首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   676篇
  免费   14篇
各国政治   6篇
世界政治   10篇
外交国际关系   14篇
法律   423篇
中国共产党   7篇
中国政治   33篇
政治理论   27篇
综合类   170篇
  2023年   1篇
  2022年   24篇
  2021年   19篇
  2020年   30篇
  2019年   11篇
  2018年   54篇
  2017年   11篇
  2016年   12篇
  2015年   11篇
  2014年   62篇
  2013年   55篇
  2012年   60篇
  2011年   53篇
  2010年   46篇
  2009年   58篇
  2008年   41篇
  2007年   39篇
  2006年   25篇
  2005年   15篇
  2004年   13篇
  2003年   20篇
  2002年   11篇
  2001年   11篇
  2000年   7篇
  1988年   1篇
排序方式: 共有690条查询结果,搜索用时 31 毫秒
91.
In response to a growing number of requests to help reunify parents and children separated by allegations of child abuse, we developed a model for intervention informed by clinical experience, feedback from clients and professionals, and insights from a growing body of interdisciplinary literature. This article presents a retrospective analysis of 29 intrafamilial cases describing the intervention, outcomes, and problems presented by these challenging situations. The safety and protection of the child was the paramount consideration in determining success, whether or not reunification was achieved. Using informal follow‐up data, 24 of the 29 cases were categorized as successful, 21 resulted in full or partial reunification, and 3 cases resulted in the voluntary or court‐ordered withdrawal of an accused father believed to pose a risk to the child. In 5 cases, the nonaccused parent thwarted efforts at reunification, and the case returned to the court of relevant jurisdiction.  相似文献   
92.
This article discusses some important aspects of thetreatment of minorities in the Republic of Slovakia.It discusses the 1992 Constitution and subsequentdevelopments such as the State language law 1995, therestriction of political rights of Hungarians,educational policies, the setback of EU entry talks,the September 1998 general elections, the Dzurindagovernment's ``De-Meciarization', the 1999 MinorityLanguage Law, and recent electoral legislation. Thespecial condition of the Romany is considered. Theeffectiveness of international mechanisms for theprotection of minority rights (the Organisation forSecurity and Cooperation in Europe, the InternationalCovenant for Civil and Political Rights, the EuropeanConvention of Human Rights, the Framework Conventionfor the Protection of National Minorities) isassessed, as is the involvement of the EU. Finally,the role of the judiciary is reflected upon.  相似文献   
93.
魏远山 《政法学刊》2021,(1):110-122
通过以技术发展、作用对象和概念术语为视角对跨境数据流动的演进历程进行梳理,并分别从"数据""跨境"和"流动"三个维度把握其内涵与外延,发现数据跨越国界并非跨境数据流动的必需环节,不发生地理位置变化的跨境访问也可实现数据被境外主体掌控的效果。因此,将跨境数据流动界定为一国非公开机器可读的数据,可被境外主体控制或处理的过程,并据此勾勒出跨境数据流动的一般原理。  相似文献   
94.
董涛 《学理论》2010,(3):193-194
非物质文化遗产是国家珍贵的宝藏,而随着现代文明的日新月异,承载民族记忆的非物质遗产正渐渐走向消亡,对非物质文化遗产的保护已然迫在眉睫。本文在总结高校图书馆在非物质文化保护中的经验基础上,从图书馆提高服务质量和承担文化重任的角度出发,为高校图书馆在非物质文化遗产保护方面提出了些许建议。  相似文献   
95.
论卧底警察的保护与规制   总被引:1,自引:0,他引:1  
随着有组织犯罪的日益猖獗,公安机关运用卧底警察进行侦查破案的策略日益受到人们的关注。然而由于我国相较于其他世界发达国家在这方面的立法及制度建设还存在极大的滞后性,因此,理论界学者有必要对卧底警察这一被广泛运用的现象给以正确评价、规制和保护,以满足当今刑事侦查工作的切实需要。  相似文献   
96.
