首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   90篇
  免费   0篇
各国政治   13篇
工人农民   3篇
世界政治   17篇
外交国际关系   28篇
法律   9篇
中国政治   2篇
政治理论   14篇
综合类   4篇
  2023年   1篇
  2021年   1篇
  2020年   6篇
  2019年   8篇
  2018年   7篇
  2017年   6篇
  2016年   9篇
  2015年   3篇
  2014年   3篇
  2013年   21篇
  2012年   2篇
  2011年   3篇
  2010年   3篇
  2009年   4篇
  2008年   3篇
  2007年   2篇
  2005年   2篇
  2004年   4篇
  2000年   2篇
排序方式: 共有90条查询结果,搜索用时 15 毫秒
61.
Politicians suffer intrusive and aggressive behaviours from members of the public, often lone actors fixated on personal grievances. Few explorations of intrusive behaviours towards politicians have been published; their results are not directly comparable. We surveyed intrusive/aggressive behaviours towards UK members of parliament (MPs); our survey instrument was then administered to MPs at three other parliaments (Queensland, New Zealand, and Norway), providing a cross-national, four-site comparison. 239 MPs completed the UK survey. This 38% response rate produced prevalence rates remarkably similar to the other sites, New Zealand having an 84% response rate. 81% of UK MPs had experienced one or more of the 12 behaviours specified, the mean being five. 18% had been subject to attack/attempted attack, 42% to threats to harm and 22% to property damage. In 53% of respondents, experiences met definitions of stalking or harassment. This has implications for the provision of risk assessment and management.  相似文献   
62.
苏东剧变结束了二战以来的雅尔塔体制,也结束了冷战秩序。震荡之后,世界在经济和科技的发展带动之下,开启了真正意义的全球化大门,不再有两个阵营之间的固定壁垒,取而代之的是世界上的任何国际行为主体间都有了交流与合作的自由。国际社会体系的这种重大而深刻的变革对世界新秩序的形成造成了极大的冲击,各种力量重新调整彼此之间的关系,探索自身发挥影响所能达到的限度,寄希望于在新的世界秩序中占据有利地位。正是在这样一个格局转变的时刻,国家对于利益的追求方式也在做出新的选择。  相似文献   
63.
全球化时代对国际犯罪进行全球综合治理的思维范式和多边的冲突解决机制使反恐行动模式更加国际化。《制止核恐怖主义行为国际公约》的签署使防范当前核恐怖主义犯罪在界定核恐怖主义犯罪、完善打击恐怖主义的国际法律框架、有效防范核恐怖主义犯罪方面都将有进一步的发展。在此框架下,完全有必要对相关基础概念和特征进一步展开讨论,对我国防范核恐怖主义犯罪事业的经验进行总结,并提出新时期的完善建议,以期全面遏止非国家行为体核恐怖主义犯罪。  相似文献   
64.
One of the most contentious issues in the negotiations aimed at operationalizing the Kyoto Protocol was the treatment of sinks and, particularly, the eligibility of sinks projects in the Clean Development Mechanism (CDM). This paper attempts to analyse the politics underlying these negotiations, drawing on methods of process tracing, key informant interviews, negotiating texts and secondary literature. Tracing the sinks debate and highlighting key lessons about the nature of global environmental agreements and their institutional arrangements is the first step to recounting the history of the politics of one of the major contemporary international environmental debates. The paper shows that the Kyoto Protocol negotiations on sinks and CDM-sinks were multilaterally supported as a practical solution, but went ‘off track’ due to actors’ interests and tradeoffs. As regards future negotiations on forest sinks in developing countries under the framework of the UNFCCC, the paper argues that these are likely to be influenced by similar constraints, and also by the conservation and development agenda of its supporters; as well as the experience gathered on the CDM and the interests and concerns of developing countries. We broadly frame the paper within the literature on global environmental politics.
Emily BoydEmail:
  相似文献   
65.
This article discusses the complex motivations underlying local resistance to externally led post-war peacebuilding programmes. In examining the land distribution process in post-war Cambodia it proposes a five-part typology of motivations for the resistance that frequently appears in the context of international post-conflict peacebuilding processes. The article also argues that a single campaign of resistance is likely to involve multiple actors with multiple motivations.  相似文献   
66.
