期刊文献+
共找到2,680篇文章
< 1 2 134 >
每页显示 20 50 100
Study on the Factors Driving the Loyalty of the Customers of a Third Party Mobile Payment Platform
1
作者 Zhengjie ZHANG Xue DONG +1 位作者 Fang ZOU Zhiguang GUO 《International Journal of Technology Management》 2015年第11期16-19,共4页
. In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and custome... . In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and customer spending habits in China. The assumed relations between all affecting factors and the customer loyalty of a third party mobile payment platform were proposed, and a model for studying customer loyalty was established and also a conclusion was made through the questionnaire survey analysis data. Finally, suggestions on improving the loyalty of the customers of a third party mobile payment platform are presented. 展开更多
关键词 A Third party Mobile Payment Customer Loyalty Perceived Value trust in Relationship
下载PDF
The Legal Logic in the Practice of Poverty Reduction in Rural China in the One Hundred Years Since the Founding of the Communist Party of China
2
作者 Zhang Lizhe Ren Siqi 《Contemporary Social Sciences》 2022年第1期62-86,共25页
Three major poverty reduction models have successively been adopted in the poverty control led by the Communist Party of China(CPC),namely reliefbased poverty alleviation,which focused on adjusting the production fact... Three major poverty reduction models have successively been adopted in the poverty control led by the Communist Party of China(CPC),namely reliefbased poverty alleviation,which focused on adjusting the production factors of land,development-driven poverty alleviation,and targeted poverty alleviation.In the process,the target of finding a rational position for the principal function of poverty alleviation has been gradually realized:the approach of poverty alleviation has gradually adjusted from micro to macro,from direct to indirect;while the management has transformed from mobilization-based to rule-of-law based.Rules that link policies and laws,as well as a rule-of-law model of the poverty reduction of a developing country that is led by party committees and governments,has been formed,and an illustrative sample of poverty control has been created,which provides experience based knowledge to the anti-poverty practices in developing countries.In the future,it is necessary to further realize the protection of the rights of the people in comparative poverty and the proceduralization of poverty reduction administrative behaviors,as well as to formulate a unified "Poverty Reduction Law" when the time is ripe,to protect the rights of the people in comparative poverty in the post-poverty-alleviation era. 展开更多
关键词 poverty control leadership of the Communist party of China rule of law
下载PDF
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
3
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
下载PDF
Trust evolvement method of Web service combination based on network behavior
4
