首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1230篇
  免费   24篇
各国政治   75篇
工人农民   5篇
世界政治   25篇
外交国际关系   123篇
法律   131篇
中国共产党   5篇
中国政治   49篇
政治理论   81篇
综合类   760篇
  2024年   2篇
  2023年   6篇
  2022年   10篇
  2021年   24篇
  2020年   16篇
  2019年   12篇
  2018年   22篇
  2017年   19篇
  2016年   16篇
  2015年   21篇
  2014年   63篇
  2013年   118篇
  2012年   70篇
  2011年   79篇
  2010年   75篇
  2009年   74篇
  2008年   91篇
  2007年   88篇
  2006年   112篇
  2005年   62篇
  2004年   76篇
  2003年   58篇
  2002年   53篇
  2001年   57篇
  2000年   30篇
排序方式: 共有1254条查询结果,搜索用时 15 毫秒
201.
党的群众观点、群众立场、群众路线始终是我们党安身立命的根本,专群结合是公安工作的重要方针原则。云南公安群众工作应立足云南省情,突出强化社会矛盾化解、禁毒防艾、爱民固边等工作,积极推进公安重点工作;云南公安机关当前的"三访三评"深化大走访活动,应抓住全省"四群教育"活动开展的重要契机,总结历年大走访成功经验做法,丰富群众工作方法和载体,积极推进公安群众工作制度化、常态化,实现云南经济社会发展的总体目标,营造和谐稳定的社会环境。  相似文献   
202.
This article addresses the unsuccessful attempts to suppress free speech during the Korean War, and in particular explains the attempts to silence three reporters of alleged atrocities by United Nations forces. In the absence of carefully targeted legislation, the three individuals – Alan Winnington (a journalist), Monica Felton (a women's movement activist) and Jack Gaster (a solicitor) ‐ were threatened with or investigated for prosecution for treason or sedition, and Winnington was unable to renew his passport until 1968. Drawing heavily on archival sources (including MI5 files, which unusually fail to redact the identity of one of the lawyers who was reporting to Special Branch about Gaster's activities), the article explores the threat to civil liberties from the administrative as well as the legislative and the judicial power of the state. The article concludes by drawing contemporary parallels, and highlighting the continuing relevance of the writings of Winnington, Felton and Gaster.  相似文献   
203.
Access by law enforcement authorities to personal data initially collected by private parties for commercial or operational purposes is very common, as shown by the transparency reports of new technology companies on law enforcement requests. From a data protection perspective, the scenario of law enforcement access is not necessarily well taken into account. The adoption of the new data protection framework offers the opportunity to assess whether the new ‘police’ Directive, which regulates the processing of personal data for law enforcement purposes, offers sufficient safeguards to individuals. To make this assessment, provisions contained in Directive 2016/680 are tested against the standards established by the ECJ in Digital Rights Ireland and Tele2 Sverige on the retention of data and their further access and use by police authorities. The analysis reveals that Directive 2016/680 does not contain the safeguards identified in the case law. The paper further assesses the role and efficiency of the principle of purpose limitation as a safeguard against repurposing in a law enforcement context. Last, solutions to overcome the shortcomings of Directive 2016/680 are examined in conclusion.  相似文献   
204.
The highly connected nature of the current era has raised the need for more secure systems, and hence the demand for biometric-based authentication methods. In 2013, the Mauritian Government invested massively in the collection of data, and implementation of the national biometric identity card scheme. The latter has suffered a number of contestations among the population, and several cases were consequently filed at the Supreme Court of Mauritius to oppose the use of this biometric card. The main concern was the collection of biometric data which posed threats to the privacy of individuals. Additionally, the collection and retention of biometric data lead to security issues. In this paper, the challenges with respect to the usage of the biometric card are analysed. The laws governing data protection are discussed, together with the legal framework used for data collection and retention. Following the court decisions, several amendments have been made to the existing laws in order to cater for the usage of biometric data for the public interest. Finally, recommendations are made with regards to a legal framework which will enhance the security of biometric data, and eventually encouraging public acceptance of this biometric identification system.  相似文献   
205.
北约发布的《塔林手册》系统回答了国际法对网络战的适用性问题,体现了以美国为代表的西方军事理论界、国际法学界、网络技术专家对网络空间安全冲突的认识和理解。综合该手册为网络行为所界定的95条规则,一方面,对我有积极作用,例如有利于我维护网络主权、驳斥关于网络攻击行为的不实指责等;另一方面,也向我提出了严峻挑战,例如肯定了先发制人实施打击、大规模杀伤性网络攻击的合法性等。研究这部重要文献对我国网络安全利益的影响,对于我维护国家安全,有针对性地加强国际对话,建设中国特色的网络安全理论体系,以及加强国际协作,具有重要意义。  相似文献   
206.
