全文获取类型
收费全文 | 656篇 |
免费 | 0篇 |
专业分类
各国政治 | 2篇 |
工人农民 | 15篇 |
世界政治 | 1篇 |
外交国际关系 | 449篇 |
法律 | 188篇 |
政治理论 | 1篇 |
出版年
2023年 | 1篇 |
2021年 | 2篇 |
2020年 | 2篇 |
2019年 | 3篇 |
2017年 | 2篇 |
2016年 | 4篇 |
2015年 | 5篇 |
2014年 | 40篇 |
2013年 | 56篇 |
2012年 | 57篇 |
2011年 | 78篇 |
2010年 | 60篇 |
2009年 | 71篇 |
2008年 | 36篇 |
2007年 | 35篇 |
2006年 | 38篇 |
2005年 | 39篇 |
2004年 | 43篇 |
2003年 | 43篇 |
2002年 | 35篇 |
2001年 | 2篇 |
1990年 | 2篇 |
1989年 | 1篇 |
1966年 | 1篇 |
排序方式: 共有656条查询结果,搜索用时 31 毫秒
161.
This paper explores the European Commission’s proposal for a new Regulation to update and reform data protection law in Europe. As regards the Regulation itself, without presenting an exhaustive analysis of all the provisions, this paper aims to highlight some significant changes proposed to the data protection regime by comparison between Directive 95/46 and the proposed Regulation. It takes particularly into account legislative innovation concerning data protection principles, data subjects’ rights, data controllers and data processors obligations, and the regulation of technologies. Before analyzing these innovations, it introduces some considerations about the Commission’s choice to use a Regulation instead of a Directive to harmonize national data protection regime. 相似文献
162.
The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity and exposes flaws in popular legal arguments on the subject. Problems of mistaken identity must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence of identity theft and the greater difficulty of authenticating the other transacting party. The trend to preserve the privacy of Internet users indirectly clashes with efforts to ensure transactional security in e-commerce. An indispensable prerequisite of the latter is the ability to identify the other party to the contract. The problem of mistaken identity is not new – but it assumes a different scale in e-commerce transactions. 相似文献
163.
Colin Dueck Author Vitae 《Orbis》2011,55(1):30-52
The United States has never followed only one grand strategy at a time. In this article, I develop the concept of “hybrid” grand strategies—strategies that vary by time and place, and combine the advantages (or disadvantages) of pure strategic archetypes such as containment, integration, regime change, bargaining, or non-intervention. I argue that hybrid strategies have been ubiquitous in American history, varying more by emphasis and degree than by absolute contrast. Moreover, U.S. hybrid strategies have often succeeded in accomplishing their major goals. 相似文献
164.
Clark Murdock Author VitaeAuthor Vitae 《Orbis》2011,55(4):541-557
This article hopes to contribute to the strategic content of U.S. foreign policy by offering a definition of grand strategy and case for reorienting U.S. policy around it. Rather than advocate a specific grand strategy—a matter still open for debate—the analysis concludes with a set of attributes to assess whether a proposed grand strategy constitutes a “good” grand strategy. It concludes by introducing the concept of an applied grand strategy approach, which may help to identify and assess the strategic implications of foreign policy choices. 相似文献
165.
Marie Skubak TillyerAuthor Vitae Brenda VoseAuthor Vitae 《Journal of criminal justice》2011,39(5):452
Purpose
Despite a longstanding tradition in criminology to consider the impact of neighborhood context on crime-related outcomes, criminologists have largely ignored the influence of social ecology on recidivism until recently. The purpose of the present study was to examine the main and moderating influences of social ecology on recidivism.Materials and Methods
The present study used hierarchical nonlinear modeling to estimate the effects of concentrated disadvantage, immigrant concentration, and residential stability on recidivism for a sample of offenders released from custody/supervision in 2006 and nested within Iowa counties. We controlled for individual-level risk for recidivism using the Level of Service Inventory-Revised (LSI-R), a validated risk assessment instrument. We also examined whether the relationship between LSI-R score and recidivism varied across counties, and if so, whether this variation can be explained by social structural characteristics.Results
Results indicate that residential stability was the only contextual variable significantly related to recidivism. The relationship between individual-level risk and recidivism did not vary across contexts.Conclusions
The findings suggest that the social structural context has limited influence on recidivism, while the LSI-R is a robust predictor of recidivism across contexts. We discuss the implications of our findings for theory, practice, and future research. 相似文献166.
