首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   123篇
  免费   2篇
各国政治   7篇
工人农民   5篇
世界政治   5篇
外交国际关系   6篇
法律   38篇
中国共产党   7篇
中国政治   34篇
政治理论   4篇
综合类   19篇
  2023年   3篇
  2020年   3篇
  2019年   2篇
  2018年   6篇
  2017年   7篇
  2016年   2篇
  2015年   2篇
  2014年   5篇
  2013年   16篇
  2012年   9篇
  2011年   7篇
  2010年   8篇
  2009年   2篇
  2008年   4篇
  2007年   5篇
  2006年   5篇
  2005年   7篇
  2004年   3篇
  2003年   7篇
  2002年   9篇
  2001年   6篇
  2000年   7篇
排序方式: 共有125条查询结果,搜索用时 15 毫秒
31.
The topic of global trade has become central to debates on global justice and on duties to the global poor, two important concerns of contemporary political theory. However, the leading approaches fail to directly address the participants in trade and provide them with normative guidance for making choices in non-ideal circumstances. This paper contributes an account of individuals’ responsibilities for global problems in general, an account of individuals’ responsibilities as market actors, and an explanation of how these responsibilities coexist. The argument is developed through an extended case study of a consumer’s choice between conventional and fair trade coffee. My argument is that the coffee consumer’s choice requires consideration of two distinct responsibilities. First, she has responsibilities to help meet foreigners’ claims for assistance. Second, she has moral responsibilities to ensure that trades, such as between herself and a coffee farmer, are fair rather than exploitative.  相似文献   
32.
苗族传统文化的开发与利用研究   总被引:2,自引:0,他引:2  
开发与利用无论是保存还是发展苗族的传统文化都是值得探索的方式,文章探讨了有形的文化资源(包括苗族的服饰与工艺品、风味饮食、建筑等)与无形的文化资源(包括节日庆典、社会组织制度等)的特点和开发利用的一些问题,以期找到运用这些文化资源的有效和恰当的途径。  相似文献   
33.
在19世纪美国社会发展的过程中,尤为引人注目的是政府对西部的开发,美国的西部与我国西部面积相当,19世纪初尚是一片荒凉的地域,当时的美国还是世界上的弱国,然而,美国用不到一个世纪的时间完成西部的开发,改变了社会面貌,为美国发展成为经济强国奠定了基础,政府为开发西部所采取的出售土地、发展交通、鼓励移民等措施,对今天我国西部开发仍具有借鉴的意义。  相似文献   
34.
Legal context: Although traditional medicine constitutes a component part ofthe identity of the cultural communities concerned, this formof intangible cultural heritage is vulnerable in a globalizingworld where little place is left for the protection of beliefsystems. Key points: While much has been written on traditional knowledge and IPrights, less scholarly attention has focused on the culturaldimension of traditional medicine. Further, no solution hasbeen reached on the best way to ensure its protection. Thiscontribution attempts to establish a linkage between differentsectors of international law, addressing the complex interplaybetween traditional medicine, intended as a special form ofintangible cultural heritage, and international knowledge governance. While the TRIPS Agreement adopts only proprietary approachesto knowledge governance, it has been questioned whether, inthe case of pharmaceuticals, other non-proprietary approacheswould be preferable. Different approaches will be put forwardand the Draft Treaty on Medical Research and Development willbe considered. This would provide a better framework for safeguardingand diffusing traditional medicine. Practical significance: Protecting and promoting traditional medicine may help curingdiseases spread all over the world. Thus, beyond its culturalaspects, the practical importance of traditional medicine liesin its capacity to promote the right to health and human dignity.  相似文献   
35.
The post-attendee Uniform Resource Locator (URL) feature within the video conferencing application known as Zoom is often overlooked by digital forensic experts as a potential risk for malware transmission. However, with the ability to redirect webinar participants to any URL set by the host for the webinar, the post-attendee URL can be abused by bad actors to expose webinar participants to malicious websites or, in the worst-case scenario, force participants to download a file through the use of a direct download link URL. This study aims to showcase how this exploit can be replicated by creating an experimental environment involving four Windows 10 desktops running Zoom version 5.7.5 and creating a webinar with four user accounts acting as webinar participants and setting the post-attendee URL value to the URL of a website that contained a keylogger. In another trial, the same experimental environment was utilized, with the only difference being the post-attendee URL that was set to redirect webinar participants to a download link for a .jpg file. In both instances, every user account that joined the webinar via clicking on the invitation link that was emailed to each user account after registering for the webinar was redirected to the post-attendee URL regardless of their user account role. These results not only prove that the post-attendee URL can be exploited, but also provide insight as to how this type of attack can be prevented.  相似文献   
36.
