but some, often with the support of male allies, try to bend the norms, including on female combat roles. The findings suggest that counter-terrorism agencies should abandon the binary view that women are either just brainwashing victims or terrorist provocateurs, and try to understand the gendered nuances of radicalization in order to formulate suitable preventive measures.  相似文献   
449.
《Global Crime》2013,14(2-3):175-196
This paper focuses on criminals who could easily be labelled as entrepreneurs and who deal in compromised computer systems. Known as botmasters, these individuals use their technical skills to take over and control personal, business and governmental computers. These networks of hijacked computers are known as botnets in the security industry. With this massive computing power, these criminals can send large amounts of spam, attack web servers or steal financial data – all for a fee. As entrepreneurs, the botmasters' main goal is to achieve the highest level of success possible. In their case, this achievement can be measured in the illegitimate revenues they earn from the leasing of their botnet. Based on the evidence gathered in literature on legitimate and illegitimate markets, this paper sets to understand how reputation could relate to criminal achievement as well as what factors impact a heightened level of reputation in a criminal market.  相似文献   
450.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号