首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1189篇
  免费   39篇
各国政治   132篇
工人农民   73篇
世界政治   140篇
外交国际关系   96篇
法律   215篇
中国共产党   10篇
中国政治   138篇
政治理论   217篇
综合类   207篇
  2023年   6篇
  2022年   5篇
  2021年   13篇
  2020年   39篇
  2019年   36篇
  2018年   49篇
  2017年   71篇
  2016年   58篇
  2015年   42篇
  2014年   67篇
  2013年   215篇
  2012年   101篇
  2011年   65篇
  2010年   53篇
  2009年   53篇
  2008年   66篇
  2007年   58篇
  2006年   58篇
  2005年   43篇
  2004年   34篇
  2003年   24篇
  2002年   31篇
  2001年   24篇
  2000年   11篇
  1999年   2篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
排序方式: 共有1228条查询结果,搜索用时 15 毫秒
111.
在社会主义市场经济发展中,关于商业秘密的法律保护和自我保护问题日益显现,并越来越受到人们的关注。少数单位和个人以不正当手段窃取商业秘密不仅是对商业秘密权利人合法权益和社会主义市场经济正常秩序的严重损害,而且也极大地挫伤了商业秘密权利人的生产积极性。因此,要有效地保护商业秘密,必须了解商业秘密的定义、构成要件和特征,知悉商业秘密的法律保护方法,其中包括我国现行立法对于商业秘密保护的各种规定,同时,还应掌握对商业秘密法律保护有力补充的几种自我保护方法。  相似文献   
112.
试论贞操权   总被引:3,自引:0,他引:3  
马强 《法律科学》2002,(5):60-68
贞操权为区别于身份权性质的配偶权,是男女均享有的以性行为为特定内容的一项独立的人格权。其侵权为一般侵权行为,其损害赔偿仅限于精神上的损害赔偿。  相似文献   
113.
在经济犯罪中,犯罪嫌疑人的潜逃具有与传统刑事犯罪嫌疑人潜逃不同的一些特点,缉捕中应当针对经济犯罪嫌疑人及其身份都确定、犯罪嫌疑人及其身份都不确定两种情形,有针对地开展侦查缉捕工作。  相似文献   
114.
政府信息公开是推进民主政治、推进政治体制改革、推进政治文明的重要措施,目前我国政府信息偏重保密,公开程度较低,且政府为社会提供信息的方式和渠道过少,这既有认识上的原因,也存在政府工作缺乏有效监督机制的问题,尤其是保密问题成为政府信息公开的难点。为此,我们必须从法律、法规上来解决问题,从组织上来落实政府信息公开的工作。  相似文献   
115.
目的为送检手机通话录音质量的审查提供理论依据。方法提出一种定量化的语音检材质量评价标准,并对不同手机及不同通信网络下的录音进行质量评价。该标准基于主流鉴定设备,涵盖了声学语谱图共振峰个数及数值、基频参数、区域平均频谱等分析方法以及声纹比对测试。结果实验结果显示,不同条件下得到的通话录音质量存在一定的差异性,会对声纹图谱鉴定产生一定影响,但并不会造成本质性差异。结论语音同一认定中,对基于移动通信网络获取的检材录音应考虑到通话语音质量的差异性对检验的影响,并在鉴定分析中加以评估和克服。  相似文献   
116.
《欧盟一般数据保护条例》(GDPR)率先在个人数据领域赋予数据主体数据迁移权,成为全球数据保护的立法标杆。数据迁移权的诞生为企业参与数据竞争正向赋能,企业竞争中也存在诸多数据迁移障碍。本文结合欧盟数据迁移权的相关规定,以数据、数据迁移权和数据竞争三要素之间的互动关系为进路,通过剖析数据迁移对企业竞争和创新发展的双向反馈,认为我国不应急于实施数据迁移权,而是将数据迁移权定性为一种柔性权利,按照"三阶段五步骤"的路径规划,逐步建立符合我国国情的数据迁移制度。  相似文献   
117.
