全文获取类型
收费全文 | 495篇 |
免费 | 20篇 |
专业分类
各国政治 | 24篇 |
工人农民 | 22篇 |
世界政治 | 25篇 |
外交国际关系 | 48篇 |
法律 | 156篇 |
中国共产党 | 5篇 |
中国政治 | 35篇 |
政治理论 | 107篇 |
综合类 | 93篇 |
出版年
2023年 | 6篇 |
2022年 | 7篇 |
2021年 | 10篇 |
2020年 | 22篇 |
2019年 | 25篇 |
2018年 | 27篇 |
2017年 | 25篇 |
2016年 | 29篇 |
2015年 | 15篇 |
2014年 | 30篇 |
2013年 | 96篇 |
2012年 | 38篇 |
2011年 | 35篇 |
2010年 | 24篇 |
2009年 | 25篇 |
2008年 | 15篇 |
2007年 | 16篇 |
2006年 | 15篇 |
2005年 | 13篇 |
2004年 | 9篇 |
2003年 | 6篇 |
2002年 | 9篇 |
2001年 | 9篇 |
2000年 | 2篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 2篇 |
排序方式: 共有515条查询结果,搜索用时 15 毫秒
441.
目前,我国P2P平台准入制度尚存在准入方式不当、准入条件混乱和准入标准模糊等不足,导致P2P市场出现野蛮增长、良莠不齐、鱼目混珠的乱象。重构P2P平台准入制度,应遵循"理念--模式--制度"的路径,以"适度"为理念设置控制与激励双重标准,选择差异化准入监管模式,具化准入方式、条件和标准等实质性要件。 相似文献
442.
常飞 《福建警察学院学报》2014,(1):105-108
目前,关于精装房的交付标准并没有法律规范作出具体的要求。然而精装房的特殊性决定了其对于装修质量有着更高的要求,比如空气质量等。但是如果业主与开发商在商品房预售合同中没有作出关于交付标准的特别约定,业主并不能以交付房屋的空气质量不符合相关文件规定为由主张开发商违约。类似纠纷在司法实务中日趋常见,相关装饰装修验收标准法律位阶较低且不具统一性,很难成为业主抗辩开发商的有力依据。所以,根据精装房的特点,修改并完善目前的住宅交付使用标准是保护业主权益,保障房地产市场健康发展的必然选择。 相似文献
443.
Aurora A. C. Teixeira Sawelerk Nascimento 《Journal of contemporary African studies : JCAS》2019,37(4):351-378
ABSTRACTStudies on Small States, ‘unattractive’ markets, namely those from Africa, are very scarce. São Tomé and Príncipe (STP), a Small State, insular economy, has had considerable momentum in attracting FDI in the last decade albeit its geographical and demographic constraints and relative weak economic growth. The current study uncovers the potential determinants of FDI in unattractive markets using STP as a case study. Based on (robust) logistic estimations on a sample of 56 Portuguese companies that have trade relations with African countries, we show that in the case of Small States economies and unattractive markets, the relevance of institutional factors and resource seeking strategies surpass internalisation and location factors related to market size and dynamics. We further uncovered that foreign companies’ characteristics, namely size and (general) human capital, are critical in explaining companies’ likelihood to invest in an ‘unattractive’ market. 相似文献
444.
It is impossible to understand the gendered relation between women and public space without taking into account its other, that is, male engagements with and in space. Our joint paper contrasts the public spaces of a market and a bus station in central Accra, Ghana. While the former is historically associated with female entrepreneurship, masculinity is deeply inscribed in the activities defining the latter. However, recent developments gradually undermine these gendered divides. By focusing on interpersonal claims to entrepreneurial places in the two locations, we illustrate how the configurations and co-constructions of gender and space are exposed to on-going, often subtle shifts, which are impelled by dialectically grounded transformations of quotidian spatial practices and social relations. Expanding upon the notion of viri–/uxorilocality, we explore shifts in the gendered strategies of newcomers establishing their presence in the two spaces and the extent to which these practices may alter gendered spatial significations. 相似文献
445.
