全文获取类型
收费全文 | 754篇 |
免费 | 18篇 |
专业分类
各国政治 | 48篇 |
工人农民 | 116篇 |
世界政治 | 70篇 |
外交国际关系 | 25篇 |
法律 | 334篇 |
中国政治 | 8篇 |
政治理论 | 162篇 |
综合类 | 9篇 |
出版年
2023年 | 4篇 |
2021年 | 4篇 |
2020年 | 16篇 |
2019年 | 15篇 |
2018年 | 21篇 |
2017年 | 12篇 |
2016年 | 25篇 |
2015年 | 23篇 |
2014年 | 25篇 |
2013年 | 114篇 |
2012年 | 16篇 |
2011年 | 37篇 |
2010年 | 13篇 |
2009年 | 22篇 |
2008年 | 19篇 |
2007年 | 29篇 |
2006年 | 24篇 |
2005年 | 18篇 |
2004年 | 23篇 |
2003年 | 16篇 |
2002年 | 18篇 |
2001年 | 22篇 |
2000年 | 18篇 |
1999年 | 11篇 |
1998年 | 12篇 |
1997年 | 12篇 |
1996年 | 13篇 |
1995年 | 10篇 |
1994年 | 11篇 |
1993年 | 6篇 |
1992年 | 7篇 |
1991年 | 9篇 |
1990年 | 11篇 |
1989年 | 12篇 |
1988年 | 5篇 |
1987年 | 7篇 |
1986年 | 11篇 |
1985年 | 11篇 |
1984年 | 7篇 |
1983年 | 11篇 |
1982年 | 12篇 |
1980年 | 4篇 |
1978年 | 5篇 |
1977年 | 12篇 |
1976年 | 4篇 |
1975年 | 3篇 |
1974年 | 6篇 |
1973年 | 7篇 |
1968年 | 3篇 |
1966年 | 4篇 |
排序方式: 共有772条查询结果,搜索用时 0 毫秒
771.
Research Summary
This qualitative interview study examined individual and social aspects in the lives of 15 hackers who started with ethical hacking before the age of 18. We examined what motivated and stimulated them to start with ethical hacking and how and why they continued. Results show that individual aspects, such as an early interest in ICT (Information and Communication Technology), the motivation to make systems more secure, and thinking of reporting vulnerabilities as a moral duty, contribute to the initiation of ethical hacking. Social aspects, such as role models, mainly play a role in the further development of the ethical hacking career. For example, peers, parents, friends, and hacker communities have a motivating and stimulating effect on young ethical hackers. Similarly, positive reactions from public and private system owners can further stimulate the development and self-image of ethical hackers.Policy Implications
In contrast to criminal hackers, ethical hackers improve cybersecurity, for example, by reporting weaknesses or errors in computer systems. Nowadays, an increasing number of public and private organizations around the world are creating cybersecurity policies and practices around ethical hacking. The interest in hacking usually arises at an early age, making it important to gain knowledge about what stimulates and motivates young people to start and continue with ethical hacking, to inform these policies and practices. Our results show that recognition and reactions from system owners are important in the ethical hacking career. Our recommendations based on these results could stimulate more young people to take the ethical path. Simultaneously, this increases the security of public and private organizations, reducing opportunities for criminal hackers. 相似文献772.
Megan C. Evans 《Australian Journal of Public Administration》2023,82(2):228-247
Policy-makers are frequently required to consider and manage conflicting public values. An example of this in the environmental domain is biodiversity offset policy, which governments worldwide have adopted as a mechanism to balance environmental protection with socio-economic development. However, little work has examined administrative practices underpinning biodiversity offset policy implementation, and how the adoption of coping strategies to manage value conflicts may influence resulting policy outcomes. This study fills this research gap using a case study of Australia's federal biodiversity offset policy under the Environment Protection and Biodiversity Conservation (EPBC) Act 1999. Using data from 13 interviews of federal policy administrators, I show that the introduction of a new policy in 2012 enabled a shift from the use of precedent to a technical approach for setting offset requirements under the EPBC Act. Yet, multiple sources of policy ambiguity remain, and administrators have adopted post-approval condition-setting, or ‘backloading’—a form of cycling, facilitated by structural separation—to defer detailed assessments of offset requirements until after biodiversity losses are approved. Backloading thus undermines the effectiveness of environmental policy and will persist as coping strategy unless policy ambiguity is reduced via legislative amendments and adequate resourcing of biodiversity conservation.
Points for practitioners
- Biodiversity offset policy requires administrators to manage conflicting environmental and socioeconomic values.
- Technical decision tools reduce reliance on case-by-case decision-making, but multiple ambiguities persist.
- Backloading (post-approval condition-setting) defers values conflict, but reduces transparency, accountability, and policy effectiveness.
- Policy ambiguity must be reduced at the political level to facilitate effective biodiversity conservation.