首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   740篇
  免费   10篇
各国政治   16篇
工人农民   20篇
世界政治   5篇
外交国际关系   453篇
法律   204篇
中国政治   4篇
政治理论   48篇
  2022年   1篇
  2020年   2篇
  2019年   6篇
  2018年   11篇
  2017年   12篇
  2016年   5篇
  2015年   5篇
  2014年   40篇
  2013年   73篇
  2012年   58篇
  2011年   92篇
  2010年   59篇
  2009年   73篇
  2008年   37篇
  2007年   38篇
  2006年   40篇
  2005年   45篇
  2004年   46篇
  2003年   45篇
  2002年   38篇
  2001年   3篇
  2000年   3篇
  1999年   1篇
  1998年   2篇
  1997年   3篇
  1996年   2篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1989年   1篇
  1987年   1篇
  1977年   1篇
  1971年   1篇
排序方式: 共有750条查询结果,搜索用时 15 毫秒
741.
With continual advances in Internet capability the child pornography market is experiencing a boom in demand and supply. Attempts to reduce the market challenge legislators, law enforcement agencies, practitioners and researchers alike – due in large part to the decentralised and global nature of the Internet. Much research has focused on frequent users of child pornography and whether such behaviour is interrelated with child sexual assaults. This article instead draws attention to onset, the first deliberate viewing of child pornography. It presents the results of a three-month study of a global Peer-to-Peer network, isoHunt. Analysis of the site’s Top 300 search terms indicated that child pornography is consistently shared. Risk factors for onset are discussed, including the potential normalisation of child pornography among Internet subcultures. Strategies are discussed to encourage subcultures to inhibit child pornography use and to increase understanding of the harms associated with such material. Implications for legal systems, policy and research are explored.  相似文献   
742.
“The task of a leader is to get his people from where they are to where they have not been” Henry A. KissingerWith stuttering growth in the Western economies where major sourcing and TMT (Technology, Media & Telecoms) contracts are pervasive, it is perhaps not surprising that internal and external legal counsel are increasingly being called upon to advise clients on termination options and strategies to effect or oppose a threatened termination for breach of contract. This short paper considers why this has happened and the other factors which are in play which have meant that advice on termination and the renegotiation of contracts in this context has become more common. Expertise in this area is part of an IT lawyer’s tool kit and we consider that this is an area where internal and external legal counsel can make a substantial difference in delivering solutions to their clients.In this paper I talk about termination and renegotiation interchangeably. The reason for this as will become clear is that all forms of termination, whether they are consensual or contested, will involve some form of renegotiation of the terms of the contract between the parties. This is because it is almost impossible except perhaps in the simplest of installations to predict the nature in which a supplier or a customer may wish to change the services provided, and consequently even the most carefully crafted of exit and transition clauses, schedules and plans will require some form of post-contract negotiation between the customer, the outgoing supplier and potentially a new supplier or suppliers. This will necessarily involve some form of renegotiation of the terms of the contract between the parties.This paper looks at renegotiation in the context of a termination scenario rather than dealing with renegotiation during the normal course of operation of the contract.  相似文献   
743.
The popular social networking site, Facebook, recently launched a facial recognition tool to help users tag photographs they uploaded to Facebook. This generated significant controversy, arising as much as anything, from the company’s failure to adequately inform users of this new service and to explain how the technology works.The incident illustrates the sensitivity of facial recognition technology and the potential conflict with data privacy laws. However, facial recognition has been around for some time and is used by businesses and public organisations for a variety of purposes – primarily in relation to law enforcement, border control, photo editing and social networking. There are also indications that the technology could be used by commercial entities for marketing purposes in the future.This article considers the technology, its practical applications and the manner in which European data protection laws regulate its use. In particular, how much control should we have over our own image? What uses of this technology are, and are not, acceptable? Ultimately, does European data protection law provide an adequate framework for this technology? Is it a framework which protects the privacy of individuals without unduly constraining the development of innovative and beneficial applications and business models?  相似文献   
744.
