首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   664篇
  免费   2篇
各国政治   5篇
工人农民   21篇
世界政治   5篇
外交国际关系   457篇
法律   174篇
政治理论   4篇
  2023年   1篇
  2020年   2篇
  2019年   2篇
  2018年   3篇
  2017年   3篇
  2016年   1篇
  2015年   1篇
  2014年   40篇
  2013年   68篇
  2012年   57篇
  2011年   90篇
  2010年   59篇
  2009年   68篇
  2008年   36篇
  2007年   35篇
  2006年   37篇
  2005年   38篇
  2004年   42篇
  2003年   43篇
  2002年   35篇
  2001年   1篇
  1999年   1篇
  1997年   1篇
  1985年   1篇
  1981年   1篇
排序方式: 共有666条查询结果,搜索用时 0 毫秒
31.
32.
This article develops a framework for considering the future requirements for U.S. maritime power. It does so by proposing that these requirements must be considered within the context of an integrated National Fleet—the combined capabilities of the three “Sea Services”—the U.S. Navy, U.S. Marine Corps, and U.S. Coast Guard. It also would include their reserve components, as well as the Military Sealift Command (MSC) and the Maritime Administration's Ready Reserve Force (RRF)—the two organizations responsible for maintaining the nation's strategic sealift fleet.  相似文献   
33.
34.
35.
36.
The global defense industrial sector is a remarkably accurate indicator of the distribution of power in the post-Cold War international system. However, the defense industrial sector as a policy tool has received relatively little scrutiny, even though it not only reflects the international order, but also provides the United States with the ability to influence the foreign policy behavior of other states. The defense industrial sector is a powerful, if undervalued, diplomatic tool in the United States’ political arsenal.  相似文献   
37.
In Opinion 1/2010, the Article 29 Data Protection Working Party has provided additional guidance concerning the concepts of ‘controller’ and ‘processor’ contained in Directive 95/46/EC. This guidance aims to assist practitioners in their determination of whether an entity is acting as a controller or as a processor towards a particular data processing operation. Despite the fact that this opinion is informative, the existing framework still appears to leave room for a considerable amount of legal uncertainty. This uncertainty is attributable in part to the nature of the existing concepts, but also (and perhaps to a larger extent) to their apparent misalignment with current processing realities. In this paper, the author seeks to articulate why the existing concepts often remain difficult to apply in practice, in order to enable a constructive reflection on how these issues might be addressed in the future.  相似文献   
38.
Trust is an important feature for all users of the Internet who rely on the safety and security of network technologies and systems for their daily lives. Trust, or the lack of it, has also been identified by the European Commission’s Digital Agenda as a major barrier to further development of the information society in Europe. One of the areas in which concerns have been raised is in relation to children’s safety online. As a result, substantial efforts have been made by policymakers and by the industry to build greater trust and confidence in online digital safety. This paper examines what trust means in the context of children’s use of the Internet. Should policy on trust enhancement, for instance, include children’s own trust in the technologies or services they use or is it sufficient to seek to reinforce parental and adult confidence that children can be adequately protected? What is required to build that trust from either perspective? Does it need, or should it include a relationship of trust between parents and children? To tease out these questions further, the paper examines current European Union policy frameworks on digital safety, particularly industry responses to the call for a more trusted Internet environment for children, and argues that technical solutions to be effective need to carefully balance a number of competing objectives and to be sufficiently grounded in evidence of parental and child experience of the Internet.  相似文献   
39.
Bioinformatics refers to the practise of creation and management of genetic data using computational and statistical techniques. In Malaysia, data obtained from genomic studies, particularly for the purpose of disease identification produces a tremendous amount of information related to molecular biology. These data are created from DNA samples obtained from diagnostic and research purposes in genomic research institutes in Malaysia. As these data are processed, stored, managed and profiled using computer applications, an issue arises as to whether the principles of personal data privacy would be applicable to these activities. This paper commences with an illustration of the salient features of the Personal Data Protection Act 2010. The second part analyses the impact of the newly passed Personal Data Protection Act 2010 on the collection of DNA sample, the processing of data obtained from it and the profiling of such data. The third part of the paper considers whether the various personal data protection principles are applicable to the act of DNA profiling and the creation of bioinformatics.  相似文献   
40.
Virtual world economies are undoubtedly increasing in growth, participation and importance. Their macroeconomic impact has already been seen as important in the real world economies; however its governance and jurisdiction is unclear. This paper will argue that virtual economies are not actually as virtual as they first appear to be. Secondly the paper argues that because of the real world effects and impacts virtual world economies can have, they should be applicable to real world jurisdictions and regulations. The question that is therefore posed is in which jurisdiction should the legal backbone be placed? The paper will be divided into several parts. Firstly, a background of what virtual worlds are, and what they mean in linguistic definition. Secondly, a review of law economics and history shall be considered to determine that what is once considered ‘other worldly’ is accepted as the norm. Thirdly, the paper will consider a virtual world economy, namely that of Second Life to establish the real world impacts that virtual world economies can have. Fourthly, the paper will consider two case studies of financial crisis occurring in the virtual worlds and the synergies we can draw from the real world. Finally, the paper will conclude with the proposition that legal governance is required and will enable what is already a lucrative business to flourish further within the realms of possibility and not virtually.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号