首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   948篇
  免费   1篇
各国政治   7篇
工人农民   33篇
世界政治   23篇
外交国际关系   467篇
法律   340篇
中国政治   2篇
政治理论   76篇
综合类   1篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   6篇
  2018年   2篇
  2017年   3篇
  2016年   6篇
  2015年   4篇
  2014年   39篇
  2013年   92篇
  2012年   64篇
  2011年   97篇
  2010年   67篇
  2009年   72篇
  2008年   47篇
  2007年   45篇
  2006年   49篇
  2005年   44篇
  2004年   47篇
  2003年   52篇
  2002年   41篇
  2001年   4篇
  2000年   5篇
  1999年   4篇
  1998年   8篇
  1997年   2篇
  1996年   3篇
  1995年   3篇
  1994年   5篇
  1993年   6篇
  1992年   5篇
  1991年   7篇
  1990年   6篇
  1989年   6篇
  1988年   14篇
  1987年   15篇
  1986年   6篇
  1985年   6篇
  1984年   11篇
  1983年   6篇
  1982年   7篇
  1981年   8篇
  1980年   8篇
  1979年   7篇
  1978年   5篇
  1977年   3篇
  1976年   3篇
  1975年   1篇
  1974年   3篇
  1972年   1篇
排序方式: 共有949条查询结果,搜索用时 15 毫秒
901.
“The task of a leader is to get his people from where they are to where they have not been” Henry A. KissingerWith stuttering growth in the Western economies where major sourcing and TMT (Technology, Media & Telecoms) contracts are pervasive, it is perhaps not surprising that internal and external legal counsel are increasingly being called upon to advise clients on termination options and strategies to effect or oppose a threatened termination for breach of contract. This short paper considers why this has happened and the other factors which are in play which have meant that advice on termination and the renegotiation of contracts in this context has become more common. Expertise in this area is part of an IT lawyer’s tool kit and we consider that this is an area where internal and external legal counsel can make a substantial difference in delivering solutions to their clients.In this paper I talk about termination and renegotiation interchangeably. The reason for this as will become clear is that all forms of termination, whether they are consensual or contested, will involve some form of renegotiation of the terms of the contract between the parties. This is because it is almost impossible except perhaps in the simplest of installations to predict the nature in which a supplier or a customer may wish to change the services provided, and consequently even the most carefully crafted of exit and transition clauses, schedules and plans will require some form of post-contract negotiation between the customer, the outgoing supplier and potentially a new supplier or suppliers. This will necessarily involve some form of renegotiation of the terms of the contract between the parties.This paper looks at renegotiation in the context of a termination scenario rather than dealing with renegotiation during the normal course of operation of the contract.  相似文献   
902.
Data and information constitute a valuable resource both for the companies in general and individuals in specific. The traditional paper based transaction has been replaced by electronic transaction and now a day’s most of the valuable data and information’s are stored in electronic medium. Therefore data and information security have become a matter of great concern for every agencies acting on faith of e-transaction. In India there remains an added significance owing to the fact that a growing number of companies seek more centralized and less expensive methods of processing information, they’re turning to offshore outsourcing to fulfill many of their business and human resources processes. Data theft is not in itself a new concept, but has become an increasingly important issue in the digital age. The new mode of communication, its malleability, transmissibility, networking capacity, affect our lives in many and sometimes surprising ways, it requires that we find new legal solutions for new social questions.  相似文献   
903.
The High Court has recently delivered judgment on the judicial review of the Digital Economy Act 2010 (DEA) and the draft Costs Order1 on application by BT and Talktalk.2 Mr Justice Kenneth Parker rejected the application on all but one ground (one aspect of the cost sharing arrangement). See: The Queen on the Application of British Telecommunications Plc, Talktalk Telecom Group Plc v The Secretary of State for Business, Innovation and Skills [2011] EWHC 1021 (Admin), Judgment of 20. April 2011.  相似文献   
904.
Cloud computing is an information technology technique that promises greater efficiency and reduced-cost to consumers, businesses and public institutions. However, to the extent it has brought better efficiency and minimal cost, the emergence of cloud computing has posed a significant regulatory challenge on the application of data protection rules particularly on the regime regulating cross-border data flow. The Data Protection Directive (DPD), which dates back to 1995, is at odds with some of the basic technological and business-related features of the cloud. As a result, it is claimed that the Directive hardly offers any help in using the legal bases to ‘process’ and ‘transfer’ data as well as to determine when a transfer to a third country occurs in cloud computing. Despite such assertions, the paper argues that the ECJ's Bodil Lindqvist decision can to a certain extent help to delineate circumstances where transfer should and should not occur in the cloud. Concomitantly, the paper demonstrates that controllers can still make the most of the available possibilities in justifying their ‘processing’ as well as ‘transferring’ of data to a third country in cloud arrangements. In doing so, the paper also portrays the challenges that arise down the road. All legal perspectives are largely drawn from EU level though examples are given from member states and other jurisdictions when relevant.  相似文献   
905.
American criminal law reflects the absence of any general duty of Good Samaritanism. Nonetheless, there are some circumstances in which it imposes affirmative duties to aid others. In those circumstances, however, the duty to aid is canceled whenever aiding subjects the actor to a certain level of risk or sacrifice, a level that can be less than the risk or sacrifice faced by the beneficiary if not aided. In this article, I demonstrate that this approach to limiting affirmative duties to aid encounters the same problem of moral arbitrariness as does a moral catastrophe override of deontological side-constraints.  相似文献   
906.
The changes imposed by new information technologies, especially pervasive computing and the Internet, require a deep reflection on the fundamental values underlying privacy and the best way to achieve their protection. The explicit consent of the data subject, which is a cornerstone of most data protection regulations, is a typical example of requirement which is very difficult to put into practice in the new world of “pervasive computing” where many data communications necessarily occur without the users' notice. In this paper, we argue that an architecture based on “Privacy Agents” can make privacy rights protection more effective, provided however that this architecture meets a number of legal requirements to ensure the validity of consent delivered through such Privacy Agents. We first present a legal analysis of consent considering successively (1) its nature; (2) its essential features (qualities and defects) and (3) its formal requirements. Then we draw the lessons of this legal analysis for the design of a valid architecture based on Privacy Agents. To conclude, we suggest an implementation of this architecture proposed in a multidisciplinary project involving lawyers and computer scientists.  相似文献   
907.
The authors report the results of an evaluation of services provided by 54 Illinois domestic violence agencies. In collaboration with the University of Illinois at Chicago evaluation team, domestic violence advocates identified services to be evaluated, specified desired outcomes of those services, and participated in developing measures of those outcomes in both English and Spanish. With in the limitations of the study, outcomes were positive in all four program areas: hotline, counseling, advocacy, and shelter. The authors then discuss implications for evaluation of domestic violence programs that maintain victim safety as a guiding principle.  相似文献   
908.
This article will reexamine basic assumptions about the geopolitics and character of the United States-Mexico border, take a closer look at current events that have affected the drug war and, finally, discuss possible policy responses beyond those routinely voiced in the public domain.  相似文献   
909.
Power distribution in the maritime commons is changing. The inevitable relative decline of U.S. sea power provides an opening not only for China as a rising challenger but also for the European Union as a cooperative security provider. Although such a claim may have seemed farfetched a few years ago, the performance of the European Union in the counter-piracy Operation Atalanta off the coast of Somalia and in the Gulf of Aden, illustrates the possibility that the European Union will prove to be an unexpected player in the maritime commons in the twenty-first century. This possibility suggests a renewed transatlantic dialog over the governance of the maritime commons.  相似文献   
910.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号