首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   613篇
  免费   0篇
工人农民   15篇
外交国际关系   446篇
法律   152篇
  2014年   38篇
  2013年   52篇
  2012年   56篇
  2011年   77篇
  2010年   58篇
  2009年   67篇
  2008年   35篇
  2007年   35篇
  2006年   37篇
  2005年   38篇
  2004年   42篇
  2003年   43篇
  2002年   35篇
排序方式: 共有613条查询结果,搜索用时 15 毫秒
271.
272.
We compare the rise of Chinese seapower today to the rise of Imperial German seapower a century ago. The comparison is worthwhile for two reasons. First, the comparison holds merits in its own right. We use German Admiral Wolfgang Wegener's three indices of seapower-strategic position, the fleet, and strategic will to the sea-to assess the two countries’ maritime potential. This analysis leads inexorably to the conclusion that China holds far more potential for seapower that did the Kaiser's Germany. And second, the Chinese themselves are consulting German history as they inquire into the triumphs and failures of past great powers. Trying to divine how they interpret the German experience could let Western practitioners and scholars of grand strategy glimpse China's maritime future. In turn they can improve their own handling of strategy in East Asia.  相似文献   
273.
Two big issues that scholars and strategists need to address are simply: does grand strategy have to be articulated for it to be said to exist at all; and if not, can grand strategy be said to move a nation even when that nation's fluctuating roster of (often competent) leaders are unsure as to why they do anything? My task here is that of a rapporteur and provocateur raising issues on which we may need to reach some consensus.  相似文献   
274.
Attacks on computers and information networks, both public and private, are disclosed in the news daily. Most recently, Apple, Facebook, and Twitter acknowledged that they were attacked and were now taking additional measures to secure their networks. In January of 2013, Kaspersky Labs reported discovering malware that not only targeted government information in Eastern Europe, former Soviet republics, and Central Asia, but also had been actively doing so since 2007. The scope of global cyber attacks is staggering and the solutions to securing property and protecting national security are illusive, in large part because infrastructure is owned and operated by private, rather than public, entities. Nations struggle with choosing the most effective strategy and potential regulation of the private sector in order to reduce overall cybersecurity risk. This paper reviews the nature of cyber threats, and compares the United States and European approach to promoting cybersecurity in the private sector. Furthermore, the paper discusses how different approaches can affect cybersecurity risk, and suggests a framework for visualizing the impact of law and strategy on security.  相似文献   
275.
As global digitalisation of information and interconnecting technologies along with new marketing practices and business processes vastly increase the opportunities for data collection, storage, usage and delivery, there is a corresponding increase in consumer expectations of data privacy. These expectations must be met if business organisations are to promote consumer trust and confidence and maintain their overall competitiveness in a global market. It goes without saying that information is the most valuable business asset and “privacy is good business and information can be the basis of bigger business”. The need to protect data privacy has long been recognised and implemented by major trading nations. Surprisingly, Singapore as a financial centre and nation aspiring to be a trusted data hosting hub has been slow in enacting specific data protection laws. The first piece of legislation that has emerged is a light-touch baseline framework applicable to all organisations except the public sector. This article considers the new legislation from the business perspective and the implications for private sector business organisations facing the challenges of compliance.  相似文献   
276.
With the widespread concerns about cyber terrorism and the frequent use of the term “cyber terrorism” at the present time, many international organisations have made efforts to combat this threat. Since cyber terrorism is an international crime, local regulations alone are not able to defend against such attacks; they require a transnational response. Therefore, an attacked country will invoke international law to seek justice for any damage caused, through the exercise of universal jurisdiction. Without the aid of international organisations, it is difficult to prevent cyber terrorism. At the same time, international organisations determine which state court, or international court, has the authority to settle a dispute. The objective of this paper is to analyse and review the effectiveness and sufficiency of the current global responses to cyber terrorism through the exercise of international jurisdiction. This article also touches upon the notion of cyber terrorism as a transnational crime and an international threat; thus, national regulations alone cannot prevent it. The need for an international organisation to prevent and defend nations from cyber terrorism attacks is pressing. This paper finds that, as cyber terrorism is a transnational crime, it should be subjected to universal jurisdiction through multinational cooperation, and this would be the most suitable method to counter future transnational crimes such as cyber terrorism.  相似文献   
277.
