首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   174篇
  免费   8篇
各国政治   9篇
工人农民   3篇
世界政治   5篇
外交国际关系   18篇
法律   84篇
中国政治   10篇
政治理论   21篇
综合类   32篇
  2021年   4篇
  2020年   5篇
  2019年   10篇
  2018年   10篇
  2017年   8篇
  2016年   14篇
  2015年   7篇
  2014年   15篇
  2013年   21篇
  2012年   10篇
  2011年   10篇
  2010年   16篇
  2009年   9篇
  2008年   5篇
  2007年   9篇
  2006年   7篇
  2005年   3篇
  2004年   3篇
  2003年   6篇
  2002年   3篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1994年   1篇
  1984年   1篇
  1978年   1篇
排序方式: 共有182条查询结果,搜索用时 35 毫秒
141.
In his 2019 Reith Lectures on the rise of law and decline of politics, Jonathan Sumption presents a thesis that, on its face, seems identical to that of J.A.G. Griffith's defence of the political constitution. Given the radical differences in their views on equality, democracy, and redistribution—with Griffith working in the tradition of democratic socialism espoused by the Webbs, Tawney and Laski, and Sumption expressing the libertarian philosophy underpinning Thatcherite policies—this is puzzling. This article sets their views in historical and political context and argues that the similarities are superficial, whereas the differences are profound. It then proceeds to show the weaknesses in Sumption's defence of his thesis.  相似文献   
142.
In the throes of war, protecting such cultural heritage as the Bamiyan Buddhas, the Mostar Bridge, the Timbuktu libraries and Palmyra supposedly is a priority on the international public policy agenda; but government responses so far have been limited to deploring such destruction. This article explores the evolving, albeit contested, norm of the ‘responsibility to protect’ (R2P) and its relevance for cultural heritage. There is no need for a hierarchy of protection – civilians or culture – because the juxtaposition is as erroneous as choosing between people and the environment. This essay begins with a discussion of cultural heritage and defines the scope for the application of any new international normative consensus. It then explores why R2P, in the original concept of the International Commission on Intervention and State Sovereignty (ICISS), is an appropriate framework for thinking about cultural protection, despite considerable political headwinds. It then examines the current opportune political moment and existing legal tools. Finally, there is a brief consideration of the obstacles facing the creation of a better framework for cultural protection in zones of armed conflict.  相似文献   
143.
ABSTRACT

The paper will focus on the identification of several key criteria in e-discourses via the constitution of e-images of the Anonymous arising from e-medias (Facebook, twitter, Snapchat, WeChat, etc.) with a specific focus on youngsters and their (ab)uses of these communication channels to facilitate digital predation, and so to lead to e-victimization. I will explain the specifics of e-victimization discourse taking into consideration its triadic dimension. I will then be able to conceptualize a dominant e-communication and the e-victimization theory around central ideas of dynamics of violence, gender discrimination and power abuse leading to a semio-sphere with a deep focus on anonymity, exposure, frequency, and insecurity as indicators of collective e-delinquency and proneness to e-victimization.  相似文献   
144.
Online forms of harassment, stalking and bullying on social network and communication platforms are now arguably wide-spread and subject to regular media coverage. As these provision continue to attract millions of users, generating significant volumes of traffic, regulating abuse and effectively reprimanding those who are involved in it, is a difficult and sometimes impossible task. This article collates information acquired from 22 popular social network and communication platforms in order to identify current regulatory gaps. Terms of service and privacy policies are reviewed to assess existing practices of data retention to evaluate the feasibility of law enforcement officials tracking those whose actions breach the law. For each provision, account sign-up processes are evaluated and policies for retaining Internet Protocol logs and user account information are assessed along with the availability of account preservation orders. Finally, recommendations are offered for improving current approaches to regulating social network crime and online offender tracking.  相似文献   
145.
This paper describes the Registration Data Access Protocol (RDAP) with a focus on relevance to digital forensic investigators. RDAP was developed as the successor to the aging WHOIS system and is intended to eventually replace WHOIS as the authoritative source for registration information on IP addresses, Domain Names, Autonomous Systems, and more. RDAP uses a RESTful interface over HTTP and introduces a number of new features related to security, internationalization, and standardized query/response definitions. It is important for digital forensic investigators to become familiar with RDAP as it will play an increasingly important role in Internet investigations requiring the search and collection of registration data as evidence.  相似文献   
146.
WhatsApp is a widely adopted mobile messaging application with over 800 million users. Recently, a calling feature was added to the application and no comprehensive digital forensic analysis has been performed with regards to this feature at the time of writing this paper. In this work, we describe how we were able to decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the: a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination. We explain the methods and tools used to decrypt the traffic as well as thoroughly elaborate on our findings with respect to the WhatsApp signaling messages. Furthermore, we also provide the community with a tool that helps in the visualization of the WhatsApp protocol messages.  相似文献   
147.
计算机网络犯罪及其取证初探   总被引:1,自引:0,他引:1  
计算机网络犯罪形形色色,但都会被计算机系统或网络设备“记录”下数据。计算机取证(Computerforensics)又称为数字取证或电子取证,是对计算机犯罪的证据进行获取、保存、分析和出示,它实质上是一个详细扫描计算机系统以及重建入侵事件的过程。计算机取证既需要应用数据,又需要有些软件或工具在运行过程中产生的记录运行状态和操作结果的系统数据。  相似文献   
148.
虚拟时空的传奇——论网络玄幻小说   总被引:6,自引:0,他引:6  
玄幻小说是新崛起的一种传奇文体,在网络文学界尤为流行,近年来已产生了一批著名的写手和作品。从文体构成来看,玄幻小说融合了武侠、科幻、军事战争、网络游戏等多种文艺形式中的传奇元素。从思想内容的开掘看,除了继续多种传统传奇题材的话题,它在玄理的传奇化等方面有一些展拓。从更深层次说,它对现代人时空意识的变化也有所反映和表现。  相似文献   
149.
Book reviewed in this article:
T.R.S. Allan, Constitutional Justice: A Liberal Theory of the Rule of Law  相似文献   
150.
Low participation rates in government assistance programs are a major policy concern in the United States. This paper studies take‐up of Section 8 housing vouchers, a program in which take‐up rates are quite low among interested and eligible households. We link 18,109 households in Chicago that were offered vouchers through a lottery to administrative data and study how baseline employment, earnings, public assistance, arrests, residential location, and children's academic performance predict take‐up. Our analysis finds mixed evidence of whether the most disadvantaged or distressed households face the largest barriers to program participation. We also study the causal impact of peer behavior on take‐up by exploiting idiosyncratic variation in the timing of voucher offers. We find that the probability of lease‐up increases with the number of neighbors who recently received voucher offers. Finally, we explore the policy implications of increasing housing voucher take‐up by applying reweighting methods to existing causal impact estimates of voucher receipt. This analysis suggests that greater utilization of vouchers may lead to larger reductions in labor market activity. Differences in take‐up rates across settings may be important to consider when assessing the external validity of studies identifying the effects of public assistance programs.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号