首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6186篇
  免费   182篇
各国政治   81篇
工人农民   238篇
世界政治   207篇
外交国际关系   162篇
法律   1270篇
中国共产党   257篇
中国政治   1128篇
政治理论   739篇
综合类   2286篇
  2024年   4篇
  2023年   23篇
  2022年   44篇
  2021年   54篇
  2020年   157篇
  2019年   76篇
  2018年   105篇
  2017年   88篇
  2016年   99篇
  2015年   102篇
  2014年   334篇
  2013年   621篇
  2012年   514篇
  2011年   504篇
  2010年   418篇
  2009年   382篇
  2008年   412篇
  2007年   411篇
  2006年   418篇
  2005年   356篇
  2004年   381篇
  2003年   315篇
  2002年   246篇
  2001年   191篇
  2000年   82篇
  1999年   23篇
  1998年   2篇
  1997年   1篇
  1996年   1篇
  1994年   2篇
  1993年   1篇
  1987年   1篇
排序方式: 共有6368条查询结果,搜索用时 31 毫秒
991.
京瓷公司阿米巴经营取得了极大的成功,其原因在于构建了独特的组织形式与运行机制,即在阿米巴的组织基础上,通过核算机制引入了市场价格,再利用其独特的权威机制来克服企业内部价格机制的不足。这样,使得企业的外部激励内部化,低能激励高能化,从而提高了企业对市场的反应速度与企业的竞争力。我们称这种引入市场机制的企业为市场型企业,但我们也发现,随着企业的增大,企业内部的价格机制就越难以发挥作用,故阿米巴经营也有它的局限性。  相似文献   
992.
Sexual violence is an insidious and pervasive problem that insinuates itself into all aspects of contemporary society. It can neither be mitigated nor adequately controlled through current socio-legal practices. A more promising approach must embrace four integrated elements: (1) public policy, (2) primary prevention, (3) statutory management, and (3) secondary intervention. In the present paper we tackle the 3rd and 4th elements by proposing an integrated model for reducing and managing sexual violence among known sex offenders. Relying on the highly effective Risk-Need-Responsivity (RNR) model as the core of our Sex Offender Risk Mitigation and Management Model (SORM3), we draw together evidence based practices from clinical interventions and risk assessment strategies. Developed by Andrews & Bonta (2006), RNR has a strong empirical track record of efficacy when applied to diverse samples of offenders, including sex offenders (Hanson, Bourgon, Helmus, & Hodgson, 2009). We offer a detailed structural model that seeks to provide a more seamless integration of risk assessment with management and discretionary decisions, including a primary focus on RNR-based post-release aftercare. We end with the mantra that sex offender treatment alone will never effectively mitigate sexual violence in society, since the problem is not confined to the handful of offenders who spend time in prison and are offered some limited exposure to treatment. Any truly effective model must go well beyond the management of those known to be violent and embrace a comprehensive and integrated approach that begins by recognizing the seeds of sexual violence sown by society. Such a public health paradigm places victims - not offenders - at the center, forcing society to come to address the full gamut of hazards that fuel sexual violence.  相似文献   
993.
The identity card for foreign nationals - now known as the Biometric Residence Permit (BRP) - was first introduced in November 2008. Following the May 2010 UK general election, the newly formed Conservative-Liberal Democrat Coalition government announced that the scheme would not be extended to UK citizens. To date, over 300,000 BRPs have been issued to UK foreign nationals - a group of non-EEA migrants that include international students, visiting scholars and entrepreneurs. In this paper, we draw on findings from interviews conducted with policymakers, advocacy groups, Higher Education administrators and foreign nationals - between March and December 2010 - to highlight some policy issues arising from the continued roll-out of the BRPs to this migrant group. We conclude by arguing that, although interviewees raised few objections to the BRPs in principle, cardholders were concerned about being unfairly ‘targeted’ for additional surveillance and remained unclear about the true purpose of the BRP. We identify a number of areas for further policy development.  相似文献   
994.
我国已经进入了风险社会,公共管理领域必须对此作出回应,民商事审判领域面对的矛盾纠纷,来自社会层面的风险与民商事审判本身的自有风险还可能叠加激化,出现激烈爆发的危险境地。民商事审判作为创新社会管理的手段,为阻却风险到危险的发展进路,应该植入先进的风险管理理念,建构前置风险评估、风险提示、风险预防、风险化解与应对的流畅风险管理体系。  相似文献   
995.