作者 刘济波 向占宏 朱培栋 《Journal of Central South University of Technology》 EI 2008年第4期558-563,共6页
Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the met... Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the method,the control rule of the trust degree in the Dempster-Shafer(D-S)rule was utilized based on the entity network interactive behavior,and a proportion trust control rule was put up.The control rule could make the Web service self-adaptively study so as to gradually form a proper trust connection with its cooperative entities and to improve the security performance of the whole system.The experimental results show that the historical successful experience is saved during the service combination alliance,and the method can greatly improve the reliability and success rate of Web service combination. 展开更多
关键词 network behavior Web service combination trust evolvement Dempster-Shafer rule
下载PDF
Understanding Trust Transfer in Construction Project Marketplace of China
5
作者 Chen Menglong Yin Yinlin 《Journal of Civil Engineering and Architecture》 2022年第11期541-556,共16页
Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the... Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the unfamiliar contractor without prior trade experience is the main obstacle that prevents employer from using the RPA.The aim of this paper is to create a better understanding of a specific path of building trust named trust transfer.In this paper,we first reviews related literatures and sum up the main feature of the trust transfer from the other context(e.g.E-business),and proposed the conceptualization of trust transfer in construction project marketplace.And then,according the feature of the trust transfer,we describe the basic model of the trust transfer in the construction project marketplace including employer as the trustor,the third party(source)and the unfamiliar contractor as trustee(target),and the relationship between these three nodes.At last,we analyze the type of the third party and the relationship of the trust transfer in the context of construction project. 展开更多
关键词 trust transfer trustor the third party trustEE construction project
下载PDF
From the Founding to the Crisis of Mao Zedong and of China Ruling Party: The Identity the Communist Party
6
作者 Qinghai Fu 《Fudan Journal of the Humanities and Social Sciences》 2015年第3期447-469,共23页
Over the course of the epochal 30 years, i.e., from the founding of People's Republic of China in 1949 till the launching of Chinese economic reform in 1978, the Communist Party of China (CPC) underwent a tremendou... Over the course of the epochal 30 years, i.e., from the founding of People's Republic of China in 1949 till the launching of Chinese economic reform in 1978, the Communist Party of China (CPC) underwent a tremendous transformation from the founding to the ruling party of the country. The present research examines the historical, social as well as political aspects of the identity crisis and the CPC was suffering