Youth coerced into trafficking experience multiple forms of abuse, and are deprived of basic human rights associated with liberty and self-determination, all of which can adversely affect mental and psychological well-being (Ottisova et al., Behavioral Medicine, 44(3), 234-241.). This study uses a qualitative approach to exploring how judges use trauma-related information to make decisions about how to adjudicate cases involving minors who have been sexually trafficked. Additionally, the study identifies barriers to receiving data, the court resources needed to effectively respond, and potential remedies to address gaps in effective case management. The study uses data from 82 juvenile and family court judges from around the USA 27-item structured interview was used to determine the availability and utility of trauma services, needed resources, and solutions to overcome gaps in effective case adjudication. Themes emerged related to lack of access to and timing issues that limited the utility of reports, lack of congruency between recommendations and available resources and child and family resistance to disclosures. Solutions to overcome barriers are related to increased cross-disciplinary collaboration, awareness and responsiveness. Legal remedies such as Safe Harbor laws can only be realized if the systemic context is aligned and appropriately resourced toward responsiveness.  相似文献   
37.
This research takes an interest in the police's capacity to learn and adapt in an ongoing policy failure. Using the literature on organizational learning and adaptation, it investigates how the police combine exploration of new possibilities and exploitation of old certainties. This article delves into the Swedish police's adaptation to a wave of organized and aggravated robberies that in the years around 2005 seemed out of control. It argues that the Swedish police need to create organizational ambidexterity by implementing a mix of exploitation and exploration, as well as engaging societal actors external to the police when old practices run dry. This means that the law and order sector needs to refine their competences, utilize new ideas, and promote innovation from companies and other authorities for dealing with the tasks at hand. Furthermore, the organizational theory tool-box has proven that it has great potential for diagnosing current learning and adaptation efforts within the law and order sector, as they happen.  相似文献   
38.
《Global Crime》2013,14(1):22-41
Much has been written in the English-speaking world on the topic of sex trafficking, but little is known about what researchers elsewhere have produced on this topic. An exhaustive literature search was conducted to locate publications on this topic from Latin America. A total of 74 publications were located and put through a systematic content analysis. Four main discernible patterns were noticed: (1) the vast majority of the publications were produced by individuals affiliated with international or non-government organisations; (2) the production of trafficking-related literature sharply declined after 2007; (3) of the small number of studies involving empirical data, most were qualitative in nature; and (4) the literature was primarily focused on the sexual exploitation of children. The discourse on sex trafficking in Latin America appeared to be dominated by advocacy groups. There were few scholarly articles, suggesting limited attention from the academic community. Despite limited empirical data, many Spanish-speaking authors made claims on the nature and extent of sex trafficking, with articles citing one another as source of evidence. This review finds a great need for the involvement of the academic community and for dispassionate and empirically grounded research on sex trafficking.  相似文献   
39.
法学期刊是刊发法学学术论文,法律应用文章,交流学术观点的载体。本文通过对法学期刊的特点及种类的介绍,强调了要更好的、全面的利用法学期刊首先就要建立起高质量的馆藏期刊体系,其次要对法学期刊进行多途径、多层次的开发,使法学期刊为法学教育和法学研究提供全面的、系统的文献支持。  相似文献   
40.
Child sexual abuse images online (CSAIO) present new and daunting challenges for practitioners working in the field of child sexual abuse (CSA). Current understanding of the phenomenon is severely limited due to a lack of theoretical and empirical research in the area. This article reports findings from a study that examined practitioners’ experiences with, and views of, CSAIO. Participants differed in how they conceptualized what constituted online CSA images and held varying degrees of concern regarding the potential effects of CSAIO on the child. Some practitioners were uncertain about whether child victims of CSAIO experience particular effects different from or over and above those caused by conventional (non-Internet related) CSA. A key finding was that most practitioners did not have a clear understanding of CSAIO. This article includes recommendations for future research regarding the implications of technology in the field of CSA.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号