民事裁判文书上网公开的边界问题探究——基于司法知情权与个人隐私权的冲突与平衡的考量 总被引:1,自引:0,他引:1
陶婷 《西南政法大学学报》2014,(6):75-85
裁判文书公开是司法公开的核心,裁判文书上网公开又是目前裁判文书公开的重要形式。虽然裁判文书上网公开的普遍性和便捷性能满足公众对于司法知情权的需求,但不可避免在一定程度上会对相关人员的隐私权造成侵害。互联网的广泛应用为裁判文书公开提供了良好的载体,但也使得知情权与隐私权的碰撞更为激烈。通过比例原则和可分割性原则,对于涉及个人隐私的不同情况进行区别对待,并赋予当事人充分的程序保障权,以此对裁判文书上网公开中的知情权与隐私权的冲突予以平衡。 相似文献
446.
The aim of this study was to add to the emerging knowledge about the role of bystanders in cyberbullying. To differentiate online versus offline bystander behaviors, 292 Australian children (mean age = 15.2; female = 54.4%) reviewed hypothetical scenarios experimentally manipulated by bystander sex, relationship to target and perpetrator, and severity of bullying incident. In both environments, bystander helping behaviors were more likely when the target was a close friend, perceived harm to the target was high, and when bystanders were female. Bystanders also reported being less likely to approach teachers or publicly defend targets in online versus offline environments. This suggests programs designed to encourage positive bystander behaviors online can be similar to face-to-face approaches, but they need to recognize some aspects unique to the online environment. 相似文献
447.
Fernando Lopez‐Alves 《Terrorism and Political Violence》2013,25(2):202-241
In this article we offer a first attempt at providing a set of universal grading criteria for determining on what basis, and how far, an item of discursive content can be considered “terroristic.” In doing so, we draw loosely on the existing COPINE scale for child abuse images. The scale described in the article is not intended to reflect actual risk of engagement in terrorist violence, nor is it intended to have evidential validity in relation to offenses in certain jurisdictions relating to “terrorist publications.” Rather, by formalising assumptions which seem already to be latent in the literature on terrorist use of the Internet, it aspires to serve as a starting point for a more methodologically coherent approach to relationships between content—particularly online content—and terrorism. 相似文献
448.
Nava Nuraniyah 《Terrorism and Political Violence》2013,25(6):890-910
ABSTRACTWhy do women become extremists? To what extent might they have self-agency? This paper examines the motivations and processes of female radicalization into the so-called Islamic State (IS) by drawing on a case study of Indonesian IS sympathizers, including the three migrant workers-turned-female suicide bombers whose radicalization was facilitated by social media. It argues that far from being coerced, most women join IS of their own free will. Prompted by a mix of personal crisis and socioeconomic and political grievances, the women embark on a religious seeking, exploring the various Islamic options available to them. Ideational congruence might spark the initial interest in IS, but it is generally emotional factors such as a feeling of acceptance and empowerment that make them stay. Contrary to common assumptions, women’s subordination in jihadist organizations is not absolute; it can be negotiated after joining. Most women try to conform to jihadist strict gender rules, but some, often with the support of male allies, try to bend the norms, including on female combat roles. The findings suggest that counter-terrorism agencies should abandon the binary view that women are either just brainwashing victims or terrorist provocateurs, and try to understand the gendered nuances of radicalization in order to formulate suitable preventive measures. 相似文献
449.
《Global Crime》2013,14(2-3):175-196
This paper focuses on criminals who could easily be labelled as entrepreneurs and who deal in compromised computer systems. Known as botmasters, these individuals use their technical skills to take over and control personal, business and governmental computers. These networks of hijacked computers are known as botnets in the security industry. With this massive computing power, these criminals can send large amounts of spam, attack web servers or steal financial data – all for a fee. As entrepreneurs, the botmasters' main goal is to achieve the highest level of success possible. In their case, this achievement can be measured in the illegitimate revenues they earn from the leasing of their botnet. Based on the evidence gathered in literature on legitimate and illegitimate markets, this paper sets to understand how reputation could relate to criminal achievement as well as what factors impact a heightened level of reputation in a criminal market. 相似文献
450.