From the end of the twentieth century to the present we have witnessed the effects of technology on the way we consume and distribute information. The print media, which in many ways was the natural product of the printing revolution, has given way to the electronic media with websites providing the new “town squares” in which the public discourse is held on political, economic and social issues among others. The Israeli legal system, like the legal systems in other countries, faces a variety of challenges and complex ethical and legal issues when required to regulate (often retrospectively) the manner and processes through which the discourse will be conducted in the virtual “town hall”. In essence, this article focuses on one of the many questions occupying the Israeli legal system and that is whether website owners should be liable in defamation for speech published by third parties on the Internet (through blogs, tweets on Twitter, posts on Facebook,1 uploaded video clips on YouTube and the like) when no connection exists between the third party and the site owner apart from the fact that the third party has used the website as a platform to publish the offensive speech. The issue of the liability of the website owner has ramifications for the injured party's capacity to institute an action for defamation against the website owner, as often only the latter will be in a position to compensate the injured party (financially) for the offensive speech. The Israeli legal system, which in many ways furnishes a unique and interesting framework for examining the question posed above, as we explain in the body of the article, presents a fascinating example of how the Israeli legislature and the courts have dealt and continue to deal with claims filed against website owners for damage to reputation as a result of speech published by third parties. The article offers a comprehensive review of the status of the right to freedom of speech, anonymity and the right to reputation in Israel, the considerations for and against the imposition of liability on website owners and the latest case law on these questions.  相似文献   
278.
The focus of this paper is on the class of robots for personal or domestic use, which are connected to a networked repository on the internet that allows such machines to share the information required for object recognition, navigation and task completion in the real world. The aim is to shed light on how these robots will challenge current rules on data protection and privacy. On one hand, a new generation of network-centric applications could in fact collect data incessantly and in ways that are “out of control,” because such machines are increasingly “autonomous.” On the other hand, it is likely that individual interaction with personal machines, domestic robots, and so forth, will also affect what U.S. common lawyers sum up with the Katz's test as a reasonable “expectation of privacy.” Whilst lawyers continue to liken people's responsibility for the behaviour of robots to the traditional liability for harm provoked by animals, children, or employees, attention should be drawn to the different ways in which humans will treat, train, or manage their robots-in-the-cloud, and how the human–robot interaction may affect the multiple types of information that are appropriate to reveal, share, or transfer, in a given context.  相似文献   
279.
Heated debates triggered by the plans to introduce the “right to be forgotten” exposed problems the all-encompassing application of rules on data processing may cause in practice. The purpose of this article is to discuss the compatibility of these rules with the rapidly evolving online environment in the context of the need to guarantee human rights on the internet. The author argues that there is an imbalance in the protection of individual rights online. It results from the limited application of personal/household exception and, in general, the narrow understanding of the concept of online privacy. According to the author in order for data protection laws to flesh out not only the fundamental right of data protection, but also play a mediatory role in balancing other rights, the application of the personal/household exception should be extended to include private online activities. This would reflect the complex character of the very concept of online privacy, diversity of actors and activities shaping online “territories”, as well as the increasingly heterogeneous fabric of the Web.  相似文献   
280.
Are Americans becoming more “isolationist”? Four years ago, for the first time since the Vietnam War, almost half of those polled by the Pew Research Center stated they would rather the United States “mind [its] own business internationally and let other countries get along the best they can on their own” and work to “reduce military commitments overseas” in order to decrease the deficit. Such cautious views about American involvement abroad are on the rise, up ten percentage points over the past decade, according to Pew polls released in 2011 and 2012. A majority of Americans think the United States is withdrawing from Afghanistan too slowly and are reticent to take direct action in Syria. This article explains the long historical context of these recent events to argue for the enduring power and significance of isolationist thought.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号