全文获取类型
收费全文 | 1489篇 |
免费 | 31篇 |
专业分类
各国政治 | 43篇 |
工人农民 | 59篇 |
世界政治 | 84篇 |
外交国际关系 | 497篇 |
法律 | 544篇 |
中国政治 | 9篇 |
政治理论 | 274篇 |
综合类 | 10篇 |
出版年
2023年 | 4篇 |
2022年 | 3篇 |
2021年 | 8篇 |
2020年 | 19篇 |
2019年 | 32篇 |
2018年 | 24篇 |
2017年 | 26篇 |
2016年 | 30篇 |
2015年 | 19篇 |
2014年 | 57篇 |
2013年 | 231篇 |
2012年 | 80篇 |
2011年 | 108篇 |
2010年 | 79篇 |
2009年 | 82篇 |
2008年 | 66篇 |
2007年 | 60篇 |
2006年 | 67篇 |
2005年 | 59篇 |
2004年 | 61篇 |
2003年 | 65篇 |
2002年 | 58篇 |
2001年 | 20篇 |
2000年 | 13篇 |
1999年 | 19篇 |
1998年 | 10篇 |
1997年 | 7篇 |
1996年 | 10篇 |
1995年 | 10篇 |
1994年 | 11篇 |
1993年 | 12篇 |
1992年 | 12篇 |
1991年 | 15篇 |
1990年 | 7篇 |
1989年 | 12篇 |
1988年 | 8篇 |
1987年 | 6篇 |
1986年 | 14篇 |
1985年 | 9篇 |
1984年 | 15篇 |
1983年 | 9篇 |
1982年 | 9篇 |
1981年 | 5篇 |
1980年 | 6篇 |
1979年 | 9篇 |
1978年 | 7篇 |
1977年 | 4篇 |
1976年 | 3篇 |
1967年 | 3篇 |
1965年 | 2篇 |
排序方式: 共有1520条查询结果,搜索用时 15 毫秒
901.
In the last few years there has been a lot of buzz around a so-called ‘right to be forgotten’. Especially in Europe, this catchphrase is heavily debated in the media, in court and by regulators. Since a clear definition has not emerged (yet), the following article will try to raise the veil on this vague concept. The first part will weigh the right’s pros and cons against each other. It will appear that the ‘right to be forgotten’ clearly has merit, but needs better definition to avoid any negative consequences. As such, the right is nothing more than a way to give (back) individuals control over their personal data and make the consent regime more effective. The second part will then evaluate the potential implementation of the right. Measures are required at the normative, economical, technical, as well as legislative level. The article concludes by proposing a ‘right to be forgotten’ that is limited to data processing situations where the individual has given his or her consent. Combined with a public interest exception, this should (partially) restore the power balance and allow individuals a more effective control over their personal data. 相似文献
902.
Roads are ever more congested, pollution keeps rising and traffic-related deaths remain at unacceptable levels. It is clear that society’s needs with regard to transportation and mobility have become unsustainable. Intelligent Transport Systems (ITS) are often heralded as a potential solution to this problem, yet have still to yield tangible results. The EU has, however, adopted the ITS Directive, aiming for an EU-wide implementation of ITS solutions. Three questions are raised. First, can the ITS Directive really provide for the required substantial provisions in this field? Second, as ITS solutions are often deemed to be pervasive and intrusive, how does the ITS Directive interact with the EU legal framework on privacy and data protection? Third, given the involvement of private commercial entities in the field of providing road, traffic and travel data, can a public–private partnership be found to allow for the re-use of both public and private sector data in ITS solutions? 相似文献
903.
904.
905.
Ray Jones 《Local Government Studies》2013,39(6):894-895
906.
This article reviews the new journal Critical Studies on Terrorism. The fashionable approach that this journal adopts towards the contemporary phenomenon of terrorism maintains that a “critical” and “self-reflexive” approach to the study of terrorism reveals a variety of shortcomings in the discipline. These range from a distorting over-identification with the Western democratic state perspective on terrorism to a failure to empathize with the misunderstood, non-Western, “other.” This review examines whether the claims of the critical approach adds anything, other than pedantry and obscurity, to our understanding of the phenomenon. It concludes that it does not. 相似文献
907.
Gabriela KennedyAuthor vitae 《Computer Law & Security Report》2011,27(5):563-570
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments. 相似文献
908.
Some technological implications for ascertaining the contents of contracts in web-based transactions
Eliza Mik Author Vitae 《Computer Law & Security Report》2011,27(4):368-376
This paper points out some unexpected relationships between specific aspects of contract law and specific Internet-related technologies. The discussion is not about the interplay between “Law” and “Technology,” or the “Law” and the “Internet.” The aim is modest: to identify some theoretical chokepoints created by the technologies involved in web-based commerce and to point out the legal uncertainties persisting in this area. The analysis is confined to the process of contract formation, not to matters of substantive law. It is during this process that parties assume their contractual obligations and the contents of a contract crystallize. 相似文献
909.
The risk assessment of sex offenders has evolved rapidly over a 20‐year period. However, there is still disparity between empirically evaluated approaches and the needs within the applied context. This article discusses the division between the current needs in the applied setting of sex offender risk assessment, and the existing approaches to risk assessment. It highlights key needs that ought to be responded to, to continue the evolution of sex offender risk assessment (i.e., increased automation of processes, additional emphasis on early identification and prevention, and the targeting of resources towards risk). A new risk assessment model termed the Threat Matrix is introduced as a proposed response to these needs. The new model uses information derived from police systems to make proactive assessments of those who may pose a risk of sexual violence, but who have not been convicted of sexual offences. The practical and ethical implications of implementing and testing this model are discussed. 相似文献
910.
Annette Semanchin Jones 《Journal of public child welfare》2015,9(5):528-550
Differential response is a growing approach in child welfare that aims to maintain children safely in their homes when possible. This study examined how the implementation of differential response varies between counties with improved child safety outcomes compared to counties with poorer outcomes. Data was collected from nine counties through semi-structured focus groups with workers and interviews with supervisors. Results indicated that counties with improved outcomes had integrated the following implementation strategies: use of comprehensive assessment protocols; integrated supervisory support and on-going coaching of effective practices; and increased mobilization of resources, including enduring supports for parents, supports to help families meet basic needs and culturally responsive services for families. 相似文献