首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4914篇
  免费   210篇
各国政治   133篇
工人农民   80篇
世界政治   100篇
外交国际关系   630篇
法律   865篇
中国共产党   71篇
中国政治   796篇
政治理论   325篇
综合类   2124篇
  2024年   14篇
  2023年   24篇
  2022年   47篇
  2021年   62篇
  2020年   125篇
  2019年   78篇
  2018年   117篇
  2017年   151篇
  2016年   115篇
  2015年   130篇
  2014年   340篇
  2013年   454篇
  2012年   266篇
  2011年   302篇
  2010年   294篇
  2009年   380篇
  2008年   330篇
  2007年   361篇
  2006年   323篇
  2005年   311篇
  2004年   313篇
  2003年   229篇
  2002年   161篇
  2001年   147篇
  2000年   36篇
  1999年   9篇
  1998年   3篇
  1997年   1篇
  1995年   1篇
排序方式: 共有5124条查询结果,搜索用时 15 毫秒
951.
This thematic analysis examines the applicability of Gustavo Correa's constructs of horizontal and vertical honour with regard to prestige as reflected in 21 statements by Osama Bin Laden (OBL) between 2002 and 2008. The relevance of Correa's theory pivots upon whether the individual is considered as the primary locus of honour, as Correa seemed to imply. There was limited support and substantial disconfirming evidence under this condition. Correa's theory appears more applicable to honour when the Ummah rather than OBL's person is considered as the primary locus of honour, with the individual's prestige a derivative of group membership. Under this condition, supported hypotheses derived from the theory include honour being rooted in divinity; vertical and horizontal aspects of honour being mutually constitutive; vertical honour being established with the creation of the Ummah through rank (insofar as the Ummah is presumed precedent above all non-Muslims), competition (including warfare) and functioning as an ideology hierarchically differentiating Muslims from non-Muslims; horizontal honour being gendered (with domination by non-Muslims situating the Ummah in a feminised position). A notable limitation of the theory is that it does not predict or account for the geospatial reification of group honour, whereby the establishment, defence, violation and exoneration of Islamic honour is discussed in terms of establishment, defence, invasion and forceful expulsion of non-Muslims from Islamic territory. Implications of honour are discussed with regard to the Islamist geospatial dichotomy of Islamic versus non-Islamic territories, efforts to encourage disengagement from terrorism and de-radicalisation within non-Islamic settings, legitimisation of complex phenomena such as jihad or suicide bombing according to frameworks of martyrdom and realistic efforts to win hearts and minds within the Islamic world.  相似文献   
952.
EU update     
This is the latest edition of the Bristows column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
953.
Privacy by Design is now enjoying widespread acceptance. The EU has recently expressly included it as one of the key principles in the revised data protection legal framework. But how does Privacy by design and data anonymisation work in practise? In this article the authors address this question from a practical point of view by analysing a case study on EU Financial Intelligence Units (“FIUs”) using the Ma3tch technology as additional feature to the existing exchange of information via FIU.NET decentralised computer network. They present, analyse, and evaluate Ma3tch technology from the perspective of personal data protection. The authors conclude that Ma3tch technology can be seen as a valuable example of Privacy by Design. It achieves data anonymisation and enhances data minimisation and data security, which are the fundamental elements of Privacy by Design. Therefore, it may not only improve the exchange of information among FIUs and allow for the data processing to be in line with applicable data protection requirements, but it may also substantially contribute to the protection of privacy of related data subjects. At the same time, the case study clearly shows that Privacy by Design needs to be supported and complemented by appropriate organisational and technical procedures to assure that the technology solutions devised to protect privacy would in fact do so.  相似文献   
954.
