首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   874篇
  免费   11篇
各国政治   8篇
工人农民   43篇
世界政治   21篇
外交国际关系   476篇
法律   272篇
中国政治   2篇
政治理论   62篇
综合类   1篇
  2022年   3篇
  2021年   3篇
  2020年   5篇
  2019年   7篇
  2018年   16篇
  2017年   9篇
  2016年   14篇
  2015年   6篇
  2014年   42篇
  2013年   93篇
  2012年   62篇
  2011年   96篇
  2010年   60篇
  2009年   73篇
  2008年   43篇
  2007年   44篇
  2006年   47篇
  2005年   41篇
  2004年   46篇
  2003年   46篇
  2002年   46篇
  2001年   6篇
  2000年   6篇
  1999年   2篇
  1998年   3篇
  1996年   3篇
  1995年   1篇
  1994年   4篇
  1993年   3篇
  1992年   3篇
  1991年   3篇
  1990年   4篇
  1988年   5篇
  1987年   1篇
  1986年   6篇
  1983年   2篇
  1982年   3篇
  1981年   1篇
  1980年   4篇
  1979年   4篇
  1978年   4篇
  1977年   4篇
  1976年   1篇
  1975年   2篇
  1974年   1篇
  1973年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
排序方式: 共有885条查询结果,搜索用时 31 毫秒
861.
The use of online consumer tracking methods has raised significant privacy concerns for consumers and policymakers for decades. Advertisers using these methods analyze web-viewing habits to predict consumer preferences and actions. The advertising industry in the United States has promoted self-regulatory principles to respond to these concerns. However, in December 2010, the U.S. Federal Trade Commission reported that these efforts “have been too slow and up to now have failed to provide adequate and meaningful protection.” President Barack Obama's administration has supported broader legislation for comprehensive protection of individuals' private data. The leading model for data privacy protection is the 1980 Organization for Economic Cooperation and Development (OECD) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. This article examines two leading legislative privacy proposals in the context of the OECD principles. This examination concludes that, although the proposals do not provide sufficient comprehensive privacy protections, they do fill significant gaps in current U.S. privacy laws.  相似文献   
862.
The EU institutions are increasingly addressing harmonisation by means of regulation rather than the traditional use of directives. This is particularly impacting areas such as data protection, financial services regulation and European standardisation in Information and Communications Technology. More broadly, using directly applicable regulations which may have horizontal and vertical direct effect rather than directives has important administrative and constitutional implications for their application in national law and impacts on Member States' discretion to implement supplementary legislation which falls within the remit of the regulation in question. This is of particular concern where governments implement policies which might be in contravention of these rules. This may be the case in relation to the UK government's public procurement policy which mandates royalty free standards rather than royalty bearing standards with the option for the licence holder to licence royalty free.  相似文献   
863.
Proposals for the reform or ‘modernisation’ of Council of Europe Data Protection Convention 108 have now been forwarded from the Convention's Consultative Committee for consideration by the Council of Ministers. This article assesses the changes proposed, which strengthen the obligations of Parties to implement the Convention as a matter of effective practice, not just as a law on paper. It tightens most of the existing data protection principles, and adds new ones which better align the Convention with the EU Directive (and proposed Regulation). The Convention Committee will have explicit new functions including assessing candidates for accession, and periodically reviewing implementation by existing parties. However, the proposals concerning the required standard for data export limitations are in some respects ill-defined and dangerous for data subjects. The existing standard that personal data can only be exported if the recipient provides ‘adequate’ protection has been abandoned for an undefined requirement of ‘appropriate’ protection. The article situates the risk of abandoning meaningful data export restrictions in the context of the USA's push for ‘interoperability’ of very different data protection standards.  相似文献   
864.