from in its adventurous efforts to chart a course for the socialist transformation of China. It was tempted to resume its leadership role in the revolution given the mounting tension generated by the Cold War and the prevailing revolutionary beliefs within the Party. Nevertheless, it was obliged to restore the country's social and political order after the sweeping national reform. In search of an adequate interpretation for the various attempts the Party made in exploring its refreshed identity, hence resolving the crisis, the study focuses on a similar crisis which befell the Party leader, Mao Zedong, in his own struggle against the con- fusion caused by his potentially double role as the head of both a founding and a ruling party. The study suggests that Mao's misidentification of his own political role inevitably led to the Party's dysfunctions, and closer investigation into the leader's personal dilemma offers new insight into such tragic events as the Anti- Rightist Movement, the Great Leap Forward, and the Cultural Revolution. 展开更多
关键词 Founding party ruling party Mao Zedong Political transformation Identity crisis
原文传递
An Application Expert System for Evaluating Effective Factors on Trust in B2C WebsitesTrust, Security, ANFIS, Fuzzy Logic, Rule Based Systems, Electronic Commerce 被引量:4
7
作者 Mehrbakhsh Nilashi Karamollah Bagherifard +2 位作者 Othman Ibrahim Nasim Janahmadi Mousa Barisami 《Engineering(科研)》 2011年第11期1063-1071,共9页
In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites... In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites such a design of websites, security of websites and familiarity of website influence customers trust in online transactions. This paper presents an application of expert system on trust in electronic commerce. Based on experts’ judgment, a frame of work was proposed. The proposed model applies ANFIS and Mamdani inference fuzzy system to get the desired results and then results of two methods were compared. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of electronic websites. Based on AHP method, Expert Choice software was used to determine the priority of factors in the first questionnaire, and MATLAB and Excel were used for developing the fuzzy rules. Finally, the fuzzy logical kit was used to analyze the generated factors in the model. Our study findings show that trust in EC transactions is strongly mediated by perceived security. 展开更多
关键词 trust SECURITY ANFIS Fuzzy Logic Rule Based Systems Electronic COMMERCE
下载PDF
Comments on the Chinese Law of Conflict of Laws Applicable to Trusts: In Comparison with the U.S. Law and the Hague Convention 被引量:1
8
作者 Lingyun Gao 《Fudan Journal of the Humanities and Social Sciences》 2014年第3期483-501,共19页
