首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   630篇
  免费   3篇
工人农民   15篇
世界政治   7篇
外交国际关系   447篇
法律   163篇
政治理论   1篇
  2020年   1篇
  2019年   1篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   39篇
  2013年   55篇
  2012年   58篇
  2011年   78篇
  2010年   58篇
  2009年   67篇
  2008年   35篇
  2007年   36篇
  2006年   37篇
  2005年   38篇
  2004年   42篇
  2003年   44篇
  2002年   35篇
  2001年   2篇
  1990年   2篇
  1988年   1篇
  1981年   1篇
排序方式: 共有633条查询结果,搜索用时 15 毫秒
471.
The principle of information security safeguards is a key information privacy principle contained in every privacy legislation measure, framework, and guideline. This principle requires data controllers to use an adequate level of safeguards before processing personal information. However, privacy literature neither explains what this adequate level is nor how to achieve it. Hence, a knowledge gap has been created between privacy advocates and data controllers who are responsible for providing adequate protection. This paper takes a step toward bridging this knowledge gap by presenting an analysis of how Data Protection and Privacy Commissioners have evaluated the adequacy level of security protection measures given to personal information in selected privacy invasive cases. This study addresses both security measures used to protect personal information against unauthorized activities and the use of personal information in authentication mechanisms. This analysis also lays a foundation for building a set of guidelines that can be used by data controllers for designing, implementing, and operating both technological and organizational measures used to protect personal information.  相似文献   
472.
473.

Purpose

We examine the extent to which components of social learning theory (i.e., definitions, differential reinforcement, and differential association/modeling) predict stalking victimization and perpetration using survey data from a large sample of college students.

Methods

Among a sample of 2,766 college students, logistic regression models were estimated to analyze the relationships between social learning theory and stalking perpetration and victimization.

Results

Results suggest that victimization and perpetration are functions of social learning. The findings also indicated that females were significantly more likely to be both stalking victims and perpetrators.

Conclusions

Regarding stalking perpetration and victimization, our results suggest that there may be responses, attitudes, and behaviors that are learned, modified, or reinforced primarily through interaction with peers. Overall, social learning theory concepts appear to be important predictors of stalking perpetration and victimization that help to develop theoretical explanations for stalking.  相似文献   
474.

Purpose

Research examining factors that precipitate gang violence has contributed substantially to our understanding of gangs and gang activity with respect to offending, yet we still know relatively little about how gangs influence members’ risk of victimization. The current study examines three hypotheses: (1) gang involvement and involvement in other risky lifestyles is related to violent victimization, (2) involvement in gang crime is associated with violent victimization, and (3) the presence of rival gangs is related to violent victimization.

Methods

The present study uses data obtained from 909 recently booked juvenile arrestees who were interviewed as part of the Arizona Arrestee Drug Abuse Monitoring (ADAM) program.

Results

Our findings indicated that prevalence of violent victimization was highest among gang members, followed by former gang members, gang associates, and non-gang members. After controlling for involvement in gang crime, however, gang membership per se did not significantly influence the juveniles’ risk of serious violent victimization.

Conclusions

Our results call into question the conclusion that gang membership alone increases the likelihood of violent victimization vis-à-vis lifestyle/routine activities and/or collective liability. Instead our findings support prior research on the victim-offender overlap, that offending behaviors increase the risk of victimization.  相似文献   
475.
Innovation is a shared purpose of both intellectual property (IP) and competition law. However, sometimes competition law conflicts with the interests of IP holders. This paper searches for an adequate criterion of practical concordance, which consists of evaluating, in the concrete situation, which of those regulations best performs the purpose of promoting innovation. It is considered that requirements of competition law shape IP regulations, but the internal limits of protection therein identified are not enough to safeguard concerns of competition law. In particular, European courts held that, in exceptional circumstances, IP holders with market dominant position can be compelled to grant licenses of IP protected goods, such as copyrighted information and software. Such lifting of the IP exclusion power finds its rationale in preserving competition and promoting innovation, which is particularly sensitive within the dynamic software market.  相似文献   
476.
Inspired by the cloud computing hypes, this paper responds to some of the hypes, but not to all. The hype in this paper refers to the level of the adequacy of data protection and privacy in a cloud computing (the Cloud) environment. Paradoxically, this paper proffers observational insights that surround the Cloud from the perspectives of data protection and privacy. It examines briefly the efforts of January 2010 led by Microsoft and anticipating “liability” scenarios. The liability rhetorically refers to the illegal access in the Cloud. This paper does not focus entirely on the technology sophistication; however, it analyses two scenarios of illegal access. To mitigate the liability, it suggests a “Cloud Compliant Strategy (CCS)” being a proposed model to control the Cloud. The observational insights of this paper have also intertwined with the adequacy of data protection from the lenses of the European Union (EU) Data Protection Directive 95/46/EC (DPD) and Safe Harbor provisions (SH).  相似文献   
477.
The Council of Europe is engaging in a process of revising its Data Protection Convention (Convention 108) to meet and overcome these challenges. The Council of Europe celebrates this year the 30th Anniversary of its Data Protection Convention (usually referred to as Convention 108) which has served as the backbone of international law in over 40 European countries and has influenced policy and legislation far beyond Europe’s shores. With new data protection challenges arising every day, the Convention is revising its Data Protection Convention. Computer Law and Security Review (CLSR) together with the Intl. Association of IT Lawyers (IAITL) and ILAWS have submitted comments in response to the Expert Committee’s public consultation on this document. CLSR aims to position itself at the forefront of policy discussion drawing upon the high quality scholarly contributions from leading experts around the world.  相似文献   
478.
The deterioration of relations between Israel and Turkey, culminating in the “Gaza flotilla” affair of June 2010, are part of a reorientation in the Turkish foreign policy over the past several years: a move away from the West and toward Muslim states and non-state groups, including such radical actors as Iran, Hamas and Hizballah. This article reviews the rationale for the Israeli-Turkish strategic partnership in the 1990s and the early years of this century. It then documents deviations in Turkish foreign policy from Western patterns. Next it examines how changes in Turkey's twenty-first century strategic environment, as well as in the domestic arena, led to a reorientation of Turkish foreign policy and to current tensions in bilateral relations. And finally, it assesses the impact of the changes in Turkish foreign policy on the Greater Middle East and global politics.  相似文献   
479.
Beginning with a historical perspective on foreign fighters, this article then seeks to clarify ambiguities and biases that shape how we often analyze the foreign fighter phenomenon. The central focus is then on the evolving trends and activities of the movement. A new generation of fighters has emerged who are comfortable as terrorists, recruiters, trainers and media propagandist, among other specialties. The author concludes by assessing the significance of the problem today.  相似文献   
480.
This article argues that multilateral mechanisms for addressing security issues in East Asia are weak and that a key reason is the hollowness of China's ostensible and much-touted commitment to multilateralism. This is especially troubling when the region faces major security challenges and regional relations (and China's approach to them) appear to be moving from “economics in command” to “security in command.” The article concludes with a prediction that “A coordinated approach to combining alliances and quasi-alliances exclusive of China with multilateralism inclusive of it will best test China's intentions during this decade.”  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号