首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   613篇
  免费   0篇
工人农民   15篇
外交国际关系   446篇
法律   152篇
  2014年   38篇
  2013年   52篇
  2012年   56篇
  2011年   77篇
  2010年   58篇
  2009年   67篇
  2008年   35篇
  2007年   35篇
  2006年   37篇
  2005年   38篇
  2004年   42篇
  2003年   43篇
  2002年   35篇
排序方式: 共有613条查询结果,搜索用时 15 毫秒
361.
King Hussein had come to embody his country and bequeathed a much more robust state than the one he inherited, the author argues.  相似文献   
362.

Purpose

The current study tests the shadow of sexual assault hypothesis and extends recent research by examining whether the fear of physical harm or the fear of sexual assault has a greater impact on fear of other crimes.

Methods

To determine the unique interaction between gender and fear, we conduct separate analyses among men and women.

Results

While fear of physical harm and fear of sexual intrusion are both predictive of fear of home invasion, robbery, and murder, fear of physical harm has a significantly greater impact across all types of fear (e.g., home invasion, robbery, murder).

Conclusions

Despite previous empirical evidence that suggests fear operates differently among men and women, our findings suggest that fear of physical harm - rather than fear of sexual intrusion - is a more robust predictor of fear of crime among both men and women.  相似文献   
363.
In the last few years there has been a lot of buzz around a so-called ‘right to be forgotten’. Especially in Europe, this catchphrase is heavily debated in the media, in court and by regulators. Since a clear definition has not emerged (yet), the following article will try to raise the veil on this vague concept. The first part will weigh the right’s pros and cons against each other. It will appear that the ‘right to be forgotten’ clearly has merit, but needs better definition to avoid any negative consequences. As such, the right is nothing more than a way to give (back) individuals control over their personal data and make the consent regime more effective. The second part will then evaluate the potential implementation of the right. Measures are required at the normative, economical, technical, as well as legislative level. The article concludes by proposing a ‘right to be forgotten’ that is limited to data processing situations where the individual has given his or her consent. Combined with a public interest exception, this should (partially) restore the power balance and allow individuals a more effective control over their personal data.  相似文献   
364.
Roads are ever more congested, pollution keeps rising and traffic-related deaths remain at unacceptable levels. It is clear that society’s needs with regard to transportation and mobility have become unsustainable. Intelligent Transport Systems (ITS) are often heralded as a potential solution to this problem, yet have still to yield tangible results. The EU has, however, adopted the ITS Directive, aiming for an EU-wide implementation of ITS solutions. Three questions are raised. First, can the ITS Directive really provide for the required substantial provisions in this field? Second, as ITS solutions are often deemed to be pervasive and intrusive, how does the ITS Directive interact with the EU legal framework on privacy and data protection? Third, given the involvement of private commercial entities in the field of providing road, traffic and travel data, can a public–private partnership be found to allow for the re-use of both public and private sector data in ITS solutions?  相似文献   
365.
The decline in the United States’ relative position is in part a consequence of the burdens and susceptibilities produced by unipolarity. Contrary to the conventional wisdom, the U.S. position both internationally and domestically may actually be strengthened once this period of unipolarity has passed.  相似文献   
366.
Former Secretary of the Navy remembers his classmate from the University of Pennsylvania's International Relations program. Their subsequent careers intersected often in the years ahead—in Philadelphia, Washington, and beyond. John Lehman said Harvey “was an invaluable counsel on matters great and small, professional and personal.”  相似文献   
367.
368.
369.
This paper points out some unexpected relationships between specific aspects of contract law and specific Internet-related technologies. The discussion is not about the interplay between “Law” and “Technology,” or the “Law” and the “Internet.” The aim is modest: to identify some theoretical chokepoints created by the technologies involved in web-based commerce and to point out the legal uncertainties persisting in this area. The analysis is confined to the process of contract formation, not to matters of substantive law. It is during this process that parties assume their contractual obligations and the contents of a contract crystallize.  相似文献   
370.
In the period after World War II, an eclectic assortment of scholars, policymakers, and managers presided over the creation of academic centers for the study of war. This article examines the intellectual and administrative assumptions of many of these actors. Made up of academic scholars from the fields of political science, sociology, and economics, they advanced a vision based on what might be called “instrumentalist-positivist social science,” but in appeals to donors they employed basic scientific language.1  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号