China has entered a new era represented by the newly established China (Shanghai) Pilot Free Trade Zone, in which further reform and development of its financial system and capital market are highly prioritized. The... China has entered a new era represented by the newly established China (Shanghai) Pilot Free Trade Zone, in which further reform and development of its financial system and capital market are highly prioritized. The trust as an important vehicle in development of the financial market in China as well as in the world will play an important role, and there will be more foreign elements involved in Chinese trusts. The Law of the People's Republic of China on Application of Laws in Civil Relations with Foreign Elements provides rules, in its article 17, on the application of laws to trusts, which symbolizes the formal creation of rules of conflict of laws in China in this area. However, it seems to cause more problems than it may resolve. For example, it may not always be possible for the parties to determine the appli- cable law through consultation and agreement, and the parties' right to choice of law should not be without limitation either. By allowing judges to choose from "the law of the situs where the trust property is situated" and "the law of the situs where the trust relationship occurred" in the absence of an effective choice of law by the parties may lead to a situation contrary to existing laws and may create uncertainty for the parties as well. This paper analyzes this article 17 by comparing it with the conflict law rules adopted in the United States and by the Hague Convention, identifies problems, and seeks to find solutions in order to promote the healthy development of the trust system in China. 展开更多
关键词 trust law Conflict of trust laws Applicable rules of law to trusts party autonomy the doctrine of most significant relationship
原文传递
An Efficient Security Solution for Industrial Internet of Things Applications 被引量:1
9
作者 Alaa Omran Almagrabi 《Computers, Materials & Continua》 SCIE EI 2022年第8期3961-3983,共23页
The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual need... The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual needs for new functionality,such as foresight,the number of linked devices in the industrial environment increases.Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments.Hence this blockchain-based endpoint protection platform(BCEPP)has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints.A resolver supports the encoded model as an input;network functions can be optimized as an output in an infrastructure network.The configuration of the virtual network functions(VNFs)involved fulfills network characteristics.The output ensures that the final service is supplied at the least cost,including processing time and network latency.According to the findings of this comparison,our design is better suited to simplified trust management in IIoT devices.Thus,the experimental results show the adaptability and resilience of our suggested confidence model against behavioral changes in hostile settings in IIoT networks.The experimental results show that our proposed method,BCEPP,has the following,when compared to other methods:high computational cost of 95.3%,low latency ratio of 28.5%,increased data transmitting rate up to 94.1%,enhanced security rate of 98.6%,packet reception ratio of 96.1%,user satisfaction index of 94.5%,and probability ratio of 33.8%. 展开更多
