首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   6418篇
  免费   643篇
各国政治   148篇
工人农民   64篇
世界政治   66篇
外交国际关系   455篇
法律   3164篇
中国共产党   57篇
中国政治   464篇
政治理论   742篇
综合类   1901篇
  2024年   2篇
  2023年   6篇
  2022年   25篇
  2021年   85篇
  2020年   138篇
  2019年   215篇
  2018年   194篇
  2017年   192篇
  2016年   215篇
  2015年   188篇
  2014年   337篇
  2013年   738篇
  2012年   500篇
  2011年   432篇
  2010年   388篇
  2009年   369篇
  2008年   445篇
  2007年   504篇
  2006年   531篇
  2005年   479篇
  2004年   450篇
  2003年   273篇
  2002年   183篇
  2001年   89篇
  2000年   68篇
  1999年   15篇
排序方式: 共有7061条查询结果,搜索用时 15 毫秒
861.
宅基地管理与物权法的适用限度   总被引:4,自引:0,他引:4  
桂华  贺雪峰 《法学研究》2014,36(4):26-46
对土地管理制度的既有讨论,通常是从宪法第10条出发,没有考虑宪法第6条对"生产资料的社会主义公有制"的规定,将"国家所有"与"集体所有"片面理解为民法所有权而忽视其所有制内涵。物权制度是所有制关系的法律反映,"生产资料的社会主义公有制"是超越新中国历部宪法和其它具体法律的基本宪法原则,运用物权规则完善宅基地管理制度,需以公有制为大前提。忽视公有制前提的物权化改革建议,陷入"私法‘宪法中立",的认识误区,加上对宅基地经济社会属性的误会,所提出的改革方案缺乏法理与现实依据。现有制度在实现社会财富公平分配、公共资源有效管理和农民权利保护等方面基本有效,下一步改革只需做局部调整而无需全盘重建。  相似文献   
862.
崔建远 《法学研究》2014,36(4):63-75
按照我国现行法,若在集体所有的土地上进行商业开发建设,不得由集体土地所有权人直接与用地者签订合同,设立集体建设用地使用权,而必须先将集体所有的土地征收为国有,而后由国土资源主管机关将国有建设用地使用权出让给用地者。对此制度实施改革之后,征收制度至少在其适用范围方面应当调整。集体建设用地用于商业目的的,不再适用征收制度;集体经济组织可以直接与用地者签订集体建设用地使用权出让合同,创设集体建设用地使用权。这会使得存在于集体土地上的他物权以及住宅、厂房、办公用房的所有权,在消灭途径及方式方面发生变化。用地者对集体土地所有权人应支付足额对价,对于因集体建设用地使用权出让而终止的土地承包经营权、有偿取得的宅基地使用权、原集体建设用地使用权,也要足额补偿。  相似文献   
863.
孙永军 《行政与法》2014,(10):102-107
诉讼事件的对立性、裁量性、公益性、迅速性、展望性等均可作为诉讼程序中适用非讼法理所考虑的标准.非讼法理在诉讼程序中适用的个别化、具体适用标准的流动化,实际上就承认了民事诉讼中程序保障的个别化和多样化.当事人的听审请求权保障就是非讼法理在诉讼程序中适用的限度.  相似文献   
864.
刑事诉讼的历史就是辩护权不断扩大的历史。辩护权发展的核心在于辩护人介入刑事诉讼程度的不断深入以及辩护权的不断完善。公安机关需要正确理解辩护律师在侦查阶段的辩护人法律地位及会见通信权、讯问在场权、调查取证权等诉讼权利。辩护律师在侦查阶段主要是帮助犯罪嫌疑人行使辩护权并监督制约侦查机关的活动,维护犯罪嫌疑人人权的重要作用。  相似文献   
865.
