首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   134篇
  免费   2篇
各国政治   1篇
工人农民   34篇
世界政治   8篇
外交国际关系   2篇
法律   81篇
政治理论   10篇
  2023年   1篇
  2021年   2篇
  2020年   1篇
  2019年   2篇
  2018年   8篇
  2017年   7篇
  2016年   4篇
  2015年   2篇
  2014年   6篇
  2013年   22篇
  2012年   9篇
  2011年   7篇
  2010年   1篇
  2009年   6篇
  2008年   9篇
  2007年   10篇
  2006年   6篇
  2005年   1篇
  2004年   3篇
  2003年   3篇
  2002年   1篇
  2001年   3篇
  2000年   4篇
  1999年   5篇
  1997年   1篇
  1996年   2篇
  1995年   2篇
  1993年   3篇
  1992年   2篇
  1989年   1篇
  1987年   1篇
  1978年   1篇
排序方式: 共有136条查询结果,搜索用时 0 毫秒
121.
How can we eradicate violence against women? How, at least, can we reduce its prevalence? One possibility offered by Catharine MacKinnon is to harness international human rights norms, especially prohibitions on torture, and apply them to sexual violence with greater rigour and commitment than has hitherto been the case. This article focuses particularly on the argument that all rapes constitute torture in which states are actively complicit. It questions whether a feminist strategy to reconceptualise rape as torture should be pursued, suggesting that we retain the label ‘rape’ due to its gendered meaning and powerful associations. It is also claimed that we may lose sight of the commonality of rape in calling it torture, as well as obscuring the varied responses of women survivors. Finally, the article canvasses the idea that we recognise the different circumstances and contexts in which rape takes place, which may mean different criminal offences for different rapes; for example, preserving the label ‘torture’ for those rapes in which state officials are participants.  相似文献   
122.
Zip guns and the atypical gunshot wounds they produce are rare in forensic pathology. Because of this, investigators and forensic pathologists may be unfamiliar with their construction, appearance, and the wounds associated with them. A 43-year-old mechanic, with a history of depression was found dead in a washroom stall at work with an atypical gunshot wound of the head. Upon initial investigation, no weapon was found at the scene. Due to the nature of the scene, and the unusual characteristics of the wound, the manner of death was at first thought to be a homicide. Subsequently, a simple zip gun, which had been overlooked during the scene investigation, was discovered by a co-worker while he was cleaning the stall. Examination of the wound revealed evidence of contact range firing. A markedly deformed bullet was recovered from the head, consistent with the use of the home-made gun. These findings, along with further police investigation and review of the past medical history, indicated that the manner of death was a suicide.  相似文献   
123.
This article reports on preliminary findings and recommendations of a cross-discipline project to accelerate international business-to-business automated sharing of cyber-threat intelligence, particularly IP addresses. The article outlines the project and its objectives and the importance of determining whether IP addresses can be lawfully shared as cyber threat intelligence.The goal of the project is to enhance cyber-threat intelligence sharing throughout the cyber ecosystem. The findings and recommendations from this project enable businesses to navigate the international legal environment and develop their policy and procedures to enable timely, effective and legal sharing of cyber-threat information. The project is the first of its kind in the world. It is unique in both focus and scope. Unlike the cyber-threat information sharing reviews and initiatives being developed at country and regional levels, the focus of this project and this article is on business-to-business sharing. The scope of this project in terms of the 34 jurisdictions reviewed as to their data protection requirements is more comprehensive than any similar study to date.This article focuses on the sharing of IP addresses as cyber threat intelligence in the context of the new European Union (EU) data protection initiatives agreed in December 2015 and formally adopted by the European Council and Parliament in April 2016. The new EU General Data Protection Regulation (GDPR) applies to EU member countries, a major focus of the international cyber threat sharing project. The research also reveals that EU data protection requirements, particularly the currently applicable law of the Data Protection Directive 95/46/EC (1995 Directive) (the rules of which the GDPR will replace in practice in 2018), generally form the basis of current data protection requirements in countries outside Europe. It is expected that this influence will continue and that the GDPR will shape the development of data protection internationally.In this article, the authors examine whether static and dynamic IP addresses are “personal data” as defined in the GDPR and its predecessor the 1995 Directive that is currently the model for data protection in many jurisdictions outside Europe. The authors then consider whether sharing of that data by a business without the consent of the data subject, can be justified in the public interest so as to override individual rights under Articles 7 and 8(1) of the Charter of Fundamental Rights of the European Union, which underpin EU data protection. The analysis shows that the sharing of cyber threat intelligence is in the public interest so as to override the rights of a data subject, as long as it is carried out in ways that are strictly necessary in order to achieve security objectives. The article concludes by summarizing the project findings to date, and how they inform international sharing of cyber-threat intelligence within the private sector.  相似文献   
124.
In Person     
Clare, a partner in London solicitors Collyer Bristow, specializesin IP litigation. Much of her work involves trade mark/passingoff litigation, although copyright and design orientated mattersalso constitute important areas of practice for her,  相似文献   
125.
126.
Previous research has produced mixed findings on the role of child and family factors in the genesis of childhood cruelty. The authors examined the relationships of cruelty to animals to a range of child and family factors. First, the authors test the idea that cruelty is a callous aggression that will be more strongly associated with psychopathic (callous or unemotional, CU) traits than general externalizing problems. Second, the authors operationalize family problems as open conflict rather than parenting problems as used earlier. Results indicated that for both genders, CU traits were associated strongly with cruelty. For boys, externalizing problems also added prediction in regression analyses. Family conflict was not associated with cruelty for either. These results suggest that cruelty to animals may be an early manifestation of the subgroup of children developing conduct problems associated with traits of low empathy and callous disregard rather than the more common pathway of externalizing problems and parenting problems.  相似文献   
127.
128.
129.
This article discusses methods and mediums of obtaining informed consent in physiotherapy clinical practice, specifically in relation to cervical manipulation. Whilst cervical manipulation is a useful method of treatment for spinal joint pain and dysfunction, it has also been shown to be ineffective or even positively harmful. Legal precedents have set boundaries for informing patients of such adverse consequences. However, a degree of uncertainty exists in the physiotherapy profession, as in other health care professions, as to how to obtain informed consent in a busy clinical setting in order to discharge the legal duties owed. Obtaining meaningful informed consent in clinical practice raises issues of patient comprehension, memory and decision-making capacity. A large quantity of research directed at enhancing patient understanding has been undertaken in recent years. The important findings are that a variety of communication methods and mediums need to be employed in both providing information and assessing patient understanding. A combination of verbal, written and audiovisual information provides patients with maximum opportunity to be involved in treatment decisions.  相似文献   
130.
Over the past decade, digital identity has gone from a largely unrecognized emergent legal concept to something that is now well known, but still not fully understood. Most individuals now know that they have a digital identity but its legal nature, its transactional functions, and its implications now and for the future, are not generally well understood.This article tracks the emergence of digital identity from the time it was recognized as a new legal and commercial concept to the present time; and outlines its impact and significance for individuals, governments, the private sector and even what is means to be a nation and a citizen in the digital era. The author recounts her experience in recognizing the implications of digital identity in 2006 to its current importance and the implications of future evolutions including an international digital identity, the groundwork for which is being laid now.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号