Although the framework for protection of computer programs has been established in the European Union more than two decades ago, it has not undergone any major changes. Opinions of Advocate General Yves Bot have convinced the Court to advance the concept of the plurality of copyright regimes applicable to software: source code, object code and documentation would be protected under the Software Directive, whereas interfaces, programming languages, data formats and software manuals are dealt with as literary works under the InfoSoc Directive. In SAS Institute v WPL, the Court also ruled that copyright in a computer program cannot be infringed where the lawful acquirer of the license neither decompiled the object code nor copied the source code of the computer program, but merely studied, observed and tested that program in order to reproduce its functionality in a second program. This ruling paves the way and acknowledges the reverse engineering efforts on the Old Continent.  相似文献   
865.
The robots.txt protocol allows website owners to specify whether and if so, what bots may access their sites. On the one hand, websites owners may have good reason to fend off bots. The bots may consume too much capacity, they may harvest data that are not suitable for presentation elsewhere on the web, or the owner may have reasons for disallowing bots that lie in the relation with user of the bot. On the other hand, search engines, aggregators and other users of bots may provide social beneficial services based on the data collected by bots, i.e. data that are freely available to anybody visiting the site manually. How should the law regulate disputes that arise in this context? Two legal regimes (trespass to chattels and unauthorised access) have been examined. Based on the characteristics of the disputes at hand, a number of desirable characteristics for an ideal form of regulation are identified. When testing the two regimes they are found to be lacking. A structure for a form of regulation is presented that allows the law to develop in a way that does more justice to the disputes at hand.  相似文献   
866.
867.
Insofar as Europe's security and cohesion have for decades been premised upon a strong American political and strategic engagement, Washington's intention to “rebalance” to Asia casts a shadow over the sustainability of a stable and coherent geopolitical order on the continent. This article argues that as the United States seeks to rebalance strategically towards the Asia-Pacific region a number of “indigenous” geopolitical trends are becoming increasingly important in Europe: an Anglo-French entente for a “maritime” Europe, a German-French “continental” project of economic and political integration, and Russia's resurgence across Europe's East. The growing prominence of competing geopolitical visions for Europe might even call into question the cohesion and direction of the institutional expressions of the U.S.- engineered Western order in Europe, namely the Atlantic Alliance and the European Union. Increasing geopolitical and institutional contestation, we contend, pose a number of challenges for both U.S. interests and European security.  相似文献   
868.
The West's treatment of irregular fighters in the “war on terror” was highly problematic. This article contends that we must look beyond the assumption that political and strategic considerations compromised the law and led to the “invention” of the category of the “unlawful combatant.” Rather, the law of armed conflict itself includes strong exclusionary mechanisms towards irregular fighters. These exclusionary strands in the law came to dominate the West's strategic decision-making on the treatment of irregular fighters. Moreover, the fact that irregular fighters became such a vital issue post-9/11 was not a result of the war on terror being a new kind of war, as has often been argued. Rather, this article suggests that it reflects an identity crisis of the West's regular armed forces at the start of the twenty-first century.  相似文献   
869.
As the Department of Defense strives to take the social sciences more seriously in the face of threats emanating from the non-West, it confronts several challenges. Among them, we Westerners cannot model non-Western minds. Nor can we devise a methodology that will accurately capture contingency. We may already be doing our “scientific” best with “pattern of life” targeting. Consequently, DoD should invest more heavily in individuals who already have an affinity for, and interest in, the non-West and who show promise as future commanders and talented analysts rather than spend large sums on trying to devise more comprehensive models, methodologies, and metrics.  相似文献   
870.
This article explores how both the sovereign debt crisis and the European Union's response illustrate fundamental characteristics of contemporary European integration. In the face of an unexpected emergency, national politicians took the lead and pressed ahead with more integration. The long-term results though depend on national acceptance of not just the bailout provisions but also enforcement of debt brakes mandated by the new EU treaty. This means democratic politics at the national level will continue to have a fundamental influence on EU affairs, while the North/South split will co-exist alongside a more marked separation between countries inside and outside the Eurozone. In this context of increased political turbulence within the EU, there is likely to be only a limited window of opportunity for successful negotiation of a free-trade deal with the United States.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号