首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   394篇
  免费   43篇
各国政治   5篇
工人农民   26篇
世界政治   8篇
外交国际关系   26篇
法律   177篇
中国共产党   15篇
中国政治   48篇
政治理论   39篇
综合类   93篇
  2024年   2篇
  2023年   14篇
  2022年   30篇
  2021年   19篇
  2020年   23篇
  2019年   17篇
  2018年   19篇
  2017年   16篇
  2016年   12篇
  2015年   15篇
  2014年   22篇
  2013年   36篇
  2012年   20篇
  2011年   15篇
  2010年   26篇
  2009年   17篇
  2008年   16篇
  2007年   24篇
  2006年   19篇
  2005年   19篇
  2004年   18篇
  2003年   11篇
  2002年   18篇
  2001年   6篇
  2000年   3篇
排序方式: 共有437条查询结果,搜索用时 847 毫秒
51.
情境预防理论表明首都社区安全治理绝不能仅依赖警察为主体的国家强制力,而应通过社区情境的优化来达到"无为而治"的社区治理效果。基于对北京市23个社区的调查分析,发现社区物理环境显著影响着社区安全度,楼房社区-自住平房-公寓-出租平房形成自高至低的社区安全梯度,因此情境预防应融入社区物理环境的规划-设计-建设-维护流程。另外,社区社会情境同样显著影响着社区安全度,社会治安综合治理机制与社区警务机制作为安全网络的双重支柱,应由压力型体制下单向执行转向双向互动网络,而基于互联网与物联网的社区大数据平台应构成社区神经系统与实时自动监测系统。  相似文献   
52.
ABSTRACT

Since the end of the East–West divide in the 1990s, the world has slowly lost its US-based unipolarity to globalisation, and a shift towards East Asia. This phenomenon has given more space to middle powers and furthered the embeddedness of the political, economic, and cultural spheres into the dynamics of social structures. It is highly visible when observed from the digital communication standpoint, which has become pervasive. In this context, the study of international power has moved towards the concept of soft power, which remains a fuzzy concept concerning ‘who’ and ‘what’. We define power as a continuum, in which various types of public and private actors carry out different types of coercive to cooptive actions in various but embedded spheres. We propose an empirically tractable conceptual framework that we use as a tool to analyse soft power within a hard-to-soft power spectrum, in which the articulation, dynamics and incremental nature of soft power become observable. We illustrate our point with the case study of South Korean power in Indonesia in the twenty-first century and draw conceptual as well as practical conclusions.  相似文献   
53.
ABSTRACT

From a cursory look at the terms of service of the main social networking websites, it is immediately possible to detect that Facebook’s show a peculiar configuration. Although they represent a mere contract between private parties, these terms adopt the traditional jargon of constitutional texts and articulate their contents in terms of rights, principles and duties. This curious pairing between norms regulating social media and the constitutional sphere is also apparent in a series of non-binding documents that are unequivocally named ‘bill of rights’ and seek to articulate a set of principles to protect social media users. This paper examines whether the emergence of a constitutional tone in this limited number of texts could be related to the effective, or aspirational, constitutional function that these documents exercise. The identification of a series of significant shortcomings will lead to exclude that social media’s terms of service and bills of rights of social media users currently play a constitutionalising role. Nevertheless, the possibility to theoretically justify the use of these documents as mechanisms of constitutionalisation in the social media environment will be adduced as an evidence of the potential constitutional aspirations of these texts.  相似文献   
54.
The Organisation for Economic Co-operation and Development (OECD) proposal for taxation of digital economy constitutes one of the most ambitious projects in the field of taxation and may lead to the most significant reform to international tax rules in the 20th century. Based on a two-pillar approach, Pillar Two of the proposal suggests the adoption of Global Anti-Base Erosion (GloBE) provisions that are aimed at introducing a worldwide minimum tax. In this article, a critical analysis is based that the GloBE proposal suggests that it represents a shift in the OECD policy. As compared to base erosion and profit shifting (BEPS), it jeopardizes the tax sovereignty of jurisdictions and it raises fundamental challenges of implementation, both in terms of amendments to domestic law and conflicts with tax treaties.  相似文献   
55.
