首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   630篇
  免费   3篇
工人农民   15篇
世界政治   7篇
外交国际关系   447篇
法律   163篇
政治理论   1篇
  2020年   1篇
  2019年   1篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   39篇
  2013年   55篇
  2012年   58篇
  2011年   78篇
  2010年   58篇
  2009年   67篇
  2008年   35篇
  2007年   36篇
  2006年   37篇
  2005年   38篇
  2004年   42篇
  2003年   44篇
  2002年   35篇
  2001年   2篇
  1990年   2篇
  1988年   1篇
  1981年   1篇
排序方式: 共有633条查询结果,搜索用时 15 毫秒
461.
462.
463.
464.
465.
This article addresses property rights in China under four headings. I begin by placing the Chinese case within the larger context of property rights literature. The second section reviews the existing scholarship on property rights in China and identifies existing lacunae. The third section provides the broad contours of the contemporary Chinese intellectual and political discourse over property rights in China. And finally, I offer several cases of property rights that illustrate the variation in the scope of the concept of property rights in China and suggest possible avenues for future research.
The right of property is the guardian of every other right, and to deprive the people of this is in fact to deprive them of their liberty.- Arthur Lee, Virginia, 1775
You reproach us with planning to do away with your property. Precisely so; that is just what we intend.- Karl Marx and Friedrich Engels1
The fact that a legal or economic model does not exist for an activity or a behavior is no reason to oppose it, because the laws can develop out of experience and practice.- Wu Guoping, Yangtze Water Resources Commission2
  相似文献   
466.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications' industries in key jurisdictions across the Asia Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
467.
468.
The principle of information security safeguards is a key information privacy principle contained in every privacy legislation measure, framework, and guideline. This principle requires data controllers to use an adequate level of safeguards before processing personal information. However, privacy literature neither explains what this adequate level is nor how to achieve it. Hence, a knowledge gap has been created between privacy advocates and data controllers who are responsible for providing adequate protection. This paper takes a step toward bridging this knowledge gap by presenting an analysis of how Data Protection and Privacy Commissioners have evaluated the adequacy level of security protection measures given to personal information in selected privacy invasive cases. This study addresses both security measures used to protect personal information against unauthorized activities and the use of personal information in authentication mechanisms. This analysis also lays a foundation for building a set of guidelines that can be used by data controllers for designing, implementing, and operating both technological and organizational measures used to protect personal information.  相似文献   
469.
470.

Purpose

We examine the extent to which components of social learning theory (i.e., definitions, differential reinforcement, and differential association/modeling) predict stalking victimization and perpetration using survey data from a large sample of college students.

Methods

Among a sample of 2,766 college students, logistic regression models were estimated to analyze the relationships between social learning theory and stalking perpetration and victimization.

Results

Results suggest that victimization and perpetration are functions of social learning. The findings also indicated that females were significantly more likely to be both stalking victims and perpetrators.

Conclusions

Regarding stalking perpetration and victimization, our results suggest that there may be responses, attitudes, and behaviors that are learned, modified, or reinforced primarily through interaction with peers. Overall, social learning theory concepts appear to be important predictors of stalking perpetration and victimization that help to develop theoretical explanations for stalking.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号