首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   582篇
  免费   12篇
各国政治   22篇
工人农民   11篇
世界政治   28篇
外交国际关系   62篇
法律   95篇
中国共产党   7篇
中国政治   33篇
政治理论   73篇
综合类   263篇
  2024年   2篇
  2023年   5篇
  2022年   7篇
  2021年   8篇
  2020年   17篇
  2019年   13篇
  2018年   18篇
  2017年   15篇
  2016年   3篇
  2015年   6篇
  2014年   31篇
  2013年   81篇
  2012年   41篇
  2011年   47篇
  2010年   43篇
  2009年   60篇
  2008年   41篇
  2007年   36篇
  2006年   38篇
  2005年   26篇
  2004年   14篇
  2003年   19篇
  2002年   13篇
  2001年   7篇
  2000年   3篇
排序方式: 共有594条查询结果,搜索用时 15 毫秒
231.
西方的社区警务理论是经过三次大的警务革命总结经验教训之后才形成和发展起来的。上世纪70年代之后,它已成为国际警务的大趋势。目前,我国正处于社会变革、经济转型时期,社会基层基础治安出现了许多新情况、新问题。当前我国的社区治安管理工作应该在借鉴西方社区誓务成熟的管理模式基础上构建具有自己特色的社区治安防控体系。  相似文献   
232.
The beginning of the 21st century saw the beginning of substantial debate on “open access” to the Internet and the related concept of “network neutrality”. This paper is a short introduction to some of the complexities of the debate, focussing on the difficulties of attempting to regulate rapidly developing technologies, as well as particular issues of price and market regulation in Australia. Generally, network neutrality advocates believe that without regulation, telecommunications companies will use their control over “last mile” infrastructure to engage in discriminatory and anti-competitive practices against content providers. Opponents argue that this concern is illusory, and regulatory restrictions requiring neutrality will in their turn restrict innovation by network providers. In Australia, most discussion has focussed on price and market regulation. However, many Australian opponents of network neutrality say that it is an American problem, irrelevant to Australia, because of different pricing models for the Australian broadband market.  相似文献   
233.
中国互联网络信息中心(CNNIC)一直致力于互联网发展的调查和研究,每年两次的互联网统计报告全面、系统、客观、真实地展现了互联网的发展现状、网民的行为和习惯以及互联网发展的趋势,为我们开展互联网管理工作提供了有效的依据。因此,公安机关解读这个报告,能使我们对互联网有一个清晰的了解,寻找工作结合点和着力点,对作出准确的判断和科学的决策具有深刻意义。  相似文献   
234.
Using social network analysis (SNA), we propose a model for targeting criminal networks. The model we present here is a revised version of our existing model (Schwartz and Rouselle in IALEIA Journal, 18(1):18–14, 2008), which itself builds on Steve Borgatti’s SNA-based key player approach. Whereas Borgatti’s approach focuses solely on actors’ network positions, our model also incorporates the relative strength or potency of actors, as well as the strength of the relationships binding network actors.
Tony (D.A.) Rouselle
  相似文献   
235.
网络对青少年社会化的影响有利有弊。一方面,起到了增强社会化的自主性、促进知识技能的学习、拓宽人际互动的范围和提供广阔的虚拟角色演绎空间等积极作用;另一方面,造成了社会化的缺陷、道德社会化的偏离、人生价值观的冲击以及自我角色的失调等负面影响。应该加强网络的管理,加强青少年健康上网的引导和社会化方面的教育,促进青少年健康地社会化。  相似文献   
236.
The 1980 Hague Convention on the Civil Aspects of International Child Abduction (“the Convention”) provides for the prompt return to the country of habitual residence of children taken by a parent from one country to another. It was created to address the threshold problem in such cases, that is, which court should determine the rights of the parties involved. In a case under the Convention, the court's concern is which country is the country of habitual residence and practical aspects of the return to ensure the safety of the child and the taking parent. This article will discuss the formation of the International Hague Network of Judges (IHNJ), why it is crucial in the advancement of the Convention's goals, and, specifically, what it does to educate judges and facilitate communication between judges, and how the IHNJ can facilitate the return, including providing information on services, procedures, and protections offered in the countries of return.  相似文献   
237.
从社会网络的视角来看,凭祥归侨的社会适应策略可以分为嵌入、建构和调试三种。其在生产、生活和心理上的社会适应充分利用了其所拥有的社会网络。在这一过程中,丰富的社会资本和中越边境文化同源是归侨适应凭祥社会的有利条件,而他者身份、个体力量薄弱、原有优势衰退是其在社会适应中的主要困难。  相似文献   
238.
Breaches of security, a.k.a. security and data breaches, are on the rise, one of the reasons being the well-known lack of incentives to secure services and their underlying technologies, such as cloud computing. In this article, I question whether the patchwork of six EU instruments addressing breaches is helping to prevent or mitigate breaches as intended. At a lower level of abstraction, the question concerns appraising the success of each instrument separately. At a higher level of abstraction, since all laws converge on the objective of network and information security – one of the three pillars of the EU cyber security policy – the question is whether the legal ‘patchwork’ is helping to ‘patch’ the underlying insecurity of network and information systems thus contributing to cyber security. To answer the research question, I look at the regulatory framework as a whole, from the perspective of network and information security and consequently I use the expression cyber security breaches. I appraise the regulatory patchwork by using the three goals of notification identified by the European Commission as a benchmark, enriched by policy documents, legal analysis, and academic literature on breaches legislation, and I elaborate my analysis by reasoning on the case of cloud computing. The analysis, which is frustrated by the lack of adequate data, shows that the regulatory framework on cyber security breaches may be failing to provide the necessary level of mutual learning on the functioning of security measures, awareness of both regulatory authorities and the public on how entities fare in protecting data (and the related network and information systems), and enforcing self-improvement of entities dealing with information and services. I conclude with some recommendations addressing the causes, rather than the symptoms, of network and information systems insecurity.  相似文献   
239.
Chinese officials are increasingly turning to a policy known as Informatisation, connecting industry online, to utilise technology to improve efficiency and tackle economic developmental problems in China. However, various recent laws have made foreign technology firms uneasy about perceptions of Rule of Law in China. Will these new laws, under China's stated policy of “Network Sovereignty” (“网络主权” “wangluo zhuquan”) affect China's ability to attract foreign technology firms, talent and importantly technology transfers? Will they slow China's technology and Smart City drive? This paper focuses on the question of whether international fears of China's new Cyber Security Law are justified. In Parts I and II, the paper analyses why China needs a cyber security regime. In Parts III and IV it examines the law itself.  相似文献   
240.
基于BP神经网络模型对上海土地需求的量化研究   总被引:9,自引:0,他引:9  
在根据上海产业政策和区域经济发展对用地需求分析的基础上,通过对土地需求、土地储备与土地供应的关联分析,建立基于BP神经网络预测模型,研究上海经营性用地需求趋势的分析和对具体指标的细化分析,进一步得出土地需求总量,提出至2010年上海经济发展对土地需求的预测分析,以合理确定土地储备量。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号