网络产业中的市场支配地位受到不同于传统产业的一系列因素的影响,诸如网络效应、产品兼容、用户锁定、知识产权以及技术标准等都在网络产业市场支配地位的形成与维护中扮演重要角色。与之相适应,网络产业中的市场支配地位认定也面临一系列新问题:相关地区市场的界定在网络产业中变得更加复杂,传统的"假定垄断者测试法"面临质疑与挑战;市场份额对垄断力的影响在网络产业中相对减小,其计算方法与数值功能在网络产业中需要重新调整与评估;市场进入壁垒对垄断力的影响在网络产业中相对提升,传统壁垒减弱而新型壁垒增强。而将纯粹网络市场与混合市场予以区分、对"盈利模式测试法"、"产品性能测试法"、"销售方式测试法"等的尝试以及对由网络效应及其作用下的用户锁定、知识产权、技术标准等因素引发的新型市场进入壁垒的关注,则为解决这些新问题提供了具有建设性意义的新思路。  相似文献   
996.
城市街道管理体制的改革与实践是城市基层政府治理和社会管理创新的重要举措.面对街道管理法律定位不明确、职能超载、职权有限、自身管理失灵等问题,广州市荔湾区政府以"一队伍三中心"为载体,重建街道办事处管理架构,规范编外人员管理,推进政府购买服务和网格化管理,进一步明确了区、街道、居委会等治理主体的责权,积累了宝贵的经验.但街道办事处在职能转变、改革的法律依据、公共服务供给、管理机制及社区自我治理等方面仍存在着诸多问题,需进一步并加以解决.  相似文献   
997.
随着知识化、信息化、网络化时代的到来,学术刊物的内容也在不断更新,特别是面对反映社会热点、焦点问题的学术论文,学报编辑必须时刻关注国家政策,把握时代脉搏,紧跟时代步伐,力争以新的理念、新的视角认识问题,分析问题,以期提升个人素质,提高学报质量。  相似文献   
998.
李健男 《时代法学》2011,9(6):90-100
资产证券化本身并非次贷危机的根源,我国应该继续推进资产证券化的进程。不过,次贷危机充分暴露了美国资产证券化信息披露的制度性缺陷:信息披露制度的长期缺失以及信息披露豁免滥用的可能性。对此,《多德一弗兰克华尔街改革和个人消费者保护法案》进行了校正。应该结合美国的经验教训以及我国的实践。对我国资产证券化信息披露制度进行重构。  相似文献   
999.
刘菲 《北方法学》2011,5(6):96-103
在民事诉讼中,民事争议与行政争议交叉处理问题实质上是行政行为对民事审判的拘束效力问题。通过分析其成因及借鉴域外之经验,可以找到解决这一问题的思路:首先要判断该行政行为是否构成"先决问题",即行政行为是否具有先决性,是否是尚未发生形式确定力的非无效行政行为。在构成"先决问题"的前提下,以行政行为对私法关系的作用效果为依据确定民事审判权的审查限度,即对确认性行政行为、形成性行政行为、裁决性行政行为分别适用民事先行、先行后民、行政附带的司法审查机制。  相似文献   
1000.
MS Office documents could be illegally copied by offenders, and forensic investigators still face great difficulty in investigating and tracking the source of these illegal copies. This paper mainly proposes a forensic method based on the unique value of the revision identifier (RI) to determine the source of suspicious electronic documents. This method applies to electronic documents which use Office Open XML (OOXML) format, such as MS Office 2007, Mac Office 2008 and MS Office 2010. According to the uniqueness of the RI extracted from documents, forensic investigators can determine whether the suspicious document and another document are from the same source. Experiments demonstrate that, for a copy of an electronic document, even if all the original characters are deleted or formatted by attackers, forensic examiners can determine that the copy and the original document are from the same source through detecting the RI values. Additionally, the same holds true if attackers just copy some characters from the original document to a newly created document. As long as there is one character left whose original format has not been cleared, forensic examiners can determine that the two documents are from the same source using the same method. This paper also presents methods for OOXML format files to detect the time information and creator information, which can be used to determine who the real copyright holder is when a copyright dispute occurs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号