全文获取类型
收费全文 | 4796篇 |
免费 | 73篇 |
专业分类
各国政治 | 34篇 |
工人农民 | 41篇 |
世界政治 | 43篇 |
外交国际关系 | 80篇 |
法律 | 1091篇 |
中国共产党 | 49篇 |
中国政治 | 1258篇 |
政治理论 | 281篇 |
综合类 | 1992篇 |
出版年
2024年 | 2篇 |
2023年 | 30篇 |
2022年 | 12篇 |
2021年 | 37篇 |
2020年 | 70篇 |
2019年 | 60篇 |
2018年 | 72篇 |
2017年 | 87篇 |
2016年 | 112篇 |
2015年 | 86篇 |
2014年 | 309篇 |
2013年 | 350篇 |
2012年 | 302篇 |
2011年 | 328篇 |
2010年 | 310篇 |
2009年 | 388篇 |
2008年 | 369篇 |
2007年 | 374篇 |
2006年 | 400篇 |
2005年 | 283篇 |
2004年 | 278篇 |
2003年 | 224篇 |
2002年 | 184篇 |
2001年 | 127篇 |
2000年 | 46篇 |
1999年 | 12篇 |
1998年 | 3篇 |
1995年 | 2篇 |
1994年 | 5篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1986年 | 1篇 |
排序方式: 共有4869条查询结果,搜索用时 62 毫秒
871.
在法治国家的背景下,政府的行政管理体制和管理职能不断发生变化,对作为典型行政权的警察权提出了新的要求,既有的警察权配置面临着各种问题和挑战,已经不能满足社会形势的发展需要。文章从对警察权的性质和既有配置规则的分析入手,提出了警察权再配置的立法构想。 相似文献
872.
董久玲 《辽宁公安司法管理干部学院学报》2013,(4):142-143
公安机关的性质和任务决定了德育教育对公安院校学生的重要性.在公安院校英语教学中,对学生进行德育教育要注意引导学生学习西方文化,培养学生跨文化素质;增强学生责任意识,做学习的主人,对自己和社会负责,增强学生的责任感;运用多种教学法,培养学生团结合作的精神;根据英语教材,挖掘文章的思想内涵,加强德育渗透,结合所学内容全面提升学生的人文素养与道德品质,实现教书与育人的统一,从而达到提高学生德育素质之目的. 相似文献
873.
Timothy D. Bailey 《Terrorism and Political Violence》2013,25(4):523-543
Arab media is no longer limited to state-sponsored sources, opening a door of opportunity to the Muslim world. Islamic terrorist groups leverage information technology to form resilient, networked organizations that influence how many Muslims perceive events and U.S. political goals. This article looks at the connection between information technology and cultural transformation in the Middle East. It focuses on how information technology—as the major weapon system in the battle of ideas—has been used effectively by Islamic extremists and less so by the U.S. Important conclusions are drawn regarding the necessity of culturally-attuned uses of information technology. 相似文献
874.
AYLA SCHBLEY 《冲突和恐怖主义研究》2013,36(2):105-134
This research is geared toward theory building by alleviating some of the lacunae in three areas of study. First, it redefines what terrorism is by refocusing the definition away from politics and the mens rea of terror to its criminal actus reus. In this endeavor, it proposes a unifying definition that is viable for global assessment and under standing, while being conducive to international military and law enforcement cooperation. The definition is proposed to accommodate the international laws of reciprocity, community, and political framework, without compromising terrorism's criminal liabilities. Second, it defines what a religious terrorist is by using a convergence of psychometric measures from 356 suicide-bombers, taped self-immolations of 15 terrorists and 918 zealots, and triangulated anthologies. Among the outcomes of this mixed-method design is an empowering 32-trait profile of a religious terrorist that is ethno-religious specific and user friendly. Third, it introduces the concept of International Islamization Terrorism (IIT) and calls on future research to assess the propensity of IIT to global calamity, and the viability of a universal religious terrorist profile. 相似文献
875.
