首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   208篇
  免费   2篇
各国政治   2篇
工人农民   2篇
外交国际关系   3篇
法律   155篇
中国共产党   1篇
中国政治   7篇
政治理论   11篇
综合类   29篇
  2023年   5篇
  2022年   16篇
  2021年   12篇
  2020年   8篇
  2019年   11篇
  2018年   19篇
  2017年   8篇
  2016年   7篇
  2015年   11篇
  2014年   27篇
  2013年   13篇
  2012年   8篇
  2011年   10篇
  2010年   4篇
  2009年   8篇
  2008年   5篇
  2007年   9篇
  2006年   11篇
  2005年   3篇
  2004年   3篇
  2003年   5篇
  2002年   1篇
  2001年   1篇
  2000年   1篇
  1999年   2篇
  1997年   1篇
  1996年   1篇
排序方式: 共有210条查询结果,搜索用时 609 毫秒
41.
李岩 《宁夏党校学报》2020,22(2):106-112
数字经济给全球带来机遇和挑战。为抢占发展先机,谋求竞争优势,世界各国基于各自数字技术和数字经济发展情况,制定了各自的数字经济发展战略。国家战略引领立法价值和目标,导致各国立法选择不一。比较欧美数字经济战略对其个人信息保护立法的影响,对于完善我国个人信息保护立法和参与国际规则制定具有重要意义。中国基于网络强国战略和网络空间国际合作战略,应将同步推进个人信息安全和数字经济发展作为立法指导思想,对内尽快出台适合本国实际的个人信息保护专门立法,对外积极参与引领国际立法合作,坚持在WTO现有协定和框架基础上谈判,建立和完善数据治理规则,构建国内国际双重立法保护。  相似文献   
42.
电子政务是涉及技术、管理、组织和制度等层面的系统工程,建立完整的电子政务的体系和标准是打造“数字天津”,实现政府职能转变、节约行政成本、提高办公效率的有效途径。当前.天津电子政务建设中确实还存在一些共性问题。因此,我们应充分利用信息技术为行政管理造就“生态环境”和“作用空间”,将电子政务发展纳入良性循环之中。  相似文献   
43.
发达国家数字图书馆的建设与启示   总被引:1,自引:0,他引:1  
徐虹  赵洪波 《东北亚论坛》2006,15(4):126-129
数字图书馆的建设和研究工作是在信息技术迅猛发展和各国信息基础设施的建设浪潮中产生的。自20世纪90年代以来,世界各发达国家都投入了大量的资源,加紧开发、研制数字图书馆。我国数字图书馆在1996年也开始启动,但在发展过程中还存在着许多问题,这需要我们在借鉴国外发达国家数字图书馆建设及实际应用经验的基础上,制定出我国数字图书馆建设切实可行的方案。  相似文献   
44.
淫秽色情网站已经对我国互联网的健康发展造成了危害,但在对淫秽色情网站进行打击的过程中却存在种种困难,特别是电子证据的获取和应用方面还有很多亟待解决的问题。为有效打击网络淫秽色情违法犯罪,应该积极推动确立电子证据的法律地位,设立专门机构,完善工作机制,建立标准化的应用体系。  相似文献   
45.
This work explores morphological and autofluorescence differences between vaginal and epidermal cells detectable through Imaging Flow Cytometry (IFC), a non-destructive, high-throughput technique. These differences were used to build a predictive framework for classifying unknown cells as originating from vaginal or epidermal tissue, which was tested on hand swabbings with and without digital penetration. Many more cells possessing a vaginal signature (median posterior probability ≥0.90) were detected in digital penetration samples than control hand swabbings. Minimum interpretation thresholds were developed to minimize/eliminate false positives; these thresholds were also effective when screening licked hands, indicating the potential utility of this method for a variety of biological mixture types and depositional events relevant to forensic casework.  相似文献   
46.
The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity and exposes flaws in popular legal arguments on the subject. Problems of mistaken identity must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence of identity theft and the greater difficulty of authenticating the other transacting party. The trend to preserve the privacy of Internet users indirectly clashes with efforts to ensure transactional security in e-commerce. An indispensable prerequisite of the latter is the ability to identify the other party to the contract. The problem of mistaken identity is not new – but it assumes a different scale in e-commerce transactions.  相似文献   
47.