Already introduced to the academic and political debate some years ago, the concept of “security governance” still needs to be clarified. In particular, four main shortcomings need to be overcome to make the concept more useful for an assessment of current security dynamics: in the first place, attention has been devoted more to “governance” than to “security”, while failing to consider the role of the understandings and perceptions of the actors involved in the governance system. Second, the literature on the actors (governmental or not) involved is still fragmented. Third, the literature on security governance has too often been detached from reflections on regionalism, while it would be useful to further explore the relationship between cognitive definitions of regional and security dynamics. Fourth, the literature has predominantly focused on Europe and the transatlantic area, overlooking processes of “region-building” in security terms in other “unexpected” geographical spaces. After proposing avenues to overcome the current gaps in the literature, the Southern Caucasus is chosen as a case study to show the different instances of security governance emerging, thanks to definitions of the region in security terms that have involved regional and external actors, of a state and non-state nature.  相似文献   
67.
ABSTRACT

Based on one specially created corpus of U.S. cybersecurity-related laws, this study employs the corpus approach to examine the referent objects and securitizing actors in U.S. cybersecurity legislative discourse, which are two critical issues in constructing security, including cybersecurity. Through corpus data analysis, it is found that unlike traditional security, cybersecurity has become more people-oriented in terms of referent objects with critical infrastructure as a key referent object. Additionally, the role of private sectors and cooperative security are highlighted in U.S. cybersecurity legislative discourse. From a sociosemiotic perspective, it is noted that the meaning-making process of U.S. cybersecurity not only is conveyed by the texts but also interacts with other sign systems, such as historical background, cyberspace as a virtual realm and social contexts, which suggests that the specific meanings of signs constructing cybersecurity and cybersecurity itself should be interpreted in specific temporal or spatial contexts. Furthermore, a sociosemiotic approach to U.S. cybersecurity legislative discourse also offers valuable insights to how signs and concepts in cybersecurity contribute to sketching a holistic landscape of cybersecurity and further security on a large scale.  相似文献   
68.
网络攻击往往由非国家行为体发起,实践中亦罕见有国家主动承认对网络攻击负责的实例。相应地,由于网络攻击的溯源存在技术、政治和法律方面的难题,受害国很难在传统自卫权的框架下对来自他国的网络攻击行使自卫权。非国家行为体尚不能构成传统武力攻击情境下的自卫权行使对象,更不宜成为网络空间自卫权的行使对象。作为替代,近年来将"不能够或不愿意"理论适用于网络空间自卫权的主张"甚嚣尘上"。"不能够或不愿意"理论表面上具有一定的正当性,但从既有国家归因标准和常规的自卫必要性的角度来看,该理论本质上缺乏实然法层面的法律依据,而且在适用时将面临一系列的法律不确定性。中国在参与网络空间国际造法的进程中,应当警惕将非国家行为体作为网络空间自卫权行使对象的主张,并应努力防止"不能够或不愿意"理论的引入和滥用,以遏制网络空间的军事化。  相似文献   
69.
Despite the continuous risk posed by transnational militancy to Chinese interests in Pakistan, China and Pakistan have improved their cooperation on matters of security and economy in recent years. While transnational militancy in a state dyad is known to increase the potential for conflict, it may also spur interstate cooperation on counter-militancy operations under certain conditions. This article examines the sources of the increase in Sino-Pakistani cooperation in fighting transnational militancy. Pakistan was in the early 2000s the country where the Chinese experienced most militant attacks resulting in the cancellation of Chinese projects in Pakistan despite the dyad’s professed all-weather friendship. More than a decade later, the Chinese are back with a prospected $62 billion in investments in the China–Pakistan economic corridor (CPEC). This overarching incentive has altered the challenge of transnational militancy to their mutual relations from a mostly negative, to a more constructive one requiring costly cooperation. In a quest to secure a continuing relationship in a hazardous landscape, the state dyad is attempting to roll out a concerted security strategy involving the army, navy, paramilitary forces and private security companies. A mix of domestic policies of both states, their foreign policies and the nature of threat posed by the militants facilitates this cooperation.  相似文献   
70.
According to the theory of instrumental actualization in mediated conflicts, the mass media tend to exaggerate events consistent with the editorial line. This theory was tested using press coverage in Germany, Switzerland, France, and the United Kingdom on the Japanese seaquake, the tsunami it caused, and the nuclear disaster of Fukushima. Within a period of seven weeks after the seaquake, the coverage in the four countries in 27 national newspapers and magazines on the three events was analyzed. As hypothesized from theory, German and Swiss media concentrated on Fukushima and stressed its relevance to domestic nuclear plants, whereas French and British media placed a greater emphasis on the tsunami and rarely related the nuclear catastrophe in Japan to domestic nuclear programs. In addition, there were remarkable correlations between the views of journalists and the bias of statements on nuclear energy presented in their news sections. Findings are discussed and related to the theory of public opinion and political decisions in liberal democracies.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号