Abstract

Two approaches to identity have been employed to explore issues in Japan's international relations. One views identity as constituted by domestic norms and culture, and as constitutive of interests, which in turn cause behaviour. Proponents view Japan's ‘pacifist’ and ‘antimilitarist’ identity as inherently stable and likely to change only as a result of material factors. In the other approach, ‘Japan’ emerges and changes through processes of differentiation vis-à-vis ‘Others’. Neither ‘domestic’ nor ‘material’ factors can exist outside of such identity constructions. We argue that the second, relational, approach is more theoretically sound, but begs three questions. First, how can different identity constructions in relation to numerous Others be synthesised and understood comprehensively? Second, how can continuity and change be handled in the same relational framework? Third, what is the point of analysing identity in relational terms? This article addresses the first two questions by introducing an analytical framework consisting of three mutually interacting layers of identity construction. Based on the articles in this special issue, we argue that identity entrepreneurs and emotions are particularly likely to contribute to change within this model. We address the third question by stressing common ground with the first approach: identity enables and constrains behaviour. In the case of Japan, changes in identity construction highlighted by the articles in this special issue forebode a political agenda centred on strengthening Japan militarily.  相似文献   
118.
Abstract

After Kim Jong-il's confession in 2002 that North Korean agents had abducted thirteen Japanese citizens in the 1970s and 1980s, North Korea has become the most detested country in Japan, and the normalisation of bilateral relations has been put on the back burner. The abduction issue has taken precedence in Japan even over North Korea's development of nuclear weapons and long-range missiles. It has also grossly overshadowed the atrocities for which Imperial Japan was responsible in the 20th century. Why has there been such strong emphasis on an issue that could be disregarded as comparatively ‘less important’? This article understands the ascendency of the abduction issue as the epitome of an identity shift under way in Japan – from the identity of a curiously ‘peaceful’ and inherently ‘abnormal’ state, to that of a more ‘normal’ one. The differentiation of North Korea as ‘abnormal’ emphasises Japan's own (claim to) ‘normality’. Indeed, by incarnating the perils of Japan's own ‘pacifist’ ‘abnormality’, which has been so central to the collective sense of Japanese ‘Self’ in the post-war period, the abduction issue has become a very emotional argument for Japan's ‘normalisation’ in security and defence terms. The transformation from ‘abnormal’ to ‘normal’ is further enabled by Japan trading places with North Korea in the discourse, so that Japan is defined as ‘victim’ (rather than former aggressor) and North Korea as ‘aggressor’ (rather than former victim). What is at stake here is the question whether Japan is ‘normalising’ or ‘remilitarising’, and the role of the abduction issue discourse in enabling such foreign and security policy change.  相似文献   
119.
新区域主义是地方治理研究在传统联合政府模式和公共选择模式基础上产生发展起来的。在英文文献当中,新区域主义理论可以从区域空间、区域身份与区域整合等三个角度进行解读。从区域空间角度来看,新区域主义主要强调各种不同主体在“区域空间”范围内的关系构建;从区域身份角度来看,新区域主义理论将区域治理与社会建构理论相结合,强调了区域在形成过程中的主观性和文化价值取向;从区域整合角度来看,新区域主义理论强调区域整合方式的弹性化,政府负责提供交流合作的平台,引导地方政府和公民主体在区域内流动并促进各主体在自愿基础上开展自发的合作。  相似文献   
120.
Purpose: in the literature, the term ‘Internet crime’ has been coined to indicate the scenario in which a victim of homicide or other crimes is met through a chat room, and lured to death at the hands of the murderer. Various criticisms have been made of this new concept, on the grounds that the outcome is no different from that of other crimes committed without the use of Web resources, and so the method used has no particular influence. Indeed, it has been claimed that informatic crime just reflects a technological change in the nature of crime rather than a new form of criminal behavior attributable to the use of the Internet for criminal purposes. Method: our reflections were prompted by our experience as expert forensic psychiatry witnesses in three cases in which the aggressors had confessed to having had an exclusively virtual relationship with the victims, in which they spent a lot of time daily in a chat room. Conclusion: this scenario offers points for reflection on the nature of Web-mediated victim–aggressor interactions, to assess the effects on the planning and commission of the crime. Discussion. it’s our opinion that there really is such a thing as Internet-correlated crime, because in this case the quality and quantity of the Internet interactions progressively altered the men’s perception of the real relationship between themself and their victims.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号