首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   111篇
  免费   7篇
各国政治   11篇
工人农民   4篇
世界政治   4篇
外交国际关系   9篇
法律   45篇
政治理论   44篇
综合类   1篇
  2023年   2篇
  2022年   1篇
  2021年   1篇
  2020年   8篇
  2019年   5篇
  2018年   8篇
  2017年   5篇
  2016年   5篇
  2015年   6篇
  2014年   7篇
  2013年   17篇
  2012年   6篇
  2011年   5篇
  2010年   2篇
  2009年   5篇
  2008年   1篇
  2007年   5篇
  2006年   2篇
  2005年   2篇
  2004年   1篇
  2003年   1篇
  2002年   2篇
  2001年   1篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1988年   2篇
  1987年   2篇
  1986年   3篇
  1983年   3篇
  1982年   2篇
  1981年   1篇
  1967年   1篇
排序方式: 共有118条查询结果,搜索用时 15 毫秒
91.
92.
The Internet of Things (IoT) is a disruptive innovation known for its socio-economic potential, but also for generating unprecedented vulnerabilities and threats. As a dynamic sociotechnical system, the IoT comprises well-known cybersecurity risks and endemic uncertainties that arise as IoT adoption increases and the system evolves. We highlight the impact of these challenges by analyzing how insecure IoT devices pose threats to both consumer protection and the Internet's infrastructure. While recent regulatory responses are starting to target IoT security risks, crucial deficiencies – especially related to the feedback necessary to keep pace with emerging risks and uncertainties – must be addressed. We propose a model of adaptive regulatory governance that integrates the benefits of centralized risk regulatory frameworks with the operational knowledge and mitigation mechanisms developed by epistemic communities that manage day-to-day Internet security. Rather than focusing on the choice of regulatory instruments, this model builds on the “planned adaptive regulation” literature to highlight the need to systematically plan for a knowledge-sharing interface in regulatory governance design for disruptive technologies, facilitating the feedback necessary to address evolving IoT security risks.  相似文献   
93.
94.
95.
Birthday     
Jesse Ball 《耶鲁评论》2020,108(3):47-51
  相似文献   
96.
97.
This article seeks to determine the mechanism(s) behind the convergence of domestic counterterrorism regulations that has been noted across many Organisation for Economic Co-operation and Development (OECD) countries. Four hypotheses are developed and tested through regression analyses. These hypotheses examine (1) U.S. influence, operationalized though a unique U.S. footprint indicator; (2) national characteristics; (3) the extent to which states’ domestic structures match; and (4) international networks. We find little support that U.S. influence matters. The international influence that does exist seems to operate through networks promoting learning, especially following a rise in the general global threat level. National characteristics as a driver also find some support.  相似文献   
98.
Among professionals working with youth who commit sexual crimes, there is a clear chasm between proponents and opponents of postadjudication polygraph testing. Polygraph use for juveniles is an issue at the forefront of conversation in the state of Colorado, as the Sex Offender Management Board has evolved on positions. Drawing on extant research base, they have conducted a state-level evaluation in Colorado to inform further determinations. Using probation files of youth adjudicated of a sexual crime (= 62), regression models were run. Youths’ significant reactions on a polygraph test were statistically significantly associated with more disclosures. Nonsignificant reactions, significant reactions, inconclusive results, and more disclosures were statistically, significantly associated with more polygraph testing. Finally, youth with nonsignificant reactions were five times more likely to successfully complete treatment, but test results and number of tests were not associated with recidivism outcomes. A framework for the judicious use of the polygraph is proposed.  相似文献   
99.
The personal characteristics of political elites play an important role in British elections. While the personalization of the media’s election coverage has been the subject of much debate, we know less about the conditions under which voters receive personalized messages directly from elites during the campaign. In this paper, we use a new dataset that includes more than 3300 local communications from the 2015 general election to explore variation in the personalization of campaign messaging. We find that there is systemic variation in terms of where photographs of party leaders are included in election communications, which provides further evidence that campaign messages are deployed strategically to portray the candidate – and their party – in the best possible light.  相似文献   
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号