The use of digital technologies, functioning thanks to data processing, has been conquering many sectors of the world economy and it is possible that, in the near future, only a few markets will still be excluded from this industrial revolution. Therefore, even if one chose unreasonably to disregard the many innovations that the digital economy has brought about, its development seems quite inexorable, although it is true that this new stage in human progress raises some concerns. In particular, many worry about the millions of passive and powerless digital consumers who, facing a few huge and influential companies without any education or awareness, could succumb and find themselves poorer, victimized, and manipulated. The paper proposes to react to this state of affairs without further fueling the fear of the digital revolution and without the thought that regulation can be used only as a shield to protect fragile digital consumers. Rather, by taking inspiration from some regulatory actions undertaken by the European Union, the paper bears in mind that regulation can be used as a sword in the hands of consumers to finally assign them a lead role in digital markets. New rules to empower consumers and to make them take autonomous and independent decisions as to the management of their personal data as well as to the merits of digital firms can be envisaged. After all, one of the cultural roots of Western societies is that every individual should be enabled to be faber ipsius fortunae.  相似文献   
97.
Online platforms, which are at the forefront of today's economy, are subject to intensive competition law enforcement. However, the platform business model presents challenges for the application of competition law. Most notably, they appear to offer consumers a great number of their products for free. The explanation for most of these supposedly free products is offered by two-sided market theory: consumers may not be paying, but the ‘other’ side of the market is. This other side of the market often consists of advertisers, which pay the platform for access to the consumers’ information (to target advertisements) and attention (to show the advertisements). As many of these platforms are now potentially dominant, they come within the scope of competition law's abuse of dominance provision, including the doctrines of predatory and excessive pricing. These price-based theories need to adapt to the often price-less platform business model in order to prevent competition authorities from making both type I and type II enforcement errors. At the same time, competition law enforcement needs to consider—and at times give priority to—other branches of law that address abusive behaviour concerning free products. Through the use of case studies, this article therefore suggests ways in which abuse of dominance assessments can take into account the economic reality of free products.  相似文献   
98.
Held at Southampton University's Highfield campus and hosted by iCLIC, an interdisciplinary core on Law, the Internet and Culture, the Data Mining and Data Sharing workshop brought together attendees and speakers from industry, government, academia and a range of disciplines alike. The workshop comprised two sessions, each with a keynote and an associated panel. The first session was chaired by Eleonora Rosati and dealt with copyright and database rights, data mining and data sharing. The second session, chaired by Sophie Stalla-Bourdillon, focussed on data protection, data mining and data sharing. The following report covers both sessions, associated panel discussions and the subsequent question and answer sessions.  相似文献   
99.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
100.
The present paper1 aims both at introducing the legal aspects of the protection of minors in cyberspace and analysing and criticizing certain main features embedded in this legal approach of young people protection. After a short introduction underlining the concept of child’s rights and the reason why this right has been particularly proclaimed in the context of the cyberspace, the first section describes the new technological features of the ICT environment and linked to this evolution the increasing risks the minors are confronted with. A typology of cyber abuses is proposed on the basis of these considerations. A list of EU or Council of Europe texts directly or indirectly related to the minors’ protection into the cyberspace is provided. The second section intends to analyse certain characteristics of the legal approach as regards the ways by which that protection is conceived and effectively ensured. Different principles and methods might be considered as keywords summarizing the legal approach and to a certain extent, fixing a partition of responsibilities taking fully into account the diversity of actors might be deduced from the different regulatory documents.The third section comes back to the different complementary means by which the Law is envisaging the minors’ protection. The obligation to create awareness about the potential risks minors might incur definitively is the first one. The omnipresent reference in all the legal texts to the role of self-regulatory interventions constitutes another pillar of the protection envisaged by the Law. After having described the multiple instruments developed in the context of this self-regulation (labels, codes of conduct, hotlines, ODR…) or even co-regulation, the paper examines the conditions set by the European legislators as regards these instruments. Technology might be considered as a fourth method for protecting children. Our concern will be to see how the Law is addressing new requirements as regards the technological solutions and their implementation. The present debates about the liability of the actors involved in applications or services targeted or not vis-à-vis the minors like SNS or VSP operators are evoked. As a final point the question of the increasing competences of LEA and the reinforcement of the criminal provisions in order to fight cyber abuses against minors will be debated. In conclusion, we will address final recommendations about the way by which it would be possible to reconcile effective minors’ protection and liberties into the cyberspace.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号