关键词 Industrial internet of things(IIoT) blockchain trusted third parties endpoint verification
下载PDF
新中国成立以来中国共产党解决大党独有难题的探索历程与基本经验
10
作者 陈家喜 《学习与探索》 CSSCI 北大核心 2024年第10期1-8,F0002,176,共10页
新中国成立以来,中国共产党团结和带领全国各族人民取得了改革开放和社会主义现代化建设的伟大成就,不仅开辟了中国特色社会主义道路,而且成为执政时间最长、组织规模最大的执政党。作为先进的马克思主义执政党,中国共产党在面对伟大成... 新中国成立以来,中国共产党团结和带领全国各族人民取得了改革开放和社会主义现代化建设的伟大成就,不仅开辟了中国特色社会主义道路,而且成为执政时间最长、组织规模最大的执政党。作为先进的马克思主义执政党,中国共产党在面对伟大成就的同时,也以睿智的眼光清醒认识到大党独有难题。大党独有难题是中国共产党基于执政时间最长、组织规模最大、执政国家人口最多的特殊情境所形成的难题。新时代新征程,面对百年大党独有难题,中国共产党始终保持清醒和坚定,锐意进取,大胆探索,积累了解决大党独有难题的宝贵经验。 展开更多
关键词 中国共产党 执政党 大党独有难题 执政本领
下载PDF
中国式数据信托的生成逻辑、困境检视及优化路径
11
作者 曹泮天 《政治与法律》 CSSCI 北大核心 2024年第10期113-130,共18页
数字经济是以数据资源为关键要素的新经济形态,数据要素是数字经济深化发展的核心引擎。数据信托并非个人信息保护或数据安全保障的制度安排,而是一种新型的数据财产管理机制,其对于破除数据要素流通障碍、促进数据价值创造、推动数据... 数字经济是以数据资源为关键要素的新经济形态,数据要素是数字经济深化发展的核心引擎。数据信托并非个人信息保护或数据安全保障的制度安排,而是一种新型的数据财产管理机制,其对于破除数据要素流通障碍、促进数据价值创造、推动数据要素市场化配置具有重要的现实意义,具有内在的生成逻辑。我国的数据信托在理论和实践上存在功能定位模糊、信托财产法律属性不明、信托当事人确定困难等诸多困境,严重制约了数据信托的探索和发展。应立足于我国数据要素市场的实践需要和现行信托法律制度,秉持以数据财产转移为基础的数据财产管理之功能定位,明确数据财产权的法律属性,厘清数据信托当事人,构建中国式数据信托法律制度,促进数字经济的健康发展。 展开更多
关键词 数据信托 财产管理 数据财产权 信托当事人 信托法
下载PDF
专利转化信托之制度设计
12
作者 陈雪萍 左右正 《科技与法律(中英文)》 CSSCI 2024年第6期65-74,共10页
专利转化率低制约了我国产业自主创新升级。专业人才缺乏,投融资渠道匮乏以及传统专利管理方式罅缺是制约专利转化的主要因素。信托与专利转化有机结合可利用信托专业化管理、投融资以及安全保障功能提高专利转化率。我国信托制度生效... 专利转化率低制约了我国产业自主创新升级。专业人才缺乏,投融资渠道匮乏以及传统专利管理方式罅缺是制约专利转化的主要因素。信托与专利转化有机结合可利用信托专业化管理、投融资以及安全保障功能提高专利转化率。我国信托制度生效要件、受托人监督机制与受益人权利救济机制之罅缺制约专利转化信托的发展,应以信托财产“双重所有权”理念作为构建专利转化信托的制度基础,明确专利转化信托财产“确定性”要件并以专利权“移转”于受托人作为信托生效的充分必要条件,明确专利转化信托受托人资格,完善受托人信义义务机制之内部监督制度,增设专利转化信托监察人和专职监管部门进行外部监督,明确受益人物权救济机制。 展开更多
关键词 专利转化信托 双重所有权 信托财产 信托当事人
下载PDF
不确定性情境下的基层社会公共信任塑造——以A镇“党建引领、一网三联”治理模式为例
13
作者 张天舒 崔向洁 《南昌大学学报(人文社会科学版)》 CSSCI 北大核心 2024年第6期129-140,共12页
不确定性对基层治理构成了持续的挑战,如何利用制度优势,破解这一难题已经成为国家治理的重要议题。基于行动情境-行动策略的理论框架,剖析A镇“党建引领、一网三联”治理模式的典型案例,挖掘制度优势在微观层面上的运行机制与逻辑,可... 不确定性对基层治理构成了持续的挑战,如何利用制度优势,破解这一难题已经成为国家治理的重要议题。基于行动情境-行动策略的理论框架,剖析A镇“党建引领、一网三联”治理模式的典型案例,挖掘制度优势在微观层面上的运行机制与逻辑,可以发现,基层社会面临着外部环境和行动主体的双重不确定性情境。基层党组织发挥党政体制的优势,通过塑造公共信任,增加非正式治理资源,运用价值引领-组织重塑-规则强化机制,探索出目标重塑与价值感召、联结吸纳与权责分配、规则激励与规则约束路径,提升了基层政府的服务性和公众的主动性,为推进基层治理提供了理论和经验借鉴。 展开更多
关键词 不确定性 公共信任 党建引领 基层治理 党政体制
下载PDF
中国式现代化的党章基础
14
作者 周叶中 熊娜 《河北大学学报(哲学社会科学版)》 CSSCI 2024年第5期108-119,共12页
党章以一种从根本上体现中国共产党国家建设观念的方式,为中国式现代化构建逻辑完整的规范链条提供了充分有效的制度保障。党章通过实现人的全面发展与现代化道路的同构共进、表达党领导国家发展的价值理性、坚持系统均衡的发展理念,集... 党章以一种从根本上体现中国共产党国家建设观念的方式,为中国式现代化构建逻辑完整的规范链条提供了充分有效的制度保障。党章通过实现人的全面发展与现代化道路的同构共进、表达党领导国家发展的价值理性、坚持系统均衡的发展理念,集中彰显中国式现代化的政治愿景。党章中的发展原则规范、社会主义文化建设规范、社会主义生态文明建设规范、外交规范等,与中国式现代化的基本特征、本质要求相呼应。以相关理念内容为基础,党章主要通过对规范体系的统领与指引、对治理体系的塑造与影响,确保中国式现代化在党的领导下扎实推进。 展开更多
关键词 中国式现代化 党章 中国共产党 法治建设
下载PDF
法治规范体系视域下党内法规保留的功能定位与规范建构
15
作者 喻少如 唐成余 《河南社会科学》 CSSCI 北大核心 2024年第6期12-21,共10页