In an unprecedented legal development, the case of violence in video games has now reached the highest American court. The US Supreme Court is set to decide whether states can restrict minors from buying violent video games in the case of Schwarzenegger v. Entertainment Merchants Association. The decision could have serious implications on the future of First Amendment rights and children’s ’welfare. To resolve Schwarzenegger, the Justices will need to decide how much First Amendment protection should be extended to violent video games and whether minors have a greater constitutional right to violence than they do to obscenity.  相似文献   
745.
Video games often feature a character that evolves into an iconic superhero. In a strange twist of fate, the video game medium will have the opportunity to become a superhero itself. The recording, comic book, and movie industries have rallied around video games as the case of Arnold Schwarzenegger vs. Entertainment Merchants Association and Entertainment Software Association reaches the Supreme Court of the United States. The case concerns a 2005 California ban on the sale of violent video games to minors. The law was later overturned by the District Court and the 9th Circuit Court on appeal. At issue is whether the law violates the First Amendment of the Constitution. Do video games deserve the full protection of the Constitution as a legitimate form of speech, or should it be limited due to its alleged effects on the psychological well-being of minors? This Article will look at the impact this case may have when it reaches the Supreme Court, an analysis of the issues that will be argued, and the history of legislation involving violent video games.  相似文献   
746.
Internet Protocol addresses [IP addresses] are central for Internet electronic communications. They individualize computers and their users to make the delivery of data packets possible. IP addresses are also often used to identify websurfers for litigation purposes. In particular, they constitute a key in the fight against online copyright infringement to identify infringers. However, it is a matter of dispute to know if IP addresses are personal data. In a review of relevant case law, the present paper seeks to identify when IP addresses are - or should be - considered as personal data. It suggests a contextual approach to the concept of personal data.  相似文献   
747.
‘Citizenship’ is a structured probation supervision program based on ‘what works’ principles, designed for offenders on community orders or licenses supervised within the UK National Probation Service. The program was evaluated using survival analysis comparing the reconvictions of a cohort of all offenders in one probation area eligible for Citizenship over a 2-year period (n = 3,819) with those of a retrospective cohort of all eligible offenders in the same probation area receiving ‘traditional’ probation supervision (n = 2,110), controlling for risk related factors. At the 2-year stage, 50% of offenders in the comparison group had reoffended compared to 41% in the experimental group, and the difference between the survival curves was statistically significant. The hazard ratio was 0.69, which represents a 31% reduction in reconvictions in the experimental group over the proportion in the comparison group at any given time. Time to violation of a supervision order or post custody license was also statistically significantly longer in the experimental group. A key element of the program, promoting contact with community support agencies, was statistically significantly related to reduced reoffending in the Citizenship group. The overall effects remained after controlling for differences in risk scores although effectiveness varied by risk level. Contrary to other ‘what works’ research findings, the program was found to be most effective across the low–medium and medium–high risk thresholds, and was not effective with the highest risk group. This difference can be explained and is discussed in terms of risk, need, and responsivity principles. The Citizenship program was found to be cost-beneficial.  相似文献   
748.
Following widespread criticism of financial market (self-)regulation, there is a shift in regulatory mood, explored here with reference to evolving conceptions of conflict of interest. The pre-crisis distinction between conflict of interest (normal, manageable) and its exploitation (unacceptable, legally actionable) has become somewhat eroded, as exemplified by the SEC’s 2010 civil fraud action against investment bank Goldman Sachs. However the settlement of that case on the basis of ‘mistake’ left many questions unanswered: about the meaning(s) of conflict of interest, about managerial mistake versus exploitative intent in administrative/civil cases and equally about the potential for action under criminal law. Looking forward, a judgement of the European Court of Justice on insider trading – concerning a rebuttable assumption of intent – could be taken as a template for ‘drawing the line’ on conflict of interest. Acting on the basis of informational asymmetry could be taken as an indicator of intent and serious wrongdoing unless financial market actors can demonstrate otherwise.  相似文献   
749.
750.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号