This paper examines the reliability of Structure from Motion (SfM) photogrammetry as a tool in the capture of forensic footwear marks. This is applicable to photogrammetry freeware DigTrace but is equally relevant to other SfM solutions. SfM simply requires a digital camera, a scale bar, and a selection of oblique photographs of the trace in question taken at the scene. The output is a digital three-dimensional point cloud of the surface and any plastic trace thereon. The first section of this paper examines the reliability of photogrammetry to capture the same data when repeatedly used on one impression, while the second part assesses the impact of varying cameras. Using cloud to cloud comparisons that measure the distance between two-point clouds, we assess the variability between models. The results highlight how little variability is evident and therefore speak to the accuracy and consistency of such techniques in the capture of three-dimensional traces. Using this method, 3D footwear impressions can, in many substrates, be collected with a repeatability of 97% with any variation between models less than ~0.5 mm.  相似文献   
56.
以信息技术为核心的数字社会迅速发展,促进多元主体信息交流和资讯共享,给个人信息保护带来挑战。作为数字社会公民身份的基本表征,个人信息权既是数字公民实现全面自由发展的先决条件,也是防范和控制数字权力异化的重要工具。实现数字社会个人信息权保护的价值追求,国家立法机关应秉持作为宪法价值核心的人格尊严进行立法,明晰个人信息权的规范内涵与保护机制;行政机关应遵循权力法定原则,严格基于法律保留、公共利益和比例原则处理和使用个人信息,并建立专门的个人信息权保护的监管机构;司法机关应通过法律适用和司法解释对被侵犯的个人信息权提供及时司法救济,填补法律漏洞,实现数字社会个人信息权保护的制度正义目标。  相似文献   
57.
Digital video is used in criminal trials as evidence with legal responsibility because video content vividly depicts events occurring at a crime scene. However, using sophisticated video editing software, assailants can easily manipulate visible clues for their own benefit. Therefore, the integrity of digital video files acquired or submitted as evidence must be ensured. Forensic analysis of digital video is key to ensuring the integrity of links with individual cameras. In this study, we analyzed whether it is possible to ensure the integrity of MTS video files. Herein, we propose a method to verify the integrity of MTS files encoded by advanced video coding high definition (AVCHD), which is frequently used for video recording. To verify MTS file integrity, we propose five features. Codec information, picture timing, and camera manufacture/model are modified AVI and MP4-like format video verification features. Group of pictures and Universally Unique Identifier patterns were specifically developed for MTS streams. We analyzed the features of 44 standard files recorded using all recording options of seven cameras. We checked whether integrity can be validated on unmanipulated videos recorded in various environments. In addition, we considered whether manipulated MTS files edited in video editing software could be validated. Experimental results show that all unmanipulated and manipulated MTS files with known recording devices were discriminated only when all five features were checked. These results show that the proposed method verifies the integrity of MTS files, strengthening the validity of MTS file-based evidence in trials.  相似文献   
58.
Recently, digital forensics has become increasingly important as it is used by investigation agencies, corporate, and private sector. To supplement the limitations of evidence capacity and be recognized in court, it is essential to establish an environment that ensures the integrity of the entire process ranging from collecting and analyzing to submitting digital evidence to court. In this study, common elements were extracted by comparing and analyzing ISO/IEC 17025, 27001 standards and Interpol and Council of Europe (CoE) guidelines to derive the necessary components for building a digital forensic laboratory. Subsequently, based on 21 digital forensic experts in the field, Delphi survey and verifications were conducted in three rounds. As a result, 40 components from seven areas were derived. The research results are based on the establishment, operation, management, and authentication of a digital forensics laboratory suitable for the domestic environment, with added credibility through collection of the opinions of 21 experts in the field of digital forensics in Korea. This study can be referred to in establishing digital forensic laboratories in national, public, and private digital forensic organizations as well as for employing as competency measurement criteria in courts to evaluate the reliability of the analysis results.  相似文献   
59.
How do market actors in the contemporary economy make decisions when they are uncertain of the value of what is being traded? To answer this question, this paper analyses the changing temporal and spatial orientation of economic valuations in increasingly digitalized economies, in which markets can no longer be understood as locally bound and closed sites of valuation and exchange. Drawing on ethnographic material from the fishing industry, the paper shows how digital tracking technologies link and synchronize auction markets with real-time information on fishing activities. Hence, ‘scopic media’ such as chart plotters and computer screens are not only deployed by skippers to monitor one another, but are also used as valuation devices that recontextualize local knowledge for the purpose of coping with economic uncertainty. As a consequence of this panoptic valuation regime, fishermen control their virtual identities by disciplining harvesting practices according to their buyers’ expectations.  相似文献   
60.
“互联网+”时代的来临对社会的各个方面都产生了巨大影响,对图书馆的发展也带来了影响与挑战。“互联网+”时代的图书馆将如何发展,如何合理规划建设图书馆的各类资源,怎样用“互联网+”思维发展图书馆,已成为“互联网+”时代亟待研究的热题。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号