首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   633篇
  免费   0篇
各国政治   2篇
工人农民   15篇
世界政治   2篇
外交国际关系   449篇
法律   161篇
政治理论   4篇
  2023年   1篇
  2022年   2篇
  2021年   1篇
  2020年   1篇
  2016年   1篇
  2014年   38篇
  2013年   54篇
  2012年   58篇
  2011年   78篇
  2010年   59篇
  2009年   67篇
  2008年   35篇
  2007年   37篇
  2006年   37篇
  2005年   41篇
  2004年   44篇
  2003年   43篇
  2002年   36篇
排序方式: 共有633条查询结果,搜索用时 15 毫秒
111.
Despite a steady decline in sex crime over the past twenty years, new laws, such as residence restrictions, targeting such crime have proliferated. Some scholars have argued that public concern about sexual offending against young children has served as a catalyst for the emergence of these laws. Few studies, however, have empirically tested this claim. To address this gap and to contribute to scholarship on public opinion about crime and justice, this research tests a central implication flowing from prior work—namely, the notion that people with children will be more likely to endorse increased restrictions on where sex offenders can live. Analyses of public opinion data from a 2006 poll of Florida residents suggest that parents are indeed significantly more likely to support such restrictions. Implications of the study for research and policy are discussed.  相似文献   
112.
The personal ID card is a document carried by most Germans, but rarely used. This could change in the future: According to the new law on identification cards and electronic proof of identity (Gesetz über Personalausweise und den elektronischen Identitätsnachweis, PAuswG), the ID card, with its proof of identity, will gain a new functionality, making it applicable for diverse Internet transactions. Functionally, the electronic proof of identity corresponds to existing non-electronic personal proof of identity guidelines in legal and business connections. However, its concrete, technical application opens up many issues regarding contracts and data privacy laws. On both the legal and the technical level, the German approach departs from other European countries, as it strictly distinguishes the electronic proof of identity from the electronic signature function, which the new ID card also provides. It remains to be seen whether the various projects of the EU Member States will become legally and technically interoperable in the near future.  相似文献   
113.
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective.  相似文献   
114.
115.

After the collapse of the Soviet Union the newly independent Russia had to redefine its relations with the outside world. In order to establish new relationships with both new and traditional cooperation partners, the country's leadership had to define the main strategic objectives, identify the main interests and threats to Russia's security and propose new ways of coping with the challenges the vast country confronted. The first years of independence were marked by a power struggle between various parts of the political elite, which delayed the process of defining the country's strategic goals in the field of national security. In December 1997, the Concept of National Security of the Russian Federation was published, and in January 2000 a new version was made public. This brief article is a comparative study of the concepts of national security embodied in the two documents, focusing on Russia's relations with the outside world and use of nuclear deterrence as a means to solve security and status dilemmas.  相似文献   
116.
Counterinsurgency as an operational method employed by the American military to achieve policy aims at a reasonable cost in blood and treasure has failed miserably. The idea that it has worked should be buried in the ground with a requiem stating that counterinsurgency is dead. Unfortunately, a large group of writers over many years have constructed a deeply flawed narrative that suggests that it is alive and well and continues to shape and influence American foreign policy toward and activist use of American military force in the world's troubled spots.  相似文献   
117.
The Obama Administration's desire to push forward with strategic nuclear arms reductions during the President's second term requires the navigation of numerous shoals and reefs. U.S. and Russian negotiators will have to overcome both political and military obstacles to accomplish post-New START reductions in long-range nuclear weapons. For example, efforts to reduce offensive nuclear weapons are complicated by U.S. and NATO plans for missile defenses deployed in Europe and by exigencies in U.S. and Russian domestic politics. In addition, the military-technical aspects of cyber war and nuclear deterrence can no longer be treated, analytically or practically, as isolated compartments. This article considers several aspects of the relationships among possible post-START offensive force reductions, advanced conventional weapons including missile defenses, and emerging cyber capabilities.  相似文献   
118.
119.
Despite the maturity of the software industry, empirical research demonstrates that average software quality, when measured through the presence of software defects, is low. Such defects cause a wide array of issues, not least in the form of vulnerabilities, which support a multi-billion pound a year industry of fraud in cyber crime. This paper suggests that this is the result of market failure stemming from two factors: the first is that information asymmetry prevents the establishment of software quality prior to purchase; whilst the second is that the legal provisions available under private law are unable in their current form to adequately address software liability issues. On that basis this paper proposes the use of standardisation as a tool to address both of these shortcomings by providing an industry benchmark against which software quality can be ascertained, as well as forming a legal tool for determining causation for the purposes of establishing legal liability.  相似文献   
120.
The Internet of Things (IoT) as an emerging global Internet-based information architecture facilitating the exchange of goods and services is gradually developing. While the technical aspects are being discussed in detail a legal framework does not exist so far. The first supranational organization trying to work out an IoT governance framework has been the European Commission by appointing a large group of experts to examine the relevant aspects of a possible IoT governance regime. In the meantime, however, the activities have been degraded. Nevertheless, even if the differences between the IoT and the Internet have been overestimated at the beginning, many elements of the IoT differ in part from the corresponding problems in the Internet. Therefore, an analysis of the major IoT governance issues (legitimacy, transparency, accountability, anticompetitive behavior) seems to be worthwhile to conduct.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号