Fleetingness and media-ted existence. From Kierkegaard on the newspaper to Broderick on the Internet
Christo Lombaard 《Communicatio》2013,39(1):17-29
Abstract Increasingly, the modern world is ‘on speed’. Technology has, since the invention of the Gutenberg press, facilitated the ever more rapid, more widespread dispersal of information. The latest in the line of the mass information media, which runs from the book and newspaper through radio and television, is the Internet, a medium for which speed is measured in milliseconds, and for which the phrase ‘virtual reality’, or, more compact, ‘virtuality’, has thus been coined. Speed, however, relates not only to the dissemination of information, but also to its endurance: the quicker the medium, the more fleeting the presence of, and the more transitory one's encounter with a message. This brevity of encounter seems to some extent to run, phenomenologically, along with the range of the particular mass medium: the wider its reach, the quicker too the departure of its contents. In this sense, bigger is faster – though not necessarily with greater meaning, truth or integrity. Invasiveness and validity are not necessary corollaries. The power of the mass media lies in scope, rather than in depth. The existential impact this has on humans living in a world increasingly dominated by such mass media, has not passed by unnoticed. Some of the analyses are highlighted in this contribution, with some continued implications for living authentically in a media-ted world indicated. 相似文献
876.
Carly Prinsloo 《Communicatio》2013,39(2):88-112
ABSTRACTInternal marketing and internal communication collectively strive to build relationships with, empower, and motivate employees to foster an organisational culture of support for organisational goals and objectives to be met and organisational success achieved. Electronic newsletters support internal marketing and internal communication endeavours as they serve the purpose of transferring organisational information to employees. E-newsletters can be tested to determine whether employees willingly utilise them for their intended purposes. By means of a quantitative research approach, utilising regression to analyse the empirical data, a study was conducted to determine employees’ acceptance of e-newsletters. This was conducted by means of an adapted technology acceptance model (TAM), and a self-administered e-mail survey was disseminated to employees of a higher education institution. Based on the research results, employees perceive TAM differently to what is put forward in literature, which results in the acceptance of e-newsletters for the purpose of transferring organisational information. Results show that respondents perceived two of the factors of TAM as one factor. In addition, the results provide insight into how academic employees perceive e-newsletters and what practical changes can be made to e-newsletters in order to cater to employees’ preferences. 相似文献
877.
878.
Scott AllardyceLibby Amos Nadine BleachPatricia Collis Claire DaviesTim Heaps Adam LavertyTom Ohta Sam TuxfordMark Watts Faye WeedonOsman Zafar 《Computer Law & Security Report》2013
This is the latest edition of the Bristows column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
879.
Privacy by Design is now enjoying widespread acceptance. The EU has recently expressly included it as one of the key principles in the revised data protection legal framework. But how does Privacy by design and data anonymisation work in practise? In this article the authors address this question from a practical point of view by analysing a case study on EU Financial Intelligence Units (“FIUs”) using the Ma3tch technology as additional feature to the existing exchange of information via FIU.NET decentralised computer network. They present, analyse, and evaluate Ma3tch technology from the perspective of personal data protection. The authors conclude that Ma3tch technology can be seen as a valuable example of Privacy by Design. It achieves data anonymisation and enhances data minimisation and data security, which are the fundamental elements of Privacy by Design. Therefore, it may not only improve the exchange of information among FIUs and allow for the data processing to be in line with applicable data protection requirements, but it may also substantially contribute to the protection of privacy of related data subjects. At the same time, the case study clearly shows that Privacy by Design needs to be supported and complemented by appropriate organisational and technical procedures to assure that the technology solutions devised to protect privacy would in fact do so. 相似文献
880.
This study examines the role of sociodemographic factors and violence characteristics in influencing women's reporting behaviors and types of police intervention received in response to intimate partner violence (IPV) in Canada. A subset of female respondents to Canada's 1999 General Social Survey who experienced physical or sexual IPV by a male perpetrator and who had contact with the police as a result of the violence was used for this analysis (n = 383). Findings suggest significant racial, economic, and social variations in women's motivation for self-reporting violence to the police as well as in the types of law enforcement interventions administered by police in response to reports of IPV. Implications for policy development are examined. 相似文献