首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   874篇
  免费   11篇
各国政治   8篇
工人农民   43篇
世界政治   21篇
外交国际关系   476篇
法律   272篇
中国政治   2篇
政治理论   62篇
综合类   1篇
  2022年   3篇
  2021年   3篇
  2020年   5篇
  2019年   7篇
  2018年   16篇
  2017年   9篇
  2016年   14篇
  2015年   6篇
  2014年   42篇
  2013年   93篇
  2012年   62篇
  2011年   96篇
  2010年   60篇
  2009年   73篇
  2008年   43篇
  2007年   44篇
  2006年   47篇
  2005年   41篇
  2004年   46篇
  2003年   46篇
  2002年   46篇
  2001年   6篇
  2000年   6篇
  1999年   2篇
  1998年   3篇
  1996年   3篇
  1995年   1篇
  1994年   4篇
  1993年   3篇
  1992年   3篇
  1991年   3篇
  1990年   4篇
  1988年   5篇
  1987年   1篇
  1986年   6篇
  1983年   2篇
  1982年   3篇
  1981年   1篇
  1980年   4篇
  1979年   4篇
  1978年   4篇
  1977年   4篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1973年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
排序方式: 共有885条查询结果,搜索用时 15 毫秒
161.
The Internet of Things (IoT) as an emerging global Internet-based information architecture facilitating the exchange of goods and services is gradually developing. While the technical aspects are being discussed in detail a legal framework does not exist so far. The first supranational organization trying to work out an IoT governance framework has been the European Commission by appointing a large group of experts to examine the relevant aspects of a possible IoT governance regime. In the meantime, however, the activities have been degraded. Nevertheless, even if the differences between the IoT and the Internet have been overestimated at the beginning, many elements of the IoT differ in part from the corresponding problems in the Internet. Therefore, an analysis of the major IoT governance issues (legitimacy, transparency, accountability, anticompetitive behavior) seems to be worthwhile to conduct.  相似文献   
162.
This article analyses digital identity as an emergent legal concept in the United States of America, as a consequence of the move to place all federal government services on-line. The features and functions of digital identity and its legal nature are examined, and the consequences are considered.  相似文献   
163.
New technologies permit online businesses to reduce expenses and increase efficiency by, for example, storing information in “the cloud”, engaging in online tracking and targeted advertising, location and tracking technologies, and biometrics. However, the potential for technology to facilitate long term retention of customers' personal information raises concerns about the competing right of individuals to the privacy of their personal information. Although the European Commission has recently released a proposal for regulation to “provide a data subject with the right to be forgotten and to erasure”, neither the OECD Privacy Guidelines nor the APEC Privacy Framework includes any requirement to delete personal information. While New Zealand includes a “limited retention principle” in the Privacy Act 1993, apart from one limited exception the privacy principles cannot be enforced in court. Taking New Zealand privacy law as an example, this paper examines the issue of retention of customer data, explains why this is a serious problem and argues that although it could be addressed by appropriate amendments to domestic laws, domestic privacy legislation may not be sufficient in an online environment. In the same way as other areas of law, such as the intellectual property regime, have turned to global regulatory standards which reflect the international nature of their subject matter, international privacy regulation should be the next stage for the information privacy regime.  相似文献   
164.
In this contribution, the authors explore the differences and interplays between the rights to privacy and data protection. They describe the two rights and come to the conclusion that they differ both formally and substantially, though overlaps are not to be excluded. Given these different yet not mutually exclusive scopes they then apply the rights to three case-studies (body-scanners, human enhancement technologies, genome sequencing), highlighting in each case potential legal differences concerning the scope of the rights, the role of consent, and the meaning of the proportionality test. Finally, and on the basis of these cases, the authors propose paths for articulating the two rights using the qualitative and quantitative thresholds of the two rights, which leads them to rethink the relationship between privacy and data protection, and ultimately, the status of data protection as a fundamental right.  相似文献   
165.
The Bermudian Supreme Court (at first instance) recently ruled in Bermuda Restaurants Limited (t/a “Chopsticks”) v. Jonathan Daspin and ConvergEx Global Markets Ltd. (Civil Jurisdiction 2008: No. 134 (to be reported)) on the issue of whether an employer (here, a company) should be held liable for an allegedly libellous email publication by its employee, the managing director. The Judge was asked by the employer company to determine two issues of law which exposed the company and which centred on its vicarious liability for its employee's actions, including whether the use of the company's email system, during working hours, made it complicit in the publication. The Court held, applying principles of English and Canadian law, that the company was not vicariously liable and by extension that it was not the email's publisher.  相似文献   
166.
This is the latest edition of Baker & McKenzie's column on developments in EU law relating to IP, IT and telecommunications. This article summarises recent developments that are considered important for practitioners, students and academics in a wide range of information technology, e-commerce, telecommunications and intellectual property areas. It cannot be exhaustive but intends to address the important points. This is a hard copy reference guide, but links to outside web sites are included where possible. No responsibility is assumed for the accuracy of information contained in these links.  相似文献   
167.
As a contribution to this special issue of CLSR, Jon Bing offers a unique wartime account of one of the earliest attempts to prevent ‘online processing’ of personal data by the occupying authorities for oppressive purposes.  相似文献   
168.
ABSTRACT

When confessions are entered into evidence in criminal courts, issues of coercion and voluntariness are important and often contested matters. Occasionally, defense attorneys proffer expert witnesses to testify about the coercive pressures of an interrogation and the risk of a false confession. Such testimony is often ruled inadmissible on the grounds that it does not inform the jury beyond its common knowledge. In our effort to test this judicial assumption about common knowledge, we surveyed jury-eligible laypeople (n?=?67) and social scientists specializing in interrogation and confessions (n?=?54) regarding their opinions about the coerciveness of prohibited interrogation tactics, maximization techniques, minimization techniques, and suspect risk factors and compared their ratings with a set of independent t tests. Laypeople gave lower ratings to the coerciveness of all sets of items representing interrogation techniques, and lower ratings to the vulnerabilities associated with suspect risk factors, as compared to social science experts. The disparities between laypeople’s and experts’ perceptions of coercion in interrogations demonstrate that such issues are not fully within the common knowledge of prospective jurors, and suggest the need to provide jurors with expert witness guidance when tasked with evaluating confession evidence.  相似文献   
169.
Central to the study of Congress is the study of relationships among members. Electoral collaboration is a function of a member's position in the broader congressional power network. It allows members to leverage their campaign resources to achieve the four classic goals of members of Congress: reelection, making good public policy, obtaining power within the institution, and having one's party in the majority. Using nearly 3.2 million FEC records from 2010 to 2016, we explore the dynamics that influence electoral collaboration. We find members are most likely to collaborate electorally with other members from the same state, party, and committee, and the most electorally vulnerable. Further, party leaders share most frequently with the rank and file. These findings build upon our expanding understanding of congressional collaboration, the networks members of Congress form, and the congressional power structure members operate within.  相似文献   
170.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号