全文获取类型
收费全文 | 1230篇 |
免费 | 24篇 |
专业分类
各国政治 | 75篇 |
工人农民 | 5篇 |
世界政治 | 25篇 |
外交国际关系 | 123篇 |
法律 | 131篇 |
中国共产党 | 5篇 |
中国政治 | 49篇 |
政治理论 | 81篇 |
综合类 | 760篇 |
出版年
2024年 | 2篇 |
2023年 | 6篇 |
2022年 | 10篇 |
2021年 | 24篇 |
2020年 | 16篇 |
2019年 | 12篇 |
2018年 | 22篇 |
2017年 | 19篇 |
2016年 | 16篇 |
2015年 | 21篇 |
2014年 | 63篇 |
2013年 | 118篇 |
2012年 | 70篇 |
2011年 | 79篇 |
2010年 | 75篇 |
2009年 | 74篇 |
2008年 | 91篇 |
2007年 | 88篇 |
2006年 | 112篇 |
2005年 | 62篇 |
2004年 | 76篇 |
2003年 | 58篇 |
2002年 | 53篇 |
2001年 | 57篇 |
2000年 | 30篇 |
排序方式: 共有1254条查询结果,搜索用时 15 毫秒
201.
党的群众观点、群众立场、群众路线始终是我们党安身立命的根本,专群结合是公安工作的重要方针原则。云南公安群众工作应立足云南省情,突出强化社会矛盾化解、禁毒防艾、爱民固边等工作,积极推进公安重点工作;云南公安机关当前的"三访三评"深化大走访活动,应抓住全省"四群教育"活动开展的重要契机,总结历年大走访成功经验做法,丰富群众工作方法和载体,积极推进公安群众工作制度化、常态化,实现云南经济社会发展的总体目标,营造和谐稳定的社会环境。 相似文献
202.
This article addresses the unsuccessful attempts to suppress free speech during the Korean War, and in particular explains the attempts to silence three reporters of alleged atrocities by United Nations forces. In the absence of carefully targeted legislation, the three individuals – Alan Winnington (a journalist), Monica Felton (a women's movement activist) and Jack Gaster (a solicitor) ‐ were threatened with or investigated for prosecution for treason or sedition, and Winnington was unable to renew his passport until 1968. Drawing heavily on archival sources (including MI5 files, which unusually fail to redact the identity of one of the lawyers who was reporting to Special Branch about Gaster's activities), the article explores the threat to civil liberties from the administrative as well as the legislative and the judicial power of the state. The article concludes by drawing contemporary parallels, and highlighting the continuing relevance of the writings of Winnington, Felton and Gaster. 相似文献
203.
Catherine Jasserand 《Computer Law & Security Report》2018,34(1):154-165
Access by law enforcement authorities to personal data initially collected by private parties for commercial or operational purposes is very common, as shown by the transparency reports of new technology companies on law enforcement requests. From a data protection perspective, the scenario of law enforcement access is not necessarily well taken into account. The adoption of the new data protection framework offers the opportunity to assess whether the new ‘police’ Directive, which regulates the processing of personal data for law enforcement purposes, offers sufficient safeguards to individuals. To make this assessment, provisions contained in Directive 2016/680 are tested against the standards established by the ECJ in Digital Rights Ireland and Tele2 Sverige on the retention of data and their further access and use by police authorities. The analysis reveals that Directive 2016/680 does not contain the safeguards identified in the case law. The paper further assesses the role and efficiency of the principle of purpose limitation as a safeguard against repurposing in a law enforcement context. Last, solutions to overcome the shortcomings of Directive 2016/680 are examined in conclusion. 相似文献
204.
Sunilduth Baichoo Maleika Heenaye-Mamode Khan Pramod Bissessur Narainsamy Pavaday Nazmeen Boodoo-Jahangeer Neel R. Purmah 《Computer Law & Security Report》2018,34(6):1333-1341
The highly connected nature of the current era has raised the need for more secure systems, and hence the demand for biometric-based authentication methods. In 2013, the Mauritian Government invested massively in the collection of data, and implementation of the national biometric identity card scheme. The latter has suffered a number of contestations among the population, and several cases were consequently filed at the Supreme Court of Mauritius to oppose the use of this biometric card. The main concern was the collection of biometric data which posed threats to the privacy of individuals. Additionally, the collection and retention of biometric data lead to security issues. In this paper, the challenges with respect to the usage of the biometric card are analysed. The laws governing data protection are discussed, together with the legal framework used for data collection and retention. Following the court decisions, several amendments have been made to the existing laws in order to cater for the usage of biometric data for the public interest. Finally, recommendations are made with regards to a legal framework which will enhance the security of biometric data, and eventually encouraging public acceptance of this biometric identification system. 相似文献
205.
崔文波 《江南社会学院学报》2013,(3):22-26
北约发布的《塔林手册》系统回答了国际法对网络战的适用性问题,体现了以美国为代表的西方军事理论界、国际法学界、网络技术专家对网络空间安全冲突的认识和理解。综合该手册为网络行为所界定的95条规则,一方面,对我有积极作用,例如有利于我维护网络主权、驳斥关于网络攻击行为的不实指责等;另一方面,也向我提出了严峻挑战,例如肯定了先发制人实施打击、大规模杀伤性网络攻击的合法性等。研究这部重要文献对我国网络安全利益的影响,对于我维护国家安全,有针对性地加强国际对话,建设中国特色的网络安全理论体系,以及加强国际协作,具有重要意义。 相似文献
206.
