首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   951篇
  免费   16篇
各国政治   124篇
工人农民   2篇
世界政治   43篇
外交国际关系   148篇
法律   144篇
中国共产党   15篇
中国政治   57篇
政治理论   174篇
综合类   260篇
  2023年   5篇
  2022年   13篇
  2021年   25篇
  2020年   37篇
  2019年   12篇
  2018年   10篇
  2017年   21篇
  2016年   23篇
  2015年   20篇
  2014年   42篇
  2013年   102篇
  2012年   50篇
  2011年   62篇
  2010年   55篇
  2009年   99篇
  2008年   68篇
  2007年   88篇
  2006年   64篇
  2005年   47篇
  2004年   43篇
  2003年   24篇
  2002年   29篇
  2001年   17篇
  2000年   9篇
  1999年   2篇
排序方式: 共有967条查询结果,搜索用时 15 毫秒
181.
Abstract

India's spectacular rise in recent years has been the source of hyperbolic theorising and speculation on its major power status. Middle power theory offers a set of dynamic analytical parameters which allow for re-evaluating India's global influence and identifying both strengths and weaknesses of its power projection and resources. Placing emphasis on themes of Third World leadership, good international citizenship, multilateral activism, bridge-building diplomacy, and coalition-building with like-minded states, the middle power concept can encapsulate key aspects of India's contemporary agency and account for structural dynamics which constitute a reformist world-view through the reconfiguration of the Indian state within the existing world order. Overall, middlepowermanship delineates fundamental continuities in India's foreign policy tradition, epitomises India's existing position in the neoliberal world order, while providing a good indication of the directions India will take on the global stage in the short and medium-term.  相似文献   
182.
As demonstrated by other papers on this issue, open-source intelligence (OSINT) by state authorities poses challenges for privacy protection and intellectual-property enforcement. A possible strategy to address these challenges is to adapt the design of OSINT tools to embed normative requirements, in particular legal requirements. The experience of the VIRTUOSO platform will be used to illustrate this strategy. Ideally, the technical development process of OSINT tools is combined with legal and ethical safeguards in such a way that the resulting products have a legally compliant design, are acceptable within society (social embedding), and at the same time meet in a sufficiently flexible way the varying requirements of different end-user groups. This paper uses the analytic framework of privacy design strategies (minimise, separate, aggregate, hide, inform, control, enforce, and demonstrate), arguing that two approaches for embedding legal compliance seem promising to explore in particular. One approach is the concept of revocable privacy with spread responsibility. The other approach uses a policy mark-up language to define Enterprise Privacy Policies, which determine appropriate data handling.  相似文献   
183.
Regionalization processes across Western Europe have triggered analyses of regional policy divergence. Yet, in a number of cases, regional governments appear to have deliberately strived to achieve policy conformity. Previous research tends to emphasize exogenous explanations of regional policy convergence. In contrast, this paper addresses the issue of regional policy convergence by focusing on endogenous explanatory factors. Its objective is to carry out an investigation of when, how, and with what effect a ‘desire for conformity’ arises, and contends that regional governments may actively cultivate policy similarity as a strategy to develop or secure their policy capacity. Specifically, the paper argues that the adoption of this strategy is contingent upon two requirements that may or may not be met, and that its outcome is the convergence on targeted dimensions of regional policies. The two requirements are: (i) a countrywide public preference for policy uniformity in the policy area of concern, and (ii) the presence of a threat posed to regional policy capacity by various political entrepreneurs, including the central state, who blame regions for providing divergent policies on particular dimensions. This paper is based on the comparison of two case studies where regional governments deliberately pursued policy conformity on targeted dimensions of their education policy: school-building policy in France and curricula policy in Germany. The two case studies also present dissimilar features that make it possible to investigate the effects of institutional setting and policy distribution on the adoption and operation of the active-cultivation-of-policy-similarity strategy.  相似文献   
184.