Throughout history, those in power have monitored and exercised control over individuals and groups who have been perceived as representing some form of threat to their power. Irrespective of the system of government in place, political crime is a matter of central interest to a society's security police. Political crimes are often committed by extra-parliamentary groups or organizations. The focus of this paper is how the Swedish secret police (SÄPO) have acted against what they have perceived as the extreme left, mainly anarchists and autonomists, during and after the cold war. Did SÄPO's perception of this part of the extra-parliamentary opposition change when the cold war was over in the early 1990s? Were these groups and individuals perceived as the new enemy in the threat vacuum that temporarily arose in the aftermath of the cold war? Furthermore, had the new security concept that was introduced at that time any impact on SÄPO's activities?  相似文献   
207.
Although it has been the major states of China, the former Soviet Union and especially the United States that have made the major contributions to shaping the security architecture of the Asia-Pacific region since 1945, the UN system has played a useful, adjunct role. This is especially the case in the post-Cold War era when its principal bodies, together with its various specialized agencies, have provided vital support in moving warring societies into a period of relative peace and stability. The UN peace-building operations in Cambodia and East Timor were some of the most demanding ever undertaken by this universal institution. But beyond these particular examples, the United Nations has been influential in the region in other, more indirect, ways. It has set standards, its charter has been a powerful source of ideas when it comes to composing parallel documents at the state or regional levels, and it has helped with the negotiation of global arms control treaties, making up to some degree for the absence of such arrangements at the regional level. The UN has also had a legitimating function, providing an arena where Asia-Pacific states can publicize their grievances, and receive approval or reprimand for their behaviour. It has played a valuable role, too, as third-party mediator. However, the UN's political structure constrains the contribution it can make to the security order since it is reliant on major state agreement before it can act. Veto power - not its actual use but simply its anticipated use - gives China, Russia and the United States a controlling function with respect to a potential UN role in the management of conflict. Beijing and Washington would work, and have worked, to exclude the United Nations from major involvement in conflicts in which they have direct security interests: the Taiwan and Korean issues being the two most obvious in this regard. Thus, the United Nations is a useful buttress but not a central pillar of the region's security architecture.  相似文献   
208.
The Asia policy of the Bush administration follows from two principles: its preference for ‘hub-and-spoke relationships’ led from Washington, and the restored priority of security issues over the mixture of trade interests and human rights that was the hallmark of the Clinton presidency. The initial focus of the administration on the restoration of political and strategic ties with old allies such as Japan, and on strategic competition, has been mitigated by another realistic approach: the need to seek new allies and partnerships. This policy was already evident towards India before September 11, 2001, but has been magnified with the onset of a coalition against terrorism, and almost as importantly, against the proliferation of weapons of mass destruction. The resumption of strategic and military ties with China, the priority of anti-terrorist cooperation over human rights issues with Southeast Asia, the increased support for India that is of more strategic value than America's tactical involvement with Pakistan, are developments that overshadow the US relationship with traditional allies such as Japan or the European Union. The major weakness of the Bush Asia policy, however, is its relative neglect of major economic and social issues in the region. Although support for some weakened ASEAN economies has increased, there is neither a more intense coordination of economic policies with Japan, in spite of initially declared intentions, nor a major economic and social strategy for Southeast and South Asia that would support the fight against terrorism.  相似文献   
209.
I argue that there is a distinct and longstanding regional structure in East Asia that is of at least equal importance to the global level in shaping the region's security dynamics. Without considering this regional level neither ‘unipolar’ nor ‘multipolar’ designations can explain East Asian international security. To make this case, I deploy regional security complex theory both to characterize and explain developments in East Asia since the end of the Cold War. The shift from bipolarity to unipolarity is well understood in thinking about how the ending of the Cold War impacted on East Asia. Less written about in Western security literature are the parallel developments at the regional level. Prominent among these are the relative empowerment of China in relation to its neighbours, and the effect of this, as well as of the growth of regional institutions, and the attachment of security significance to East Asian economic developments, in merging the security dynamics of Northeast and Southeast Asia. How China relates to its East Asian region, and how the US and China relate to each other, are deeply intertwined issues which centrally affect not only the future of East Asian, but also global, security. With the notable exception of some crisis between China and Taiwan, this whole pattern looks mainly dependent on internal developments within China and the US. Also significant is whether the basic dynamic of interstate relations in East Asia is more defined by the Westphalian principle of balancing, or by the bandwagoning imperative more characteristic of suzerain-vassal relationships. The main probability is for more of the same, with East Asian security staying within a fairly narrow band between mild conflict formation and a rather odd and weak sort of security regime in which an outside power, the US, plays the key role.  相似文献   
210.
《Democracy and Security》2013,9(1-2):19-39
This article analyzes the extent, substance, and underlying objectives of the European Union's (EU) new neighborhood policy in response to the Arab Spring. It questions whether the new policy approach constitutes a major policy shift or is just “old wine in new wineskins.” The article discusses the causes for much continuity and limited change in the new policy from a neo-institutionalist perspective. It concludes that both continuity and change primarily result from constraints inherent to the EU. In particular, the interaction between the Commission and the Council shapes a policy that corresponds with the normative aspirations and realist interests of the EU but hardly with the needs and expectations of the partner states.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号