Throughout history, those in power have monitored and exercised control over individuals and groups who have been perceived as representing some form of threat to their power. Irrespective of the system of government in place, political crime is a matter of central interest to a society's security police. Political crimes are often committed by extra-parliamentary groups or organizations. The focus of this paper is how the Swedish secret police (SÄPO) have acted against what they have perceived as the extreme left, mainly anarchists and autonomists, during and after the cold war. Did SÄPO's perception of this part of the extra-parliamentary opposition change when the cold war was over in the early 1990s? Were these groups and individuals perceived as the new enemy in the threat vacuum that temporarily arose in the aftermath of the cold war? Furthermore, had the new security concept that was introduced at that time any impact on SÄPO's activities? 相似文献
207.
Rosemary Foot 《The Pacific Review》2013,26(2):207-230
Although it has been the major states of China, the former Soviet Union and especially the United States that have made the major contributions to shaping the security architecture of the Asia-Pacific region since 1945, the UN system has played a useful, adjunct role. This is especially the case in the post-Cold War era when its principal bodies, together with its various specialized agencies, have provided vital support in moving warring societies into a period of relative peace and stability. The UN peace-building operations in Cambodia and East Timor were some of the most demanding ever undertaken by this universal institution. But beyond these particular examples, the United Nations has been influential in the region in other, more indirect, ways. It has set standards, its charter has been a powerful source of ideas when it comes to composing parallel documents at the state or regional levels, and it has helped with the negotiation of global arms control treaties, making up to some degree for the absence of such arrangements at the regional level. The UN has also had a legitimating function, providing an arena where Asia-Pacific states can publicize their grievances, and receive approval or reprimand for their behaviour. It has played a valuable role, too, as third-party mediator. However, the UN's political structure constrains the contribution it can make to the security order since it is reliant on major state agreement before it can act. Veto power - not its actual use but simply its anticipated use - gives China, Russia and the United States a controlling function with respect to a potential UN role in the management of conflict. Beijing and Washington would work, and have worked, to exclude the United Nations from major involvement in conflicts in which they have direct security interests: the Taiwan and Korean issues being the two most obvious in this regard. Thus, the United Nations is a useful buttress but not a central pillar of the region's security architecture. 相似文献
208.
François Godement 《The Pacific Review》2013,26(2):175-187
The Asia policy of the Bush administration follows from two principles: its preference for ‘hub-and-spoke relationships’ led from Washington, and the restored priority of security issues over the mixture of trade interests and human rights that was the hallmark of the Clinton presidency. The initial focus of the administration on the restoration of political and strategic ties with old allies such as Japan, and on strategic competition, has been mitigated by another realistic approach: the need to seek new allies and partnerships. This policy was already evident towards India before September 11, 2001, but has been magnified with the onset of a coalition against terrorism, and almost as importantly, against the proliferation of weapons of mass destruction. The resumption of strategic and military ties with China, the priority of anti-terrorist cooperation over human rights issues with Southeast Asia, the increased support for India that is of more strategic value than America's tactical involvement with Pakistan, are developments that overshadow the US relationship with traditional allies such as Japan or the European Union. The major weakness of the Bush Asia policy, however, is its relative neglect of major economic and social issues in the region. Although support for some weakened ASEAN economies has increased, there is neither a more intense coordination of economic policies with Japan, in spite of initially declared intentions, nor a major economic and social strategy for Southeast and South Asia that would support the fight against terrorism. 相似文献
209.
Barry Buzan 《The Pacific Review》2013,26(2):143-173
I argue that there is a distinct and longstanding regional structure in East Asia that is of at least equal importance to the global level in shaping the region's security dynamics. Without considering this regional level neither ‘unipolar’ nor ‘multipolar’ designations can explain East Asian international security. To make this case, I deploy regional security complex theory both to characterize and explain developments in East Asia since the end of the Cold War. The shift from bipolarity to unipolarity is well understood in thinking about how the ending of the Cold War impacted on East Asia. Less written about in Western security literature are the parallel developments at the regional level. Prominent among these are the relative empowerment of China in relation to its neighbours, and the effect of this, as well as of the growth of regional institutions, and the attachment of security significance to East Asian economic developments, in merging the security dynamics of Northeast and Southeast Asia. How China relates to its East Asian region, and how the US and China relate to each other, are deeply intertwined issues which centrally affect not only the future of East Asian, but also global, security. With the notable exception of some crisis between China and Taiwan, this whole pattern looks mainly dependent on internal developments within China and the US. Also significant is whether the basic dynamic of interstate relations in East Asia is more defined by the Westphalian principle of balancing, or by the bandwagoning imperative more characteristic of suzerain-vassal relationships. The main probability is for more of the same, with East Asian security staying within a fairly narrow band between mild conflict formation and a rather odd and weak sort of security regime in which an outside power, the US, plays the key role. 相似文献
210.
《Democracy and Security》2013,9(1-2):19-39
This article analyzes the extent, substance, and underlying objectives of the European Union's (EU) new neighborhood policy in response to the Arab Spring. It questions whether the new policy approach constitutes a major policy shift or is just “old wine in new wineskins.” The article discusses the causes for much continuity and limited change in the new policy from a neo-institutionalist perspective. It concludes that both continuity and change primarily result from constraints inherent to the EU. In particular, the interaction between the Commission and the Council shapes a policy that corresponds with the normative aspirations and realist interests of the EU but hardly with the needs and expectations of the partner states. 相似文献