全文获取类型
收费全文 | 948篇 |
免费 | 1篇 |
专业分类
各国政治 | 7篇 |
工人农民 | 33篇 |
世界政治 | 23篇 |
外交国际关系 | 467篇 |
法律 | 340篇 |
中国政治 | 2篇 |
政治理论 | 76篇 |
综合类 | 1篇 |
出版年
2022年 | 1篇 |
2021年 | 1篇 |
2020年 | 1篇 |
2019年 | 6篇 |
2018年 | 2篇 |
2017年 | 3篇 |
2016年 | 6篇 |
2015年 | 4篇 |
2014年 | 39篇 |
2013年 | 92篇 |
2012年 | 64篇 |
2011年 | 97篇 |
2010年 | 67篇 |
2009年 | 72篇 |
2008年 | 47篇 |
2007年 | 45篇 |
2006年 | 49篇 |
2005年 | 44篇 |
2004年 | 47篇 |
2003年 | 52篇 |
2002年 | 41篇 |
2001年 | 4篇 |
2000年 | 5篇 |
1999年 | 4篇 |
1998年 | 8篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 5篇 |
1993年 | 6篇 |
1992年 | 5篇 |
1991年 | 7篇 |
1990年 | 6篇 |
1989年 | 6篇 |
1988年 | 14篇 |
1987年 | 15篇 |
1986年 | 6篇 |
1985年 | 6篇 |
1984年 | 11篇 |
1983年 | 6篇 |
1982年 | 7篇 |
1981年 | 8篇 |
1980年 | 8篇 |
1979年 | 7篇 |
1978年 | 5篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1975年 | 1篇 |
1974年 | 3篇 |
1972年 | 1篇 |
排序方式: 共有949条查询结果,搜索用时 15 毫秒
901.
Clive SeddonAuthor vitae 《Computer Law & Security Report》2011,27(6):641-646
“The task of a leader is to get his people from where they are to where they have not been” Henry A. KissingerWith stuttering growth in the Western economies where major sourcing and TMT (Technology, Media & Telecoms) contracts are pervasive, it is perhaps not surprising that internal and external legal counsel are increasingly being called upon to advise clients on termination options and strategies to effect or oppose a threatened termination for breach of contract. This short paper considers why this has happened and the other factors which are in play which have meant that advice on termination and the renegotiation of contracts in this context has become more common. Expertise in this area is part of an IT lawyer’s tool kit and we consider that this is an area where internal and external legal counsel can make a substantial difference in delivering solutions to their clients.In this paper I talk about termination and renegotiation interchangeably. The reason for this as will become clear is that all forms of termination, whether they are consensual or contested, will involve some form of renegotiation of the terms of the contract between the parties. This is because it is almost impossible except perhaps in the simplest of installations to predict the nature in which a supplier or a customer may wish to change the services provided, and consequently even the most carefully crafted of exit and transition clauses, schedules and plans will require some form of post-contract negotiation between the customer, the outgoing supplier and potentially a new supplier or suppliers. This will necessarily involve some form of renegotiation of the terms of the contract between the parties.This paper looks at renegotiation in the context of a termination scenario rather than dealing with renegotiation during the normal course of operation of the contract. 相似文献
902.
Tushar Kumar BiswasAuthor Vitae 《Computer Law & Security Report》2011,27(4):385-393
Data and information constitute a valuable resource both for the companies in general and individuals in specific. The traditional paper based transaction has been replaced by electronic transaction and now a day’s most of the valuable data and information’s are stored in electronic medium. Therefore data and information security have become a matter of great concern for every agencies acting on faith of e-transaction. In India there remains an added significance owing to the fact that a growing number of companies seek more centralized and less expensive methods of processing information, they’re turning to offshore outsourcing to fulfill many of their business and human resources processes. Data theft is not in itself a new concept, but has become an increasingly important issue in the digital age. The new mode of communication, its malleability, transmissibility, networking capacity, affect our lives in many and sometimes surprising ways, it requires that we find new legal solutions for new social questions. 相似文献
903.
The High Court has recently delivered judgment on the judicial review of the Digital Economy Act 2010 (DEA) and the draft Costs Order1 on application by BT and Talktalk.2 Mr Justice Kenneth Parker rejected the application on all but one ground (one aspect of the cost sharing arrangement). See: The Queen on the Application of British Telecommunications Plc, Talktalk Telecom Group Plc v The Secretary of State for Business, Innovation and Skills [2011] EWHC 1021 (Admin), Judgment of 20. April 2011. 相似文献
904.
