首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4796篇
  免费   73篇
各国政治   34篇
工人农民   41篇
世界政治   43篇
外交国际关系   80篇
法律   1091篇
中国共产党   49篇
中国政治   1258篇
政治理论   281篇
综合类   1992篇
  2024年   2篇
  2023年   30篇
  2022年   12篇
  2021年   37篇
  2020年   70篇
  2019年   60篇
  2018年   72篇
  2017年   87篇
  2016年   112篇
  2015年   86篇
  2014年   309篇
  2013年   350篇
  2012年   302篇
  2011年   328篇
  2010年   310篇
  2009年   388篇
  2008年   369篇
  2007年   374篇
  2006年   400篇
  2005年   283篇
  2004年   278篇
  2003年   224篇
  2002年   184篇
  2001年   127篇
  2000年   46篇
  1999年   12篇
  1998年   3篇
  1995年   2篇
  1994年   5篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
  1989年   1篇
  1986年   1篇
排序方式: 共有4869条查询结果,搜索用时 62 毫秒
871.
在法治国家的背景下,政府的行政管理体制和管理职能不断发生变化,对作为典型行政权的警察权提出了新的要求,既有的警察权配置面临着各种问题和挑战,已经不能满足社会形势的发展需要。文章从对警察权的性质和既有配置规则的分析入手,提出了警察权再配置的立法构想。  相似文献   
872.
公安机关的性质和任务决定了德育教育对公安院校学生的重要性.在公安院校英语教学中,对学生进行德育教育要注意引导学生学习西方文化,培养学生跨文化素质;增强学生责任意识,做学习的主人,对自己和社会负责,增强学生的责任感;运用多种教学法,培养学生团结合作的精神;根据英语教材,挖掘文章的思想内涵,加强德育渗透,结合所学内容全面提升学生的人文素养与道德品质,实现教书与育人的统一,从而达到提高学生德育素质之目的.  相似文献   
873.
Arab media is no longer limited to state-sponsored sources, opening a door of opportunity to the Muslim world. Islamic terrorist groups leverage information technology to form resilient, networked organizations that influence how many Muslims perceive events and U.S. political goals. This article looks at the connection between information technology and cultural transformation in the Middle East. It focuses on how information technology—as the major weapon system in the battle of ideas—has been used effectively by Islamic extremists and less so by the U.S. Important conclusions are drawn regarding the necessity of culturally-attuned uses of information technology.  相似文献   
874.
This research is geared toward theory building by alleviating some of the lacunae in three areas of study. First, it redefines what terrorism is by refocusing the definition away from politics and the mens rea of terror to its criminal actus reus. In this endeavor, it proposes a unifying definition that is viable for global assessment and under standing, while being conducive to international military and law enforcement cooperation. The definition is proposed to accommodate the international laws of reciprocity, community, and political framework, without compromising terrorism's criminal liabilities. Second, it defines what a religious terrorist is by using a convergence of psychometric measures from 356 suicide-bombers, taped self-immolations of 15 terrorists and 918 zealots, and triangulated anthologies. Among the outcomes of this mixed-method design is an empowering 32-trait profile of a religious terrorist that is ethno-religious specific and user friendly. Third, it introduces the concept of International Islamization Terrorism (IIT) and calls on future research to assess the propensity of IIT to global calamity, and the viability of a universal religious terrorist profile.  相似文献   
875.
Abstract

Increasingly, the modern world is ‘on speed’. Technology has, since the invention of the Gutenberg press, facilitated the ever more rapid, more widespread dispersal of information. The latest in the line of the mass information media, which runs from the book and newspaper through radio and television, is the Internet, a medium for which speed is measured in milliseconds, and for which the phrase ‘virtual reality’, or, more compact, ‘virtuality’, has thus been coined. Speed, however, relates not only to the dissemination of information, but also to its endurance: the quicker the medium, the more fleeting the presence of, and the more transitory one's encounter with a message. This brevity of encounter seems to some extent to run, phenomenologically, along with the range of the particular mass medium: the wider its reach, the quicker too the departure of its contents. In this sense, bigger is faster – though not necessarily with greater meaning, truth or integrity. Invasiveness and validity are not necessary corollaries. The power of the mass media lies in scope, rather than in depth. The existential impact this has on humans living in a world increasingly dominated by such mass media, has not passed by unnoticed. Some of the analyses are highlighted in this contribution, with some continued implications for living authentically in a media-ted world indicated.  相似文献   
876.
ABSTRACT

Internal marketing and internal communication collectively strive to build relationships with, empower, and motivate employees to foster an organisational culture of support for organisational goals and objectives to be met and organisational success achieved. Electronic newsletters support internal marketing and internal communication endeavours as they serve the purpose of transferring organisational information to employees. E-newsletters can be tested to determine whether employees willingly utilise them for their intended purposes. By means of a quantitative research approach, utilising regression to analyse the empirical data, a study was conducted to determine employees’ acceptance of e-newsletters. This was conducted by means of an adapted technology acceptance model (TAM), and a self-administered e-mail survey was disseminated to employees of a higher education institution. Based on the research results, employees perceive TAM differently to what is put forward in literature, which results in the acceptance of e-newsletters for the purpose of transferring organisational information. Results show that respondents perceived two of the factors of TAM as one factor. In addition, the results provide insight into how academic employees perceive e-newsletters and what practical changes can be made to e-newsletters in order to cater to employees’ preferences.  相似文献   
877.
878.
EU update     
This is the latest edition of the Bristows column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
879.
Privacy by Design is now enjoying widespread acceptance. The EU has recently expressly included it as one of the key principles in the revised data protection legal framework. But how does Privacy by design and data anonymisation work in practise? In this article the authors address this question from a practical point of view by analysing a case study on EU Financial Intelligence Units (“FIUs”) using the Ma3tch technology as additional feature to the existing exchange of information via FIU.NET decentralised computer network. They present, analyse, and evaluate Ma3tch technology from the perspective of personal data protection. The authors conclude that Ma3tch technology can be seen as a valuable example of Privacy by Design. It achieves data anonymisation and enhances data minimisation and data security, which are the fundamental elements of Privacy by Design. Therefore, it may not only improve the exchange of information among FIUs and allow for the data processing to be in line with applicable data protection requirements, but it may also substantially contribute to the protection of privacy of related data subjects. At the same time, the case study clearly shows that Privacy by Design needs to be supported and complemented by appropriate organisational and technical procedures to assure that the technology solutions devised to protect privacy would in fact do so.  相似文献   
880.
This study examines the role of sociodemographic factors and violence characteristics in influencing women's reporting behaviors and types of police intervention received in response to intimate partner violence (IPV) in Canada. A subset of female respondents to Canada's 1999 General Social Survey who experienced physical or sexual IPV by a male perpetrator and who had contact with the police as a result of the violence was used for this analysis (n = 383). Findings suggest significant racial, economic, and social variations in women's motivation for self-reporting violence to the police as well as in the types of law enforcement interventions administered by police in response to reports of IPV. Implications for policy development are examined.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号