首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   158篇
  免费   9篇
各国政治   21篇
工人农民   3篇
世界政治   29篇
外交国际关系   21篇
法律   62篇
政治理论   31篇
  2023年   1篇
  2022年   4篇
  2021年   2篇
  2020年   14篇
  2019年   7篇
  2018年   12篇
  2017年   12篇
  2016年   13篇
  2015年   5篇
  2014年   6篇
  2013年   30篇
  2012年   9篇
  2011年   3篇
  2010年   4篇
  2009年   3篇
  2008年   2篇
  2007年   6篇
  2005年   3篇
  2004年   3篇
  2003年   2篇
  2002年   4篇
  2001年   5篇
  2000年   1篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   1篇
  1991年   3篇
  1990年   2篇
  1988年   3篇
  1987年   2篇
  1981年   1篇
排序方式: 共有167条查询结果,搜索用时 0 毫秒
31.
This article analyses the regulatory framework of e-commerce jurisdiction in the European Union (EU). Firstly, it discusses and analyses the current regime under the Brussels Regulation, highlighting its success in consumer protection and the deficiencies for e-commerce jurisdiction, which need to be addressed. Secondly, the article compares the EU regime with that of the United States (US). It is argued that the US courts follow uncertain and distinct approaches compared to the clear rules of the Brussels Regulation. Their present approach of minimum contacts analysis as followed in the Yahoo! case poses problems for a transnational EU litigant in similar cases. Thirdly, the article examines the recent proposals adopted by the European Commission to remedy the deficiencies in the Regulation. The most important change proposed is the inclusion of third-state defendants within its ambit. It is argued that the changes to be adopted by the European Parliament are insufficient, and the author therefore provides recommendations. Lastly, the article highlights the inability of the proposed changes to address the deficiencies identified by the discussion.  相似文献   
32.
33.
This paper investigates whether computer forensic tools (CFTs) can extract complete and credible digital evidence from digital crime scenes in the presence of file system anti-forensic (AF) attacks. The study uses a well-established six stage forensic tool testing methodology based on black-box testing principles to carry out experiments that evaluate four leading CFTs for their potential to combat eleven different file system AF attacks. Results suggest that only a few AF attacks are identified by all the evaluated CFTs, while as most of the attacks considered by the study go unnoticed. These AF attacks exploit basic file system features, can be executed using simple tools, and even attack CFTs to accomplish their task. These results imply that evidences collected by CFTs in digital investigations are not complete and credible in the presence of AF attacks. The study suggests that practitioners and academicians should not absolutely rely on CFTs for evidence extraction from a digital crime scene, highlights the implications of doing so, and makes many recommendations in this regard. The study also points towards immediate and aggressive research efforts that are required in the area of computer forensics to address the pitfalls of CFTs.  相似文献   
34.
The present study aims at understanding the application of Internet of Things (IoT) in online food retailing, influencing purchase frequency of ready‐to‐eat food products. The research is empirical in nature in which an internet based consumer survey was conducted to collect 329 valid responses on PAN India basis. This research comprehensively investigated, shortlisted, and finally selected the factors of consumer involvement and decision making using IoT in online food retailing. The binary logistic regression model revealed that the factors relative advantage, best deals, availability and information, consumer satisfaction, and channel efficiency significantly influences the consumer purchase frequency for ready‐to‐eat food products at various stages in online food retailing. The understanding, extrapolation, and proper management of these factors will help online food retail players in implementing IoT enable services effectively in their retail formats to gain consumer confidence.  相似文献   
35.
This article highlights the personal and professional problems of NGO fieldworkers in Bangladesh. The paper draws on field research with the front-line workers of four NGOs, their clients, immediate superiors, and senior management. Fieldworkers face personal problems such as job insecurity, financial hardships, difficulties with accommodation, and family dislocation. These problems differ according to gender, marital status, and age. Professional problems include training, promotion, and transfer. In addition, fieldworkers face problems in their external relationships, including suspicion, resistance or lack of cooperation from religious leaders and local e´lites, time and resource constraints, competition for clients, and eagerness of the intended beneficiaries simply to get access to financial or material benefits. It will be argued that the strengths of the fieldworkers of Southern NGOs have been largely unexplored and undervalued.  相似文献   
36.
37.
38.
39.
Intimate partner violence (IPV) during pregnancy has been associated with multiple negative health outcomes including emotional distress during pregnancy. However, little is known about IPV during pregnancy and its association with emotional distress among South African women. The objectives of this study were to determine the prevalence of both emotional distress and IPV during pregnancy, to identify whether different exposures of violence were associated with emotional distress and to assess whether social support attenuated the relationship between IPV and emotional distress. Pregnant women enrolled in the South Africa HIV Antenatal and Posttest Support Study (SAHAPS) who completed the baseline survey were included in this cross sectional analysis. We used logistic regression models to explore bivariate and multivariate relationships between the proposed covariates and emotional distress. Nearly a quarter of women experienced some type of IPV during the current pregnancy, with psychological violence being the most prevalent. The odds of emotional distress was 1.41 times (95% CI: [1.26, 1.57]) higher for each additional episode of psychological violence and 2.01 times (95% CI: [1.16, 3.77]) higher for each additional episode of sexual violence during pregnancy, adjusting for other covariates. Physical violence was only marginally associated with increased odds of emotional distress. Finally, social support was marginally significant as a main effect but did not attenuate the relationship between IPV and emotional distress. The high prevalence of IPV among South African women and its association with emotional distress during pregnancy suggest that interventions that reduce violence during or prior to pregnancy are needed.  相似文献   
40.
The paper links a simple aggregate model of growth‐cum‐external debt with an empirical formula for debt‐servicing capacity. Through simulations of growth and debt patterns, using data related to two groups of LDCs, the underlying conditions and the pattern of debt service problems which emerge are studied. Simulation of policies designed to alleviate debt‐service problems allows an assessment of the efficiency and suitability of different policies. The time dimension of debt problems and its relevance to policy are considered as well. The study raises doubts regarding the applicability of accepted beliefs and rules of thumb related to external debt management.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号