Cloud computing is an information technology technique that promises greater efficiency and reduced-cost to consumers, businesses and public institutions. However, to the extent it has brought better efficiency and minimal cost, the emergence of cloud computing has posed a significant regulatory challenge on the application of data protection rules particularly on the regime regulating cross-border data flow. The Data Protection Directive (DPD), which dates back to 1995, is at odds with some of the basic technological and business-related features of the cloud. As a result, it is claimed that the Directive hardly offers any help in using the legal bases to ‘process’ and ‘transfer’ data as well as to determine when a transfer to a third country occurs in cloud computing. Despite such assertions, the paper argues that the ECJ's Bodil Lindqvist decision can to a certain extent help to delineate circumstances where transfer should and should not occur in the cloud. Concomitantly, the paper demonstrates that controllers can still make the most of the available possibilities in justifying their ‘processing’ as well as ‘transferring’ of data to a third country in cloud arrangements. In doing so, the paper also portrays the challenges that arise down the road. All legal perspectives are largely drawn from EU level though examples are given from member states and other jurisdictions when relevant. 相似文献
905.
Larry Alexander 《Law and Philosophy》1996,15(1):65-74
American criminal law reflects the absence of any general duty of Good Samaritanism. Nonetheless, there are some circumstances in which it imposes affirmative duties to aid others. In those circumstances, however, the duty to aid is canceled whenever aiding subjects the actor to a certain level of risk or sacrifice, a level that can be less than the risk or sacrifice faced by the beneficiary if not aided. In this article, I demonstrate that this approach to limiting affirmative duties to aid encounters the same problem of moral arbitrariness as does a moral catastrophe override of deontological side-constraints. 相似文献
906.
Daniel Le MétayerAuthor VitaeShara MonteleoneAuthor Vitae 《Computer Law & Security Report》2009,25(2):136-144
The changes imposed by new information technologies, especially pervasive computing and the Internet, require a deep reflection on the fundamental values underlying privacy and the best way to achieve their protection. The explicit consent of the data subject, which is a cornerstone of most data protection regulations, is a typical example of requirement which is very difficult to put into practice in the new world of “pervasive computing” where many data communications necessarily occur without the users' notice. In this paper, we argue that an architecture based on “Privacy Agents” can make privacy rights protection more effective, provided however that this architecture meets a number of legal requirements to ensure the validity of consent delivered through such Privacy Agents. We first present a legal analysis of consent considering successively (1) its nature; (2) its essential features (qualities and defects) and (3) its formal requirements. Then we draw the lessons of this legal analysis for the design of a valid architecture based on Privacy Agents. To conclude, we suggest an implementation of this architecture proposed in a multidisciplinary project involving lawyers and computer scientists. 相似文献
907.
The authors report the results of an evaluation of services provided by 54 Illinois domestic violence agencies. In collaboration with the University of Illinois at Chicago evaluation team, domestic violence advocates identified services to be evaluated, specified desired outcomes of those services, and participated in developing measures of those outcomes in both English and Spanish. With in the limitations of the study, outcomes were positive in all four program areas: hotline, counseling, advocacy, and shelter. The authors then discuss implications for evaluation of domestic violence programs that maintain victim safety as a guiding principle. 相似文献
908.
David J. Danelo Author Vitae 《Orbis》2011,55(1):163-179
This article will reexamine basic assumptions about the geopolitics and character of the United States-Mexico border, take a closer look at current events that have affected the drug war and, finally, discuss possible policy responses beyond those routinely voiced in the public domain. 相似文献
909.
Jean-Loup Samaan Author Vitae 《Orbis》2011,55(2):314-324
Power distribution in the maritime commons is changing. The inevitable relative decline of U.S. sea power provides an opening not only for China as a rising challenger but also for the European Union as a cooperative security provider. Although such a claim may have seemed farfetched a few years ago, the performance of the European Union in the counter-piracy Operation Atalanta off the coast of Somalia and in the Gulf of Aden, illustrates the possibility that the European Union will prove to be an unexpected player in the maritime commons in the twenty-first century. This possibility suggests a renewed transatlantic dialog over the governance of the maritime commons. 相似文献
910.
Harvey Sicherman Author Vitae 《Orbis》2011,55(3):463-471