全文获取类型
收费全文 | 405篇 |
免费 | 19篇 |
专业分类
各国政治 | 5篇 |
工人农民 | 8篇 |
世界政治 | 10篇 |
外交国际关系 | 33篇 |
法律 | 202篇 |
中国共产党 | 1篇 |
中国政治 | 50篇 |
政治理论 | 22篇 |
综合类 | 93篇 |
出版年
2024年 | 3篇 |
2023年 | 7篇 |
2022年 | 4篇 |
2021年 | 7篇 |
2020年 | 13篇 |
2019年 | 8篇 |
2018年 | 17篇 |
2017年 | 17篇 |
2016年 | 14篇 |
2015年 | 16篇 |
2014年 | 44篇 |
2013年 | 44篇 |
2012年 | 47篇 |
2011年 | 23篇 |
2010年 | 29篇 |
2009年 | 21篇 |
2008年 | 19篇 |
2007年 | 16篇 |
2006年 | 8篇 |
2005年 | 22篇 |
2004年 | 12篇 |
2003年 | 10篇 |
2002年 | 4篇 |
2001年 | 6篇 |
1999年 | 4篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1995年 | 2篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1985年 | 2篇 |
排序方式: 共有424条查询结果,搜索用时 15 毫秒
111.
何茂鑫 《贵州警官职业学院学报》2010,22(2):91-95
随着网络视频技术的迅速普及与广泛应用,网络视频显示出传统广播电视无可比拟的传播优势,并逐渐形成了与传统广播电视分庭抗礼的态势。然而,网络视频行业在发展过程中逐渐凸显的一系列网络传播权方面的法律问题亟待厘清并加以解决。同时,我国著作权法中规定的"信息网络传播权"也存有缺陷,有必要加以修订从而重新构建我国的网络传播权保护制度。 相似文献
112.
樊有辉 《新疆警官高等专科学校学报》2013,(3):3-9
"东突"民族分裂主义与暴力恐怖主义滋生与蔓延的成因极其复杂。"双泛"思潮在新疆的传播和蔓延为滋生"东突"民族分裂主义提供了思想理论基础和精神支柱;宗教极端主义思想的不断传入,与"东突"民族分裂势力合流,使其转变为以民族分裂为目的的暴力恐怖势力;宗教管理的失控致使非法宗教活动猖獗,成为"东突"民族分裂与暴力恐怖分子不断滋生的土壤和温床;国际恐怖势力的积极扶持,使"东突"民族分裂势力迅速完成了由单纯的民族分裂势力向以民族分裂为目的的暴力恐怖势力的嬗变,并有恃无恐地从事分裂与恐怖活动;南疆部分地区相对贫困与能源资源十分丰富之间形成的巨大反差被"东突"分子所利用成为新时期滋生民族分裂恐怖分子的潜在诱因;现实政策的失误与"东突"分子的频出及分裂与暴力恐怖活动高发之间有着无形的联系。 相似文献
113.
Nicholas Corsaro Eleazer D. Hunt Natalie Kroovand Hipple Edmund F. McGarrell 《犯罪学与公共政策》2012,11(2):165-166
Research Summary Pulling levers policing draws upon the focused deterrence framework, which has shown considerable promise when directed at youth, gun, and gang offenders. However, much less is known about the viability of pulling levers when applied to different contexts as well as to diverse groups of offenders. We examine the High Point (North Carolina) Drug Market Intervention (DMI), the first site to use pulling levers as a place-based policing approach to disrupt a series of open-air drug markets across the city. Eleven years of longitudinal data are analyzed by using difference-in-difference panel regression analyses combined with finite mixture estimation as a means to test for divergence in violent crime patterns. Several key, although inconsistent, findings are presented. First, we found a statistically significant reduction in violent offenses in specific high-crime places (i.e., high-trajectory census blocks) located across the different targeted neighborhoods compared with the remainder of High Point, and relative to comparable nontargeted areas. Second, the citywide violent crime rate actually increased after a series of interventions unfolded, which may suggest limitations with the approach. Finally, trend analyses indicated the strategy had different levels of violent crime impact throughout unique geographic contexts. Policy Implications Rather than arresting every offender identified as having participated in illicit drug trafficking across various geographic contexts within the city, officials in High Point decided to invite low-risk drug offenders to community notification sessions in order to change their perceived risk of punishment as well as to mobilize community members across the different targeted neighborhoods. The suggestive evidence of potential, although limited, violent crime impact illustrates that this type of policing strategy may hold considerable promise. This interpretation gains credence when considered with prior evaluations of the DMI approach that illustrated the potential for reducing drug-related crime and in light of reports of improved police–community relations. The inconsistent findings across all locations and the overall city increase in violent crime toward the end of the study period, however, raise several concerns when interpreting study results. Additionally, our findings suggest that further replications should include systematic problem-identification, process measures, and more precise research designs. 相似文献
114.
