全文获取类型
收费全文 | 1251篇 |
免费 | 53篇 |
专业分类
各国政治 | 21篇 |
工人农民 | 33篇 |
世界政治 | 24篇 |
外交国际关系 | 68篇 |
法律 | 366篇 |
中国共产党 | 48篇 |
中国政治 | 226篇 |
政治理论 | 146篇 |
综合类 | 372篇 |
出版年
2024年 | 2篇 |
2023年 | 17篇 |
2022年 | 10篇 |
2021年 | 26篇 |
2020年 | 36篇 |
2019年 | 14篇 |
2018年 | 28篇 |
2017年 | 35篇 |
2016年 | 30篇 |
2015年 | 23篇 |
2014年 | 74篇 |
2013年 | 106篇 |
2012年 | 81篇 |
2011年 | 90篇 |
2010年 | 60篇 |
2009年 | 83篇 |
2008年 | 69篇 |
2007年 | 81篇 |
2006年 | 101篇 |
2005年 | 72篇 |
2004年 | 53篇 |
2003年 | 63篇 |
2002年 | 63篇 |
2001年 | 48篇 |
2000年 | 22篇 |
1999年 | 14篇 |
1998年 | 1篇 |
1995年 | 1篇 |
1994年 | 1篇 |
排序方式: 共有1304条查询结果,搜索用时 31 毫秒
201.
Nour-Mohammad Yaghoubi 《美中公共管理》2010,(5):41-46
Information technology (IT) has been able to facilitate the rural development through empowering and integrating the accessibility of the villagers (cottagers) to the available knowledge and information and the opportunities to different extents. The success of IT approach in rural development requires some initial efforts to prepare applying IT in order to achieve it. Awareness of IT-based rural development infrastructures and subsequently preparation of required infrastructures are one of the most important steps towards delivering the development program. Considering the importance of this subject, in this paper, we have tried to identify the IT-based rural development infrastructures, using the ideas of experts in IT and rural development across the Iran country. The data analysis of 171 respondents with T-student test showed that the factors of social-cultural, organizational-managerial, technical-telecommunication and legal-legitimate are the IT-based infrastructures of rural development. Successful provision of these elements depends on the existence of strategic alignment approach and focuses on the balanced maturity of the infrastructures. 相似文献
202.
科技是第一生产力,农业科技是农业生产力发展的重要推动因素。与俄罗斯远东地区开展农业科技交流与合作,充分利用、吸收俄罗斯的先进农业科技成果,推动科技成果产业化,有利于黑龙江省加速农业发展和农业科技进步,有利于提高农业科技自主创新能力,有利于增强农业竞争力。提升黑龙江省与俄远东地区的农业科技合作水平,必须建立完善的合作机制,具备充足的资金保障,以农业科技成果产业化为主导,加快复合型人才的培养。 相似文献
203.
204.
物流仿真在我国已逐渐显出其重要作用。我国物流发展水平和研究应用能力还不尽人意,物流企业或企业物流在面临物流工程项目投资新建或原有系统技术改造时,由于缺乏准确丰富的信息数据和必要的物流仿真系统决策支持,造成了企业物流项目建设投入的盲目性和资金流失。物流仿真借助计算机技术对物流系统进行真实模仿,通过仿真实验得到各种动态活动及过程瞬间仿效记录,进而验证物流工程项目建设的有效性、合理性和优化效果,因此物流仿真是有其重要意义的。本文着重介绍物流仿真的功能,几种常见的物流仿真软件的性能特点,同时结合Flexsim和RaLC(乐龙)两种国内外典型仿真软件,进行物流仿真软件的应用过程与仿真效果分析。 相似文献
205.
Andrew Kakabadse Nada K. Kakabadse Alexander Kouzmin Kalu N. Kalu 《Contemporary Politics》2010,16(3):279-299
Aimed at reinforcing the democratic values of freedom of speech and increased diversity in civic access to the means of communication, this paper examines the concept of democracy within an information and communication technology-mediated context. Discussion proceeds with an analysis of orthodox views adopted by Jefferson and the architects of the American Constitution. Building on the Jeffersonian tradition, a critique is presented of present-day, non-transparent constraints on the democratic values of freedom of speech, information access and the structural constrains mitigating unfettered public access to critical information and debate on fundamental social and political issues of the day. The proposed ‘custodiary’ model for the new Democratic Project is premised on the development of a constitutional framework which encourages information diversity and freedom of access and expression as a way of bringing back ‘discourse’ into democratic praxis. 相似文献
206.
Claire Abernathy Kevin M. Esterling Justin Freebourn Ryan Kennedy William Minozzi Michael A. Neblo Jonathan A. Solis 《Legislative Studies Quarterly》2019,44(4):617-646
Telephone town halls are an increasingly prevalent method for members of Congress (MCs) to communicate with constituents, even while garnering popular criticism for failing to facilitate engagement and accountability. Yet scholars have paid little attention to the events and their effects, and even less to how they might be improved. To remedy this problem, we report on a field experiment in which four MCs joined their constituents in telephone town halls. Overall, participation in an event improved constituents’ evaluations of the format in general, and of the MC in particular. Furthermore, we studied how these events might be improved by evaluating a reform—a single‐topic focus with predistributed briefing materials—designed to enhance deliberative interaction. This reform enhanced effects on opinions of the format without significantly altering effects on attitudes toward the MC. Our results suggest that telephone town halls hold promise for constituents, officeholders, and democratic practice. 相似文献
207.
208.
209.
Kit Burden 《Computer Law & Security Report》2017,33(1):112-118
This is the latest edition of the DLA Piper column on developments in EU law relating to IP, IT and telecommunications. This news article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links. 相似文献
210.
We employ a rational choice framework to understand the conditions under which sex traffickers allow their victims access to telecommunications devices while under their control. We posit that sex traffickers are rational actors who make calculated decisions regarding whether to allow their victims access to the Internet and cell phones. We hypothesize that sex traffickers allow younger victims and those they did not defraud in the recruitment process greater access to telecommunications devices because these decisions maximize their payoffs with minimal risk. However, we hypothesize that younger victims’ access to telecommunications devices is conditional on whether they have been defrauded in recruitment. In order to test these hypotheses, we deployed a survey to 115 victims of sex trafficking in the United States to learn about how they were recruited by their sex trafficker and the level of access they had to technology while under their sex trafficker's control. We find support for all of our hypotheses. The results have serious implications for criminal justice policy and practice. 相似文献