New technologies permit online businesses to reduce expenses and increase efficiency by, for example, storing information in “the cloud”, engaging in online tracking and targeted advertising, location and tracking technologies, and biometrics. However, the potential for technology to facilitate long term retention of customers' personal information raises concerns about the competing right of individuals to the privacy of their personal information. Although the European Commission has recently released a proposal for regulation to “provide a data subject with the right to be forgotten and to erasure”, neither the OECD Privacy Guidelines nor the APEC Privacy Framework includes any requirement to delete personal information. While New Zealand includes a “limited retention principle” in the Privacy Act 1993, apart from one limited exception the privacy principles cannot be enforced in court. Taking New Zealand privacy law as an example, this paper examines the issue of retention of customer data, explains why this is a serious problem and argues that although it could be addressed by appropriate amendments to domestic laws, domestic privacy legislation may not be sufficient in an online environment. In the same way as other areas of law, such as the intellectual property regime, have turned to global regulatory standards which reflect the international nature of their subject matter, international privacy regulation should be the next stage for the information privacy regime.  相似文献   
955.
网络流行语往往与社会重大公共事件相伴相生,折射出深刻的社会背景,一定程度地反映了我国社会转型期人们的心理状况,对网络舆论的走向起着推波助澜的作用。网络流行语具有触发性、速成性、反讽性、易煽动性和短暂性等特征,具有正负两方面的社会效应。公安机关作为代表国家行使公安职权和履行公安职责的国家机关,应积极关注网络流行语的动态,把握网络流行语的形成特点及产生发展规律,切实转变工作方式,畅通公众沟通渠道,坚持公平、公正、公开原则,正确引导网络舆论。  相似文献   
956.
加强公安机关执法规范化建设是践行"三项建设"的重要环节。目前我国公安机关在执法工作中仍存在着执法理念不正确、执法程序不规范、执法素质不高、执法监督不到位等问题。从比较法的视角,从执法理念、规章制度、警队管理、执法监督四个方面介绍我国香港地区警察规范化执法的基本状况,通过比较分析,为我国内地公安机关执法规范化建设的未来发展提供宝贵的经验借鉴。  相似文献   
957.
社会主义核心价值观明确了国家、社会、公民三个层面的价值目标、价值取向、价值准则,培育和弘扬社会主义核心价值观,关系国家长治久安和社会和谐稳定。网络信息时代,社会主义核心价值观与网络信息安全密切相关,从国家层面来看,网络信息安全是维护国家意识形态的技术保障,有助于巩固社会主义核心价值观的主导地位。从社会层面来看,网络信息安全是维护社会和谐稳定的有效路径,有助于发挥社会主义核心价值观的引领作用。从个体层面来看,网络信息安全是保障公民网络信息权利的基本前提,有助于扩大社会主义核心价值观的认同空间。  相似文献   
958.
近年来,我国渔船在毗邻朝韩海域进行越界捕捞活动成为了影响中朝、中韩海域安全稳定的焦点问题,也是困扰我边境管理工作的重难点问题。公安边防部门作为渔船民管理的主管部门,为有效地预防和制止越界捕捞活动,应针对边防管理工作中存在的问题,结合部队的实际情况,从根本上预防和制止越界捕捞行为,有力地维护毗邻朝韩海域的安全与稳定,促进毗邻朝韩海域海洋经济可持续发展。  相似文献   
959.
行政许可制度的改革,使行业治安管理工作出现一些新情况、新问题。如何执行好身份验证登记制度,是治安管理部门面临的一项课题。公民维权意识的增强,企业在市场经济中追求利益最大化,行业治安管理所依据的法律制度不健全,行政部门条块化管理的沟壑,以及当前警力紧张的压力等,使得治安管理部门在执行特种行业以及某些存在治安风险的行业身份验证登记制度中力不从心。当前应通过健全相关法律、创新管理方式,以推进制度的执行,扎实做好治安基础工作。  相似文献   
960.
新疆边境民族地区群众工作具有敏感性、军事性、复杂性、长远性等特点。公安边防部队在开展该地区群众工作时,应以确保国家安全和边境和谐稳定为基本目标,以加快该地区经济社会发展为重点,不断增强边境地区少数民族群众的政治认同和中华民族文化认同。正确执行党和国家的民族宗教政策,严格区分民族宗教领域两类不同性质的矛盾,通过在边境少数民族群众中开展宣传活动、扶贫帮困活动等多种途径做好公安边防部队群众工作。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号