In two recent judgements, the Court of Justice of the European Union stated that ‘The right to the protection of personal data is not, however, an absolute right, but must be considered in relation to its function in society’ (Eifert, para 48). This paper considers the ‘non-absolute’ nature of the right to data protection. Being a relatively new right, the boundaries of this right in the Charter are still somewhat unexplored. This paper considers five aspects that can be seen as setting boundaries to the otherwise absolute nature of the right to data protection: (a) consideration of the function of the right to data protection in society; (b) positive delimitations of the right that come from the formulation of the right (Article 8) in the Charter; (c) limitations on the right provided for in Article 52 of the Charter; (d) close connections with Article 7 of the Charter and Article 8 ECHR; and (e) the detailed provisions in current data protection secondary legislation and the future data protection regulation framework. Based on the reflections on each of these boundary-setting aspects, the paper argues that in spite of occasional vagueness and conflicting approaches of each of the aspects, understanding of the right to data protection has evolved since its first formulation in the Charter. There is a subtle and gradual distancing from the initial understanding of the close relationship with the right to private and family life. This gradual distancing is a positive development as the two have different foundations, scope and purposes. Yet it is only when both are taken together that the shared common objective of providing effective protection to citizens' personal and family life can be achieved.  相似文献   
866.
867.
ROBERT AGNEW 《犯罪学》2014,52(1):1-32
Most leading crime theories and crime‐control policies are based on the assumption that people are self‐interested. But recent work in a variety of fields has challenged this assumption, suggesting that people are both self‐interested and socially concerned. Social concern involves biologically based inclinations that sometimes lead people to give more consideration to others than to their own interests. These inclinations include caring about others, forming close ties to and cooperating with others, following certain moral intuitions, and conforming. This article describes the nature of and evidence for social concern, as well as the ways in which social factors shape social concern. The article then presents a theory of social concern and crime. Social concern has direct, indirect, mediating, and conditioning effects on crime. Although social concern generally reduces the likelihood of crime, it has little effect on or increases crime under certain conditions.  相似文献   
868.
Does employment promote desistance from crime? Most perspectives assume that individuals who become employed are less likely to offend than those who do not. The critical issue has to do with the timing of employment transitions in the criminal trajectory. The turning point hypothesis expects reductions in offending after job entries, whereas the maturation perspective assumes desistance to have occurred ahead of successful transitions to legitimate work. Focusing on a sample of recidivist males who became employed during 2001–2006 (N = 783), smoothing spline regression techniques were used to model changes in criminal offending around the point of entry to stable employment. Consistent with the maturation perspective, the results showed that most offenders had desisted prior to the employment transition and that becoming employed was not associated with further reductions in criminal behavior. Consistent with the turning point hypothesis, we identified a subset of offenders who became employed during an active phase of the criminal career and experienced substantial reductions in criminal offending thereafter. However, this trajectory describes less than 2 percent of the sample. The patterns observed in this research suggest that transition to employment is best viewed as a consequence rather than as a cause of criminal desistance.  相似文献   
869.
To develop a cost‐effective technique for single‐nucleotide polymorphism (SNP) genotyping and improve the efficiency to analyze degraded DNA, we have established a novel multiplex system including 21‐locus autosomal SNPs and amelogenin locus, which was based on allele‐specific amplification (ASA) and universal reporter primers (URP). The target amplicons for each of the 21 SNPs arranged from 63 base pair (bp) to 192 bp. The system was tested in 539 samples from three ethnic groups (Han, Mongolian, and Zhuang population) in China, and the total power of discrimination (TPD) and cumulative probability of exclusion (CPE) were more than 0.99999999 and 0.98, respectively. The system was further validated with forensic samples and full profiles could be achieved from degraded DNA and 63 case‐type samples. In summary, the multiplex system offers an effective technique for individual identification of forensic samples and is much more efficient in the analysis of degraded DNA compared with standard STR typing.  相似文献   
870.
This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone‐actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone‐actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone‐actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone‐actor terrorists were socially isolated. Lone‐actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone‐actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号