Jon Hovi Ivar Areklett 《International Environmental Agreements: Politics, Law and Economics》2004,4(1):1-26
This article reviews basic insights about compliance and "hard" enforcement that can be derived from various non-cooperative
equilibrium concepts, and evaluates the Marrakesh Accords in light of these insights. Five different notions of equilibrium
are considered – the Nash equilibrium, the subgame perfect equilibrium, the renegotiation proof equilibrium, the coalition
proof equilibrium, and the perfect Bayesian equilibrium. These various types of equilibrium have a number of implications
for effective enforcement: (1) Consequences of non-compliance should be more than proportionate. (2) Punishment needs to take
place on the Pareto frontier, rather than by reversion to some suboptimal state. (3) An effective enforcement system must
be able to curb collective as well as individual incentives to cheat. (4) A fully transparent enforcement regime is not unconditionally
a good thing. It is concluded that constructing an effective system for "hard" enforcement of the Kyoto Protocol is a formidable
task that has only partially been accomplished by the Marrakesh Accords. In practice, however, the design of the compliance
system for the climate regime had to balance a desire to minimize non-compliance against other important goals, including
the need for due process. 相似文献
115.
Most research on violence has focused on males, but recent studies indicatethat females are also involved in violent crimes. Few studies, to date,have examined whether different or similar models explain male and femaleinvolvement in violent behavior. In the current research, we examine therelative contribution of social bond, self-control and social learningconcepts to the explanation of male and female violent offending. We alsoexplore the unique contribution of gang membership, school environment andprior victimization to these explanatory models. Using a multisite sampleof eighth-grade students, we find that results of a Chow test indicate theneed for separate theoretical models. Despite some similarities, differentfactors account for male and female rates of violent behavior. 相似文献
116.
我国高等院校学生接触的多是具体的学科知识和技能,很少获得系统的科学教育。网络视频教学节目在设计时可以从节目形式、选题、创作手法等几个方面实现科学精神的传播;同时引导大学生参与视频资源创作,培养他们理性怀疑、积极求证、多元思考、平权争论、宽容激励等科学意识,以潜移默化地将科学精神根植于学生心中。 相似文献
117.
Gemma Sou 《Third world quarterly》2018,39(3):510-526
This article critically analyses the representational practices of serious (video) games that focus on refugees. It argues that the technological form of serious games can simulate the historical, political and socio-economic factors that shape why refugees leave their home country and their experiences when travelling to host countries. They are able to mobilise intellectual agendas which challenge the de-contextualised representations of refugees typical in traditional media. As such, they challenge players to critically reflect on the complexities of refugee experiences and politics, thereby presenting a potential to move away from grand emotional discourses of pity and compassion. 相似文献
118.
Caitlin Ambrozik 《Democracy and Security》2018,14(1):45-67
Within the counterterrorism field, the concept of countering violent extremism (CVE) has emerged as a potential non-punitive solution to address the threat of radicalization. Practitioners and scholars have raised several concerns regarding CVE strategies including concerns about the CVE terminology. Using a survey experiment, this article responds to this concern by empirically analyzing the impact of CVE terminology on public support for CVE initiatives in the United States. Although many local communities have dropped the CVE terminology, the results suggest that a change in terminology at the national scale is unnecessary. 相似文献
119.
John Karlsrud 《Third world quarterly》2017,38(6):1215-1231
The United Nations (UN) peacekeeping operation in Mali (MINUSMA) has become among the deadliest in UN history, suffering from attacks by violent extremists and terrorists. There are strong calls to give UN peacekeeping operations more robust mandates and equip them with the necessary capabilities, guidelines and training to be able to take on limited stabilisation and counter-terrorism tasks. This article conceptually develops UN counter-terrorism operations as a heuristic device, and compares this with the mandate and practices of MINUSMA. It examines the related implications of this development, and concludes that while there may be good practical as well as short-term political reasons for moving in this direction, the shift towards UN counter-terrorism operations will undermine the UN’s international legitimacy, its role as an impartial conflict arbiter, and its tools in the peace and security toolbox more broadly, such as UN peacekeeping operations and special political missions. 相似文献
120.
As the closed-circuit television (CCTV) security industry transitioned from analog media to digital video recorders (DVRs) with digital storage, the law enforcement community struggled with the means with which to collect the recordings. New guidelines needed to be established to determine the collection method which would be efficient as well as provide the best quality evidence from live DVRs. A test design was developed to measure, quantify, and rank the quality of acquisition methods used on live systems from DVRs typically used in digital CCTV systems. The purpose was to determine guidelines for acquiring the best quality video for investigative purposes. A test pattern which provided multiple quantifiable metrics for comparison between the methods of acquisition was used. The methods of acquisition included direct data download of the proprietary file and open file format as well as recording the video playback from the DVR via the available display monitor connections including the composite video, Video Graphics Array (VGA), and high-definition multimedia interface (HDMI). While some acquisition methods may provide the best quality evidence, other methods of acquisition are not to be discounted depending on the situation and need for efficiency. As an investigator that needs to retrieve video evidence from live digital CCTV systems, the proprietary file format, overall, provides the best quality evidence. However, depending on the circumstance and as recording technology continues to evolve, options other than the proprietary file format may provide quality that is equal to or greater than the proprietary file format. 相似文献