Rolf H. WeberAuthor Vitae 《Computer Law & Security Report》2011,27(2):133-138
Accountability of governing bodies in the Internet of Things (IoT) is of major importance and requires a partly different approach than applied in the (general) Internet. Improving accountability makes the implementation of new general principles necessary in order to provide for a stable and foreseeable legal framework on which businesses can rely. In particular, standards need to be introduced that hold governing bodies accountable, information should be made more readily available and beneficiaries of accountability must be able to impose some sort of sanction on the accountable in case of non-compliance. Improving accountability by creating such framework also supports the betterment of security in the Internet of Things. 相似文献
167.
Liqun CaoAuthor Vitae Yung-Lien LaiAuthor VitaeRuohui ZhaoAuthor Vitae 《Journal of criminal justice》2012,40(1):40
Purpose
The present study tests the hypothesis that regime nature as a structural characteristic explains variations in public confidence in the police.Methods
Combining five sources of data from 50 nations with 69,309 respondents, the current article extends the extant research by using hierarchical logistic regression analyses with ample sample sizes at both levels to test the hypothesis with a series of control variables.Findings
In addition to the largely consistent findings from the individual-level predictors, the results show that that there is a U-shaper convex curvilinear relationship between the levels of democracy and confidence in the police. Residents in long-term stable authoritarian regimes as well as in long-term stable democracies display elevated levels of confidence in the police, whereas short-term or unstable authoritarian nations and nations in democratic transition have the lowest level of confidence in the police. Besides, confidence in the police is higher among citizens in nations with more government efficiency and is lower among residents of countries with higher homicide rates.Conclusion
Regime nature is important in understanding confidence in the police. In addition, governments should make more efforts to promote their efficiency in order to win citizens’ support and they are expected to reduce homicide rates. 相似文献168.
Gisela BichlerAuthor Vitae Carlena A. OroscoAuthor Vitae Joseph A. SchwartzAuthor Vitae 《Journal of criminal justice》2012,40(1):83
Purpose
This research fulfills a void in offender mobility discourse. Metropolitan socioeconomic and spatial structure, defined in crime pattern theory as the urban backcloth, plays a significant role in shaping travel behavior; and yet, current analysis of offender mobility continues to favor individual characteristics to account for travel range.Methods
Using a large sample of juveniles, both delinquent and at-risk youth (N = 2,552), this study compared the predictive utility of individual characteristics against indicators of urban backcloth.Results
Delinquent youth were found to be more sensitive to the environmental conditions exerted by community-level socioeconomic characteristics than their at-risk counterparts. However, two factors—intercity hierarchical structure and motor vehicle access—accounted for travel variability among all youth.Conclusions
Offending behavior must be examined within the context of a dynamic environmental context formed by the metropolitan socioeconomic and spatial structure. Delinquents constitute an identifiable subgroup of youth. 相似文献169.
Daniel P. MearsAuthor Vitae Joshua C. CochranAuthor VitaeWilliam D. BalesAuthor Vitae 《Journal of criminal justice》2012,40(5):370
Purpose
This study examines gender differences in the effectiveness of prison in reducing recidivism.Methods
Using data on released male and female prisoners, we apply a propensity score matching methodology to compare the effects of prison on recidivism versus three counterfactual conditions—jail, intensive probation, and probation.Results
The analyses indicated that a prison term, as compared to placement on intensive probation or traditional probation, is associated with a greater likelihood of property and drug recidivism. There was little evidence that recidivism was greater when compared to jail, that prison increased the likelihood of violent or other recidivism, or that the criminogenic effect of prison is appreciably greater for females or males.Conclusions
The findings do not support arguments that prison is an effective alternative to non-incarcerative punishments or that it exerts a differential effect on females or males. Further research is needed on what features of the prison experience contribute to the observed effects. 相似文献170.
Cyber pornography plays an accessory role in negative social issues such as child abuse, violence against women, rape, inequality, relationship and family breakdown, youth crime, promiscuity and sexually transmitted diseases. Cyberspace and the pornographic matter transmitted through it have created challenges for India’s antiquated laws. The lack of jurisdictional boundaries and the sheer volume of traffic that the Internet can handle, as well as the potential for anonymity have resulted in a complete lack of control over what appears on the Web at the click of a mouse button. Before there was no liability of a cyber café owner but with the introduction of the Information Technology Amendment Act, 2008, the responsibilities of Cyber Café owners have only increased. This paper deals with the Cyber pornography, its legal implications and the liability of cyber café owner under the Information Technology Amendment Act, 2008. 相似文献