首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1448篇
  免费   38篇
各国政治   129篇
工人农民   14篇
世界政治   54篇
外交国际关系   184篇
法律   258篇
中国共产党   21篇
中国政治   111篇
政治理论   267篇
综合类   448篇
  2024年   1篇
  2023年   12篇
  2022年   14篇
  2021年   33篇
  2020年   49篇
  2019年   21篇
  2018年   27篇
  2017年   37篇
  2016年   32篇
  2015年   34篇
  2014年   73篇
  2013年   149篇
  2012年   91篇
  2011年   92篇
  2010年   76篇
  2009年   128篇
  2008年   107篇
  2007年   120篇
  2006年   100篇
  2005年   82篇
  2004年   75篇
  2003年   49篇
  2002年   42篇
  2001年   26篇
  2000年   10篇
  1999年   2篇
  1990年   1篇
  1987年   3篇
排序方式: 共有1486条查询结果,搜索用时 15 毫秒
271.
《Democracy and Security》2013,9(1-2):40-60
This article assesses European responses to the Arab uprisings and, in particular, the introduced change in the European Union policy toward its southern neighborhood. The presented analyses provide a profound scrutiny and assessment of the new version of the European Neighbourhood Policy, empirical evidence of persisting security considerations post-2011 in Euro–Arab relations, and a more elaborated vision of future Euro–Arab relations, attempting to balance between three considerations: security, democracy, and governance.  相似文献   
272.
朴槿惠在韩国总统竞选期间与胜选后多次指出,要改善对朝关系,既不继续大国家党李明博政府的强硬政策,也不采取民主党金大中政府与卢武铉政府的“阳光政策。’’,宣称要走“第三条道路”。本文首先分析另外“两条道路”,即“阳光政策”与李明博对朝政策之间的主要分歧。以此为背景,本文从影响朴槿惠对朝政策的因素入手,指出朴槿惠对朝政策“第三条道路”的出发点是要改变另外“两条道路”非“软”即“硬”的做法。总体方向上很可能是安全上继续保持强大威慑与高压态势,但在经济合作等层面释放更大善意与灵活性。在不降低李明博政府强硬政策“硬”的一面的同时,继承“阳光政策”“软”的一面,甚至会更软。最后部分也指出了在朝鲜第三次核试验后“第三条道路”的实施前景。  相似文献   
273.
Abstract

European leaders frequently vaunt the European Union's distinctiveness in adopting and pursuing a comprehensive approach to security. The EU's profile as an international actor is designed to span across all dimensions of security. As a result, its security policy portfolio involves a large number of institutional actors and policies that need to be coordinated. The ambition of the EU to provide security in a comprehensive manner raises challenges at the politico–strategic level, at the level of operational and policy planning and in day-to-day implementation. So far, the field is lacking an inclusive analytical framework for the analysis of providing security through a distinctively comprehensive civil–military, economic and political organisation. This article seeks to close this gap by providing suggestions for how the wide range of issues related to comprehensive security could be structured, and by framing the matter theoretically and with reference to existing conceptual work and empirical research.  相似文献   
274.
广西努力推进中越跨国经济合作区已经有几年时间了,但是遇到很多问题和困难,建设进展和效果远低于期望。其中的重要原因之一就是中越两国的跨境经济合作区政策的差异性,导致双方发展错位或者说发展不同步。因此,有必要比较两国的有关政策,通过克服这些差异,加快推进中越跨境经济合作区的步伐。  相似文献   
275.
新修订的《民事诉讼法》第55条将对污染环境行为提起诉讼这一内容正式纳入,为环境公益诉讼的提起提供了法律依据,但并未明确界定提起的主体。从检察机关参与环境公益诉讼的必要性及可行性入手,建立并完善检察机关参与环境公益诉讼的具体程序及检察机关自身机制,可为具体的实践操作提供参考。  相似文献   
276.