The Co-Reach Workshop on ISP Liability on December 7, 2010 was organised by the Co-Reach IPR in New Media at the Herbert Smith Conference Center in London. The policy-making workshop was co-hosted by Computer Law and Security Review, as part of its aim to position itself at the forefront of policy discussion drawing upon the high quality scholarly contributions to the journal from leading experts around the world.  相似文献   
48.
谭焰 《桂海论丛》2011,27(5):117-121
在全球化、网络化的大背景下,我国的学术期刊面临新的发展机遇,呈现出期刊的发布与传播方式更新、期刊的出版模式更新和"优先数字出版"成为最新的出版模式、期刊的国际化趋势等发展特点。同时,学术期刊也面临着网络化和新兴媒体的发展带来的严峻挑战,改革已经成为新时期学术期刊发展的新命题和新焦点。新一轮改革将推动学术期刊向优质化发展、出版方向与定位向特色化发展,期刊之间的竞争还将是出版手段的竞争。作为哲学社会科学学术期刊重要构成部分的党校期刊,同样面临着改革要求,上述改革的方向也将是党校期刊的改革取向,而特色构建则将是党校期刊的改革进路选择。  相似文献   
49.
Digital Rights Management Systems (DRMs) related control mechanism, which are analogous to and augment the exclusive rights, have been the subject of debate since the early 1980s. DRMs, which function like an electronic security guard that ‘never leaves its post, never takes a break and never sleeps,1 can invade the privacy of individuals, prevent competition and/or control access to a work that is not or is no longer copyright protected. Hyperlinks are citations of an electronic address, but when clicked they navigate the user to the source of further information, including codes circumventing DRMs. This article accepts that the excesses of DRMs can outreach copyright and/or contract law, but argues that DRMs provide an opportunity for innovative business models, which can both protect digital works and promote free use of hyperlinks. Part 1 outlines the background and legislative provisions related to DRMs. It contrasts the WIPO Copyright Treaty (WCT) 1996,2 Articles 11 and 12, with corresponding provisions found in the implementing legislation of the US Digital Millennium Copyright Act (DMCA) 1998,3 and the EU Copyright Directive (EUCD) 2001.4 It also examines the intellectual property aspects of the Trans-Pacific Partnership (TPP) and Europe's Anti-counterfeiting Trade Agreement (ACTA).5 Part 2 debates opposing academic opinion and comments on case law relating to DRMs, including the use of hyperlinks as a way of trafficking circumvention technology and/or facilitating unauthorised access to a copyright work. It assesses the extent to which DRMs might inhibits the development of new products, prevents competition, or invades the privacy of individuals, and points to the opportunities a consumer group-rightholder negotiated model end user licence can offer. Part 3 concludes that DRMs bolsters the clutches of the rightholder, but reduce unauthorised access to information thus minimising revenue loss, which can make hyperlinked ‘consumer’ access to information ‘affordable,’ or even free.  相似文献   
50.
It is increasingly argued that the primary motive of the cybercriminal and the major reason for the continued growth in cyber attacks is financial gain. In addition to the direct financial impact of cybercrime, it can also be argued that the digital data and the information it represents that can be communicated through the Internet, can have additional intrinsic value to the cybercriminal. In response to the perceived value and subsequent demand for illicit data, a sophisticated and self-sufficient underground digital economy has emerged. The aim of this paper is to extend the author’s earlier research that first introduced the concept of the Cybercrime Execution Stack by examining in detail the underlying data objectives of the cybercriminal. Both technical and non-technical law enforcement investigators need the ability to contextualise and structure the illicit activities of the cybercriminal, in order to communicate this understanding amongst the wider law enforcement community. By identifying the potential value of electronic data to the cybercriminal, and discussing this data in the context of data collection, data supply and distribution, and data use, demonstrates the relevance and advantages of utilising an objective data perspective when investigating cybercrime.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号