Abstract

Prompted by the rise of the emerging economies and the growing importance of the G20, the OECD has formally announced its intention of establishing itself as a key actor in global policy coordination. As part of this ambition, it has embarked on cultivating closer relations with five G20 countries it designated as key partners through the so-called “Enhanced Engagement” programme: Brazil, China, India, Indonesia and South Africa. This article mobilizes concepts from the policy transfer literature to explain why the OECD’s attempts to increasingly involve all five countries in its policy have fallen short of its original ambitions, and also why the transfer of its policy work has been uneven across policy and country issue.  相似文献   
185.
本文通过介绍我国开展药品再评价的法律依据,探讨制定我国《药品再评价管理办法》的必要性和急迫性,并 就有关实际工作中存在的问题提出了解决建议。  相似文献   
186.
This paper investigates whether computer forensic tools (CFTs) can extract complete and credible digital evidence from digital crime scenes in the presence of file system anti-forensic (AF) attacks. The study uses a well-established six stage forensic tool testing methodology based on black-box testing principles to carry out experiments that evaluate four leading CFTs for their potential to combat eleven different file system AF attacks. Results suggest that only a few AF attacks are identified by all the evaluated CFTs, while as most of the attacks considered by the study go unnoticed. These AF attacks exploit basic file system features, can be executed using simple tools, and even attack CFTs to accomplish their task. These results imply that evidences collected by CFTs in digital investigations are not complete and credible in the presence of AF attacks. The study suggests that practitioners and academicians should not absolutely rely on CFTs for evidence extraction from a digital crime scene, highlights the implications of doing so, and makes many recommendations in this regard. The study also points towards immediate and aggressive research efforts that are required in the area of computer forensics to address the pitfalls of CFTs.  相似文献   
187.
随着我国“一带一路”倡议和新西部大开发部署的推进,陕西省人才政策能否满足自身发展的需要值得研究。本文综合运用政策文本分析方法,对陕西省2008-2020年间颁布的101件省级人才政策文本特征属性进行量化分析。研究发现,陕西省级人才政策的文种类型多样、发文单位较广、年发文量呈波动变化。通过主题词分析,可将省级人才政策划分为初始、发展和巩固三个阶段,不同阶段的政策侧重点有差异。人才政策工具以环境型政策工具为主、供给型适中、需求型稍显不足。未来在完善政策体系的同时,提升人才政策执行的效果将更加有利于陕西省人才效益向经济效益转化。  相似文献   
188.
Social media have the potential to transform democracies as they allow for direct contact between representatives and represented. Politicians can use social media to show their policy positions but they can also give insight into their private lives. Based on survey experiments in Germany and Switzerland we show that social media messages about politicians’ private lives rather deter voters. Instead, we find that voters prefer candidates that communicate policy positions. The effect of a policy-oriented communication style on Twitter can even lead to appreciating a politician from a different party in Switzerland, which has an electoral system that gives a strong incentive to cultivate a personal vote.  相似文献   
189.
西方政策网络理论研究的最新进展及其评价   总被引:2,自引:0,他引:2  
近年来西方政策网络理论研究出现了三个明显趋势:1、理论研究上从新制度主义的视角探讨政策网络为什么产生、为什么改变和为什么能够持续的深层理论问题;2、实践问题上重点探讨了政策网络的管理问题,包括政府间网络的管理问题;3、重视政策网络与政策执行效果关系研究.  相似文献   
190.
This article explores the science-policy interactions between peer-reviewed literature and decisions and declarations on Land Use, Land-Use Change and Forestry (LULUCF) projects in the Clean Development Mechanism (CDM) taken at Conference of the Parties (COP) meetings. The results are based on a literature analysis capturing 88 articles published from 1997 to 2005. By using a matrix search method and a structured reading form, the method and analysis focussed on whether issues of CDM and LULUCF were presented as ‘supportive of the inclusion of LULUCF’ and ‘critical of the inclusion of LULUCF’. A matrix search method and a structured reading form were applied. Of the 88 articles, 66% included discussions supportive to the inclusion of LULUCF. Forty-nine percent had a first author affiliated in natural sciences. Only 19% had first authors affiliated in developing countries while the same number for contributing authors was 38%. The results show no clear connection between scientific literature and decisions and declarations, but indicate that policymakers set the research agenda by declarations, while researchers feed the process up until decisions are made.
Matilda PalmEmail:
  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号