首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   272篇
  免费   13篇
各国政治   9篇
工人农民   14篇
世界政治   11篇
外交国际关系   34篇
法律   69篇
中国共产党   5篇
中国政治   30篇
政治理论   30篇
综合类   83篇
  2023年   3篇
  2022年   7篇
  2021年   9篇
  2020年   14篇
  2019年   13篇
  2018年   17篇
  2017年   16篇
  2016年   14篇
  2015年   8篇
  2014年   19篇
  2013年   42篇
  2012年   22篇
  2011年   24篇
  2010年   20篇
  2009年   13篇
  2008年   9篇
  2007年   11篇
  2006年   7篇
  2005年   5篇
  2004年   3篇
  2003年   5篇
  2002年   4篇
排序方式: 共有285条查询结果,搜索用时 31 毫秒
211.
当前我国正处在社会转型期,各种社会矛盾凸显,社会压力加剧,信访作为社会"减压阀"有效地缓解了社会压力。但是随着计算机技术的发展和网络的广泛普及,网络的虚拟空间越来越多地成为人们反映问题和发表意见的平台,所以,网络信访方式已经越来越引起信访部门的重视,公安机关为了更好地解决公安信访问题,维护社会稳定,也要与时俱进,将网络信访引入公安信访领域,为解决公安信访案件服务。  相似文献   
212.
网络游戏产业是我国文化娱乐产业新的经济增长点,促进我国网络游戏产业健康发展需要培育一大批高素质的游戏策划人才,但目前我国游戏策划群体面临着低门槛进入、低水平运作的局面,需要通过加大专业人才培养力度,提升整体水平;加强产业扶持,落实各项优惠政策;发挥行业协会和社团作用,促进自我发展;组织各类游戏策划大赛,实施价值观引导等方面来提升整体水平。  相似文献   
213.
论网上侦查     
犯罪嫌疑人在实施犯罪以及社会日常生活过程中必然要遗留与之相关的信息,这些信息可分为物质化信息与数字化信息。公安机关能够掌握的与犯罪嫌疑人有关的数字化信息分为四大类:违法犯罪记录信息、人口管理基本信息、社会活动信息和刑事案件发破案信息。网上侦查模式的运行过程就是依托各种信息资源分析平台,通过对四类数字化信息的整合、交叉碰撞比对,自动或半自动地揭示蕴藏在各类信息资源中的犯罪嫌疑人的活动规律轨迹和作案信息,从而发现破案线索以及准确定位在逃犯罪嫌疑人,进而将其缉捕归案。网上侦查作为一种全新的侦查模式,自成系统,构成这个系统的要素之间相互作用从而实现网上侦查的功能。  相似文献   
214.
215.
从需求、结构、功能、技术等方面对北京市市政管理委员会网上审批系统进行了介绍和分析  相似文献   
216.
社会支持链接:一个打工妹和城市社会的互动分析   总被引:5,自引:0,他引:5  
相对于农民工群体的边缘地位和弱势处境而言,打工妹属于双重弱势群体。本文通过对一个打工妹被雇主殴打、打官司的个案分析,再现了一个外来打工妹以突发事件为契机,建立自己的社会支持链接并能动地利用支持链接帮助自己解决危机、寻求新的发展机会的全过程。探讨了这个过程对既有社会规则、社会制度、社会观念和城乡关系的冲击和改变。  相似文献   
217.
MPs have not previously been assigned a major role in electoral campaigning, being considered only one element of a political party's ‘marketing’ tools for winning votes. Evidence now suggests that the relationship between MPs and their constituents is changing. The concept of ‘constituency service’ implies that individual MPs can have a much greater influence on local voters and so possibly buck national trends. At the same time the concept of the ‘permanent campaign’ is transforming political campaigning whereby the political elite needs ever‐greater control of the tools used to provide messages to voters. The internet is a potential battleground between MPs who want greater control of their own local campaigning and the party elite who want to ensure a consistent, coherent and controlled message. The Internet is a new addition to the campaigning armoury, yet the focus so far has been on e‐government, e‐democracy and election campaigns. By concentrating on how and why MPs use their websites this paper considers whether MPs have fully understood and utilised this new medium. Key questions include whether their websites are ‘sticky’, interactive and a means of creating a targeted message. The findings of this detailed study of MPs' websites show that apart from a few pioneers, MPs have not progressed beyond using the Internet as ‘shovelware’ — the vast majority view their website as an electronic brochure and not a new form of two‐way communication. Copyright © 2003 Henry Stewart Publications  相似文献   
218.
A pronounced drop in crime, since the early 1990s, has encompassed every crime category tracked by the FBI’s Uniform Crime Reports, including property crime. However, over the same period, the rates of online property crime (OPC) have been on the rise according to available evidence. We delineate the extent of our knowledge and data concerning cybercrime and identity theft and, using data from several nationally representative victimization surveys, offer an alternative view of property crime trends while pointing out the glaring gap in crime reporting and accounting in relation to the growing category of property crimes perpetrated online. In addition, we compare estimated costs of traditional property crime vs. OPC. Finally, we identify the main challenges for obtaining reliable data on OPC and discuss their implications, especially when applying the traditional methods of compiling crime statistics.  相似文献   
219.
Over the past 15 years petitions systems have become embedded in the Scottish Parliament and the National Assembly for Wales, and more recently the House of Commons. This article uses the concept of procedural justice, with its emphasis on the fairness of the process by which decisions are made, as an analytical tool to explore four case studies of petitions systems in British legislatures, considering, in particular, the extent to which they enable voice, decision-making and transparency. It illustrates that the application of ideas of procedural justice not only provides us with a useful tool for analysing petitions systems in representative political institutions, but also potentially provides a framework of ideas from which petitions systems, and perhaps other participatory initiatives, may learn.  相似文献   
220.
Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a community of hackers uses an automated reputation system to enhance trust among its members. We analyse 449,478 feedbacks collected over 27 months that rate the trustworthiness of 29,985 individuals belonging to the largest computer hacking forum. Only a tiny fraction of the forum membership (2.4%) participates in the vast majority (75%) of ‘trust exchanges’, limiting its utility. We observe a reporting bias where the propensity to report positive outcomes is 2.81 times greater among beginner hackers than among forum administrators. Reputation systems do not protect against trust decay caused here by the rapid expansion of the community. Finally, a qualitative analysis of 25,000 randomly selected feedbacks indicates that a diverse set of behaviours, skills and attitudes trigger assessments of trustworthiness.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号