党内法规保留是将法律保留相关原理引入党内法规制度建设中形成的有关党内事务制定权配置的制度。在中国特色社会主义法治体系的法治背景下,党内法规保留应以法治规范体系作为制度建构的基本视角。基于与法律保留的功能比较,党内法规保... 党内法规保留是将法律保留相关原理引入党内法规制度建设中形成的有关党内事务制定权配置的制度。在中国特色社会主义法治体系的法治背景下,党内法规保留应以法治规范体系作为制度建构的基本视角。基于与法律保留的功能比较,党内法规保留具有统制、区分、整合、保障等功能。在法治规范体系视域下,当前党内法规保留制度存在明显结构缺陷。可以从重塑党内法规保留的结构理念、重新阐释《中国共产党党内法规制定条例》第四条第一款的保留对象、建立相对保留制度、单列党章保留事项、对中央党内法规绝对保留事项进行内涵解读等方面进行结构重塑与完善。此外,在党内法规保留的保留标准上,应确立面向从严治党的重要事项保留标准。 展开更多
关键词 党内法规保留 法治规范体系 法律保留 党内法规与国家法律的衔接与协调 从严治党
下载PDF
农产品区块链溯源系统基于关联规则的消费者信任研究
16
作者 陈琦 王冠楠 王华 《工程管理科技前沿》 CSSCI 北大核心 2024年第6期1-8,共8页
农产品区块链溯源系统能够有效降低传统溯源系统中溯源信息失效风险,保障农产品安全。但在实际应用中也面临着消费者信任难以建立的问题,严重阻碍了区块链技术在农产品行业的普及和发展。本文利用内容分析、机器学习和关联规则方法,基... 农产品区块链溯源系统能够有效降低传统溯源系统中溯源信息失效风险,保障农产品安全。但在实际应用中也面临着消费者信任难以建立的问题,严重阻碍了区块链技术在农产品行业的普及和发展。本文利用内容分析、机器学习和关联规则方法,基于期望违背理论,探讨了溯源系统中消费者信任的影响因素及其作用机制。研究发现,农产品区块链溯源系统的信息认证和技术特性能够提升消费者的信任水平。此外,消费者期望违背、农产品地理标志和产品类别在系统特性与消费者信任之间起到显著的调节作用。本文拓展了区块链溯源场景下消费者信任的相关研究,同时也为区块链在农产品溯源领域的进一步落地应用提供新思路。 展开更多
关键词 农产品区块链溯源系统 消费者信任 关联规则 内容分析法 期望违背理论
下载PDF
党内法规法典化三题
17
作者 段磊 姜雨禾 《福州大学学报(哲学社会科学版)》 2024年第1期94-103,171,172,共12页
探索党内法规的法典化对于完善党内法规体系建设具有重要意义,但诸如“法典编纂的逻辑基础”“法典化的程度”“法典编纂的规范来源”等三个理论问题仍有待进一步探讨。法典编纂的一般规律要求以部门法划分为基础,而党内法规的“1+4”... 探索党内法规的法典化对于完善党内法规体系建设具有重要意义,但诸如“法典编纂的逻辑基础”“法典化的程度”“法典编纂的规范来源”等三个理论问题仍有待进一步探讨。法典编纂的一般规律要求以部门法划分为基础,而党内法规的“1+4”板块划分与这一要求存在逻辑差异,故为保障党内法规法典编纂的科学性,应回归部门法划分逻辑,以部门为单位展开法典化探索。党内法规的法典化程度应根据现实情况适度而为,既不应编纂综合性的“党内法规法典”,也不应认为所有党内法规部门都适合编纂法典。当前,党的组织法规制度中,调整党的组织体系建设的部分展开法典编纂的条件最为充分。编纂党内法规法典,应考虑整合单行党内法规与规范性文件等其他党内法规渊源,在中央党内法规基础上,适度汲取部委党内法规和地方党内法规中的适当规范。 展开更多
关键词 党内法规法典化 “1+4”板块 党内法规部门 党的组织法规制度 党内法规渊源
下载PDF
中国共产党党内问责制度的发展脉络与变迁逻辑——基于历史制度主义的分析视角
18
作者 陈红梅 李娟 《广州大学学报(社会科学版)》 CAS CSSCI 2024年第2期58-69,共12页
作为中国共产党管党治党、全面从严治党的重要方式,党内问责制度先后经历了初步发展期、曲折发展期、恢复发展期、全面发展期的百年求索之路。从历史制度主义的视角来看,党内问责制度的变迁是宏观环境、政治变量、关键节点和路径依赖相... 作为中国共产党管党治党、全面从严治党的重要方式,党内问责制度先后经历了初步发展期、曲折发展期、恢复发展期、全面发展期的百年求索之路。从历史制度主义的视角来看,党内问责制度的变迁是宏观环境、政治变量、关键节点和路径依赖相互作用的结果。制度环境的变化引发了党内问责制度的变迁,从严治党的政策理念等政治变量推动着党内问责制度的完善,关键节点决定了党内问责制度的走向,路径依赖使得党内问责制度不断强化。总体而言,党内问责制度的演变呈现出体系化、法治化的鲜明特征,展现了以坚持党的领导为根本、以抓住“关键少数”为指引、以全覆盖监督为途径的历史经验,是中国共产党党内法规制度体系不断发展完善的缩影。 展开更多
关键词 党内问责 制度变迁 法治化 路径依赖 历史制度主义
下载PDF
党内法规制定工作规划实施中的地方主体及其责任问题研究
19
作者 周悦丽 郭丹尼 《党内法规研究》 2024年第2期58-71,共14页
推动落实《中央党内法规制定工作规划纲要(2023—2027年)》是学习贯彻习近平新时代中国特色社会主义思想、深化依规治党、高质量推进党内法规制度建设的政治任务和行动自觉。地方党委是全面从严治党、依规治党的法定责任主体,是规划纲... 推动落实《中央党内法规制定工作规划纲要(2023—2027年)》是学习贯彻习近平新时代中国特色社会主义思想、深化依规治党、高质量推进党内法规制度建设的政治任务和行动自觉。地方党委是全面从严治党、依规治党的法定责任主体,是规划纲要制定实施的基础问题库、重要资料库。随着新时代新征程持续推动依规治党精神落实于地方党的建设,地方应在中国式现代化的目标指引下,为规划纲要实施厚植政治、理论和实践基础。其主要努力方向包括提升学习宣传规划纲要的自觉性主动性、厘清规划纲要实施的地方责任、实事求是编制地方党内法规制定工作规划计划以及扎实推进规划纲要的实施。 展开更多
关键词 党内法规 规划纲要 地方党委 依规治党
下载PDF
新时代党的执政话语体系的价值定位、承载内容和主要特征
20
作者 刘明 《集美大学学报(哲社版)》 2024年第1期1-7,15,共8页
中国共产党执政话语体系作为一种指导性认知范式,承担了意识形态解释、动员、整合等基础性功能,是实现党的执政行为赢得广泛社会支持目的的有效价值系统。新时代党的执政话语体系变迁与调适中,从总体上不能抽离国家利益和公众利益的基... 中国共产党执政话语体系作为一种指导性认知范式,承担了意识形态解释、动员、整合等基础性功能,是实现党的执政行为赢得广泛社会支持目的的有效价值系统。新时代党的执政话语体系变迁与调适中,从总体上不能抽离国家利益和公众利益的基本范畴。新时代党的执政话语体系包括人民立场、政党使命、社会公平、国家建设、民族复兴等主要表达内容以及相应独特鲜明的特征,它们在一定意义上直观反映了执政话语体系的转型走向。 展开更多
关键词 中国共产党 执政话语体系 意识形态
下载PDF
上一页 1 2 134 下一页 到第
使用帮助 返回顶部