首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1489篇
  免费   31篇
各国政治   43篇
工人农民   59篇
世界政治   84篇
外交国际关系   497篇
法律   544篇
中国政治   9篇
政治理论   274篇
综合类   10篇
  2023年   4篇
  2022年   3篇
  2021年   8篇
  2020年   19篇
  2019年   32篇
  2018年   24篇
  2017年   26篇
  2016年   30篇
  2015年   19篇
  2014年   57篇
  2013年   231篇
  2012年   80篇
  2011年   108篇
  2010年   79篇
  2009年   82篇
  2008年   66篇
  2007年   60篇
  2006年   67篇
  2005年   59篇
  2004年   61篇
  2003年   65篇
  2002年   58篇
  2001年   20篇
  2000年   13篇
  1999年   19篇
  1998年   10篇
  1997年   7篇
  1996年   10篇
  1995年   10篇
  1994年   11篇
  1993年   12篇
  1992年   12篇
  1991年   15篇
  1990年   7篇
  1989年   12篇
  1988年   8篇
  1987年   6篇
  1986年   14篇
  1985年   9篇
  1984年   15篇
  1983年   9篇
  1982年   9篇
  1981年   5篇
  1980年   6篇
  1979年   9篇
  1978年   7篇
  1977年   4篇
  1976年   3篇
  1967年   3篇
  1965年   2篇
排序方式: 共有1520条查询结果,搜索用时 15 毫秒
901.
In the last few years there has been a lot of buzz around a so-called ‘right to be forgotten’. Especially in Europe, this catchphrase is heavily debated in the media, in court and by regulators. Since a clear definition has not emerged (yet), the following article will try to raise the veil on this vague concept. The first part will weigh the right’s pros and cons against each other. It will appear that the ‘right to be forgotten’ clearly has merit, but needs better definition to avoid any negative consequences. As such, the right is nothing more than a way to give (back) individuals control over their personal data and make the consent regime more effective. The second part will then evaluate the potential implementation of the right. Measures are required at the normative, economical, technical, as well as legislative level. The article concludes by proposing a ‘right to be forgotten’ that is limited to data processing situations where the individual has given his or her consent. Combined with a public interest exception, this should (partially) restore the power balance and allow individuals a more effective control over their personal data.  相似文献   
902.
Roads are ever more congested, pollution keeps rising and traffic-related deaths remain at unacceptable levels. It is clear that society’s needs with regard to transportation and mobility have become unsustainable. Intelligent Transport Systems (ITS) are often heralded as a potential solution to this problem, yet have still to yield tangible results. The EU has, however, adopted the ITS Directive, aiming for an EU-wide implementation of ITS solutions. Three questions are raised. First, can the ITS Directive really provide for the required substantial provisions in this field? Second, as ITS solutions are often deemed to be pervasive and intrusive, how does the ITS Directive interact with the EU legal framework on privacy and data protection? Third, given the involvement of private commercial entities in the field of providing road, traffic and travel data, can a public–private partnership be found to allow for the re-use of both public and private sector data in ITS solutions?  相似文献   
903.
904.
905.
906.
This article reviews the new journal Critical Studies on Terrorism. The fashionable approach that this journal adopts towards the contemporary phenomenon of terrorism maintains that a “critical” and “self-reflexive” approach to the study of terrorism reveals a variety of shortcomings in the discipline. These range from a distorting over-identification with the Western democratic state perspective on terrorism to a failure to empathize with the misunderstood, non-Western, “other.” This review examines whether the claims of the critical approach adds anything, other than pedantry and obscurity, to our understanding of the phenomenon. It concludes that it does not.  相似文献   
907.
This column provides a country-by-country analysis of the latest legal developments, cases and issues relevant to the IT, media and telecommunications’ industries in key jurisdictions across the Asia-Pacific region. The articles appearing in this column are intended to serve as ‘alerts’ and are not submitted as detailed analyses of cases or legal developments.  相似文献   
908.
This paper points out some unexpected relationships between specific aspects of contract law and specific Internet-related technologies. The discussion is not about the interplay between “Law” and “Technology,” or the “Law” and the “Internet.” The aim is modest: to identify some theoretical chokepoints created by the technologies involved in web-based commerce and to point out the legal uncertainties persisting in this area. The analysis is confined to the process of contract formation, not to matters of substantive law. It is during this process that parties assume their contractual obligations and the contents of a contract crystallize.  相似文献   
909.
The risk assessment of sex offenders has evolved rapidly over a 20‐year period. However, there is still disparity between empirically evaluated approaches and the needs within the applied context. This article discusses the division between the current needs in the applied setting of sex offender risk assessment, and the existing approaches to risk assessment. It highlights key needs that ought to be responded to, to continue the evolution of sex offender risk assessment (i.e., increased automation of processes, additional emphasis on early identification and prevention, and the targeting of resources towards risk). A new risk assessment model termed the Threat Matrix is introduced as a proposed response to these needs. The new model uses information derived from police systems to make proactive assessments of those who may pose a risk of sexual violence, but who have not been convicted of sexual offences. The practical and ethical implications of implementing and testing this model are discussed.  相似文献   
910.
Differential response is a growing approach in child welfare that aims to maintain children safely in their homes when possible. This study examined how the implementation of differential response varies between counties with improved child safety outcomes compared to counties with poorer outcomes. Data was collected from nine counties through semi-structured focus groups with workers and interviews with supervisors. Results indicated that counties with improved outcomes had integrated the following implementation strategies: use of comprehensive assessment protocols; integrated supervisory support and on-going coaching of effective practices; and increased mobilization of resources, including enduring supports for parents, supports to help families meet basic needs and culturally responsive services for families.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号