首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   580篇
  免费   12篇
各国政治   22篇
工人农民   11篇
世界政治   28篇
外交国际关系   62篇
法律   94篇
中国共产党   7篇
中国政治   32篇
政治理论   73篇
综合类   263篇
  2024年   2篇
  2023年   5篇
  2022年   7篇
  2021年   8篇
  2020年   15篇
  2019年   13篇
  2018年   18篇
  2017年   15篇
  2016年   3篇
  2015年   6篇
  2014年   31篇
  2013年   81篇
  2012年   41篇
  2011年   47篇
  2010年   43篇
  2009年   60篇
  2008年   41篇
  2007年   36篇
  2006年   38篇
  2005年   26篇
  2004年   14篇
  2003年   19篇
  2002年   13篇
  2001年   7篇
  2000年   3篇
排序方式: 共有592条查询结果,搜索用时 468 毫秒
491.
网络服务合同是确立网络运营商与用户双方权利义务的协议,是用户行使及保护其虚拟财产权的重要依托。实务中由于网络服务合同缺乏完善的法律规范,导致其中存在大量不公平的争议条款,当法律纠纷出现时,严重不利于用户对其虚拟财产权的保护与行使。如何在法律上对网络服务合同进行规制以及在司法实践中如何认定部分争议类型条款的有效性将是保护网络虚拟财产的重中之重。正基于此,在分析网络服务合同与虚拟财产权保护的主要矛盾,探讨网络服务合同中部分争议类型条款之后,对网络服务合同的法律规范提出相关建议。  相似文献   
492.
从20世纪80年代至今,西方学者对公共治理理论的研究取得重大进步。理论研究涉及公共治理的研究背景、概念界定、核心理论、研究困境以及与传统公共行政、新公共管理理论的比较分析。国家空洞化的现实背景成为公共治理的研究起点,公共治理的内涵界定并不明晰,至今仍未形成一致的概念,网络管理理论则成为公共治理的核心观点。公共治理同时面临治理失效、民主责任的研究困境,与传统公共行政、新公共管理有着明显的区分,公共价值管理也成为公共治理研究的新视角。  相似文献   
493.
康伟 《公共管理学报》2012,(3):101-111,127,128
运用社会网络分析方法(SNA)研究突发事件舆情传播的网络结构特征及关键节点识别,探究舆情传播的网络结构、节点位置及相互关系对信息的传播路径、传播速度及传播范围的影响等问题。以2011年重大突发事件"7.23"动车事故为实证研究对象,运用Pajek软件生成了"7.23"信息传播网络拓扑图,基于邻接矩阵数据进行了网络密度、可达性、聚类系数和中心性测度,依据测度结果和位置角色分析对其进行关键节点分层与识别。研究表明,突发事件网络舆情的传播和扩散以社会网络结构为基础,具有复杂性和动态性特征;网络结构与节点位置决定着成员的"影响力"程度;中心关键节点的资源控制能力与信息输入输出效率具有显著的正相关性。可以通过改变中心度、聚类系数等手段嵌入式引导关键节点,减少谣言和恐慌情绪的传播。本文采用详实数据对舆情传播关键节点的分层识别,拓展了社会网络方法在应急管理领域的应用,克服了以往研究中技术与管理实践相分离的弊病。  相似文献   
494.
《Justice Quarterly》2012,29(6):985-1022
Abstract

Terrorist attacks often dominate news coverage as reporters seek to provide the public with information. Yet, not all incidents receive equal attention. Why do some terrorist attacks receive more media coverage than others? We argue that perpetrator religion is the largest predictor of news coverage, while target type, being arrested, and fatalities will also impact coverage. We examined news coverage from LexisNexis Academic and CNN.com for all terrorist attacks in the United States between 2006 and 2015 (N?=?136). Controlling for target type, fatalities, and being arrested, attacks by Muslim perpetrators received, on average, 357% more coverage than other attacks. Our results are robust against a number of counterarguments. The disparities in news coverage of attacks based on the perpetrator’s religion may explain why members of the public tend to fear the “Muslim terrorist” while ignoring other threats. More representative coverage could help to bring public perception in line with reality.  相似文献   
495.
因为在形式方面暗中契合了"以人为本"这一信仰,20世纪末,作为"第四媒体"的网络在全球范围内迅速崛起,并获得巨大发展.但是当前网络媒体还存在不少发展瓶颈,在内容方面人文精神的缺失,又使得网络媒体目前距离主流媒体还有较长一段距离.从长远发展来看,"以人为本"应为其发展趋势.  相似文献   
496.
497.
This paper describes the Registration Data Access Protocol (RDAP) with a focus on relevance to digital forensic investigators. RDAP was developed as the successor to the aging WHOIS system and is intended to eventually replace WHOIS as the authoritative source for registration information on IP addresses, Domain Names, Autonomous Systems, and more. RDAP uses a RESTful interface over HTTP and introduces a number of new features related to security, internationalization, and standardized query/response definitions. It is important for digital forensic investigators to become familiar with RDAP as it will play an increasingly important role in Internet investigations requiring the search and collection of registration data as evidence.  相似文献   
498.
This paper examines the effects of elections on the conduct of central governments' fiscal policies. To do so, it uses a unique panel database that includes disaggregated spending and revenue series at the central government level for multiple countries over the 1975–2010 period. Examining political environments under which incumbent governments generate political budget cycles (PBCs), and comparing the relative importance of factors influencing cycles, we identify media freedom as the factor that plays the most critical role. This result provides a micro-foundation for rational opportunistic models for PBCs that rely on asymmetry of information about politicians' competence, and also offers a way to relate different conditioning factors of PBCs, including fiscal transparency and the maturity of democracies. Further, we show that the election-year rise in budget deficits under low media freedom is primarily driven by an increase in the current, not capital, component of public expenditure.  相似文献   
499.
500.
WhatsApp is a widely adopted mobile messaging application with over 800 million users. Recently, a calling feature was added to the application and no comprehensive digital forensic analysis has been performed with regards to this feature at the time of writing this paper. In this work, we describe how we were able to decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the: a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination. We explain the methods and tools used to decrypt the traffic as well as thoroughly elaborate on our findings with respect to the WhatsApp signaling messages. Furthermore, we also provide the community with a tool that helps in the visualization of the WhatsApp protocol messages.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号