Europeans enthusiastically embraced the Arab Spring. However, the EU and its member states have lacked significant influence in a neighbouring region in turmoil. The EU has not devised new and more appropriate approaches towards the region, but rather relied on its traditional tools and frameworks. The Eurozone’s financial crisis and threat perceptions have quickly underminded the readiness of EU member states to contribute meaningfully to Arab transformations with money, market access and mobility. In addition, European support has not been equally welcomed across the region, and delays in terms of building empowered governments have prevented a quick impact. Moreover, the violent power struggles triggered by the Arab Spring have revealed the EU’s weakness with regard to effective conflict prevention and timely crisis management – and thus created an environment averse to democratic transformation and regional stabilisation.  相似文献   
277.
This article analyses the serious problem of corruption in India by examining its causes and the various anti-corruption measures employed by the government from the formation in 1941 of the first anti-corruption agency, the Delhi Special Police Establishment, which was expanded to form the Central Bureau of Investigation (CBI) in April 1963. India's ineffective anti-corruption strategy can be attributed to the lack of political will of its leaders and its unfavourable policy context, which has hindered the enforcement of the anti-corruption laws. The lack of political will in fighting corruption is manifested in the lowest per capita expenditure and least favourable staff-population ratio of the CBI when compared to those of its counterparts in Singapore, Hong Kong, South Korea and Thailand. To enhance the CBI's effectiveness, it should be removed from the jurisdiction of the police and be established as an independent agency dedicated solely to curbing corruption. The Constitution of India should also be amended to empower the CBI to investigate corruption cases at the state level without obtaining the consent of the chief minister of the state. In view of the lack of political will, this article concludes that curbing corruption in India remains an impossible dream in the foreseeable future.  相似文献   
278.
Abstract

India's spectacular rise in recent years has been the source of hyperbolic theorising and speculation on its major power status. Middle power theory offers a set of dynamic analytical parameters which allow for re-evaluating India's global influence and identifying both strengths and weaknesses of its power projection and resources. Placing emphasis on themes of Third World leadership, good international citizenship, multilateral activism, bridge-building diplomacy, and coalition-building with like-minded states, the middle power concept can encapsulate key aspects of India's contemporary agency and account for structural dynamics which constitute a reformist world-view through the reconfiguration of the Indian state within the existing world order. Overall, middlepowermanship delineates fundamental continuities in India's foreign policy tradition, epitomises India's existing position in the neoliberal world order, while providing a good indication of the directions India will take on the global stage in the short and medium-term.  相似文献   
279.
As demonstrated by other papers on this issue, open-source intelligence (OSINT) by state authorities poses challenges for privacy protection and intellectual-property enforcement. A possible strategy to address these challenges is to adapt the design of OSINT tools to embed normative requirements, in particular legal requirements. The experience of the VIRTUOSO platform will be used to illustrate this strategy. Ideally, the technical development process of OSINT tools is combined with legal and ethical safeguards in such a way that the resulting products have a legally compliant design, are acceptable within society (social embedding), and at the same time meet in a sufficiently flexible way the varying requirements of different end-user groups. This paper uses the analytic framework of privacy design strategies (minimise, separate, aggregate, hide, inform, control, enforce, and demonstrate), arguing that two approaches for embedding legal compliance seem promising to explore in particular. One approach is the concept of revocable privacy with spread responsibility. The other approach uses a policy mark-up language to define Enterprise Privacy Policies, which determine appropriate data handling.  相似文献   
280.
Privacy by Design is now enjoying widespread acceptance. The EU has recently expressly included it as one of the key principles in the revised data protection legal framework. But how does Privacy by design and data anonymisation work in practise? In this article the authors address this question from a practical point of view by analysing a case study on EU Financial Intelligence Units (“FIUs”) using the Ma3tch technology as additional feature to the existing exchange of information via FIU.NET decentralised computer network. They present, analyse, and evaluate Ma3tch technology from the perspective of personal data protection. The authors conclude that Ma3tch technology can be seen as a valuable example of Privacy by Design. It achieves data anonymisation and enhances data minimisation and data security, which are the fundamental elements of Privacy by Design. Therefore, it may not only improve the exchange of information among FIUs and allow for the data processing to be in line with applicable data protection requirements, but it may also substantially contribute to the protection of privacy of related data subjects. At the same time, the case study clearly shows that Privacy by Design needs to be supported and complemented by appropriate organisational and technical procedures to assure that the technology solutions devised to protect privacy would in fact do so.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号