首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3784篇
  免费   110篇
各国政治   197篇
工人农民   150篇
世界政治   256篇
外交国际关系   631篇
法律   1555篇
中国政治   43篇
政治理论   1010篇
综合类   52篇
  2023年   22篇
  2022年   16篇
  2021年   33篇
  2020年   44篇
  2019年   81篇
  2018年   94篇
  2017年   108篇
  2016年   100篇
  2015年   86篇
  2014年   164篇
  2013年   504篇
  2012年   168篇
  2011年   180篇
  2010年   145篇
  2009年   165篇
  2008年   129篇
  2007年   147篇
  2006年   136篇
  2005年   121篇
  2004年   135篇
  2003年   136篇
  2002年   128篇
  2001年   61篇
  2000年   65篇
  1999年   60篇
  1998年   45篇
  1997年   45篇
  1996年   41篇
  1995年   43篇
  1994年   47篇
  1993年   49篇
  1992年   45篇
  1991年   37篇
  1990年   25篇
  1989年   42篇
  1988年   24篇
  1987年   30篇
  1986年   29篇
  1985年   40篇
  1984年   39篇
  1983年   37篇
  1982年   34篇
  1981年   33篇
  1980年   26篇
  1979年   15篇
  1978年   16篇
  1977年   16篇
  1975年   17篇
  1974年   12篇
  1973年   17篇
排序方式: 共有3894条查询结果,搜索用时 15 毫秒
991.
In Germany, both the number of patients treated in forensic psychiatric hospitals and the average inpatient treatment period have been increasing for over thirty years. Biographical and clinical factors, e.g., the number of prior offences, type of offence, and psychiatric diagnosis, count among the factors that influence the treatment duration and the likelihood of discharge. The aims of the current study were threefold: (1) to provide an estimate of the German forensic psychiatric patient population with a low likelihood of discharge, (2) to replicate a set of personal variables that predict a relatively high, as opposed to a low, likelihood of discharge from forensic psychiatric hospitals, and (3) to describe a group of other factors that are likely to add to the existing body of knowledge. Based on a sample of 899 patients, we applied a battery of primarily biographical and other personal variables to two subgroups of patients. The first subgroup of patients had been treated in a forensic psychiatric hospital according to section 63 of the German legal code for at least ten years (long-stay patients, n=137), whereas the second subgroup had been released after a maximum treatment period of four years (short-stay patients, n=67). The resulting logistic regression model had a high goodness of fit, with more than 85% of the patients correctly classified into the groups. In accordance with earlier studies, we found a series of personal variables, including age at first admission and type of offence, to be predictive of a short or long-stay. Other findings, such as the high number of immigrants among the short-stay patients and the significance of a patient's work time before admission to a forensic psychiatric hospital, are more clearly represented than has been observed in previous research.  相似文献   
992.
Cyber pornography plays an accessory role in negative social issues such as child abuse, violence against women, rape, inequality, relationship and family breakdown, youth crime, promiscuity and sexually transmitted diseases. Cyberspace and the pornographic matter transmitted through it have created challenges for India’s antiquated laws. The lack of jurisdictional boundaries and the sheer volume of traffic that the Internet can handle, as well as the potential for anonymity have resulted in a complete lack of control over what appears on the Web at the click of a mouse button. Before there was no liability of a cyber café owner but with the introduction of the Information Technology Amendment Act, 2008, the responsibilities of Cyber Café owners have only increased. This paper deals with the Cyber pornography, its legal implications and the liability of cyber café owner under the Information Technology Amendment Act, 2008.  相似文献   
993.
The precautionary principle – which implies that where there are threats of serious or irreversible damage, lack of full scientific certainty shall not be used as a reason for postponing protective measures – has been adopted as a standard of environmental and health protection in international and European legislation. This article offers an overview of the precautionary principle as a legal standard applicable to European privacy and data protection legislation. For this reason, it takes particularly into account the guidelines of this legislation as well as the privacy impact assessment framework, raised by the European Commission through the Recommendation on Radio-Frequency Identification applications. In brief, the article stresses the role of the precautionary principle in improving privacy protection through liability, prudence and transparency.  相似文献   
994.
Low self-control has emerged as a consistent and strong predictor of antisocial and delinquent behaviors. Using the twin subsample of the National Longitudinal Study of Adolescent Health (Add Health), genetic analyses were conducted to examine the genetic and environmental contributions to low self-control and offending as well as to their relationship with one another. The results revealed that low self-control and criminal behaviors are influenced by genetic and nonshared environmental factors with the effects of shared environmental factors being negligible. In addition, the co-variation between low self-control and criminal behaviors appears to be largely due to common genetic and nonshared environmental factors operating on both phenotypes. The implications of these findings on the current understanding of Gottfredson and Hirschi??s general theory of crime are discussed.  相似文献   
995.
This Article argues that the current approach of the Department of Health and Human Services and the Centers for Medicare and Medicaid Services (CMS) to enforcement of the Ethics in Patient Referrals Act (the "Stark Law") is unnecessarily punitive and discourages health-care providers from self-disclosing even very minor violations of the Stark Law. This Article suggests a number of specific changes to encourage provider self-disclosure and proposes that CMS create a demonstration project under the authority of the Patient Protection and Affordable Care Act to test the reforms. A demonstration project provides the perfect vehicle to prove that increased self-disclosure protocols for the Stark Law can decrease the government's costs of enforcement, improve program integrity, and encourage providers to deal responsibly with the inevitable minor lapses in compliance that arise in such an enormous government program as Medicare.  相似文献   
996.
The Combur Test is a ready-made and easy-to-use pretest for blood. It is based on the oxidation of tetramethylbenzidine (TMB), which is catalysed by haemoglobin and its derivatives. Despite its high sensitivity, there are many known substances which are responsible for false positive and false negative test results. On the basis of experiments of our own, case reports and the pertinent literature special aspects of the application of the Combur Test in the forensic routine case work are discussed.  相似文献   
997.
Digital Rights Management Systems (DRMs) related control mechanism, which are analogous to and augment the exclusive rights, have been the subject of debate since the early 1980s. DRMs, which function like an electronic security guard that ‘never leaves its post, never takes a break and never sleeps,1 can invade the privacy of individuals, prevent competition and/or control access to a work that is not or is no longer copyright protected. Hyperlinks are citations of an electronic address, but when clicked they navigate the user to the source of further information, including codes circumventing DRMs. This article accepts that the excesses of DRMs can outreach copyright and/or contract law, but argues that DRMs provide an opportunity for innovative business models, which can both protect digital works and promote free use of hyperlinks. Part 1 outlines the background and legislative provisions related to DRMs. It contrasts the WIPO Copyright Treaty (WCT) 1996,2 Articles 11 and 12, with corresponding provisions found in the implementing legislation of the US Digital Millennium Copyright Act (DMCA) 1998,3 and the EU Copyright Directive (EUCD) 2001.4 It also examines the intellectual property aspects of the Trans-Pacific Partnership (TPP) and Europe's Anti-counterfeiting Trade Agreement (ACTA).5 Part 2 debates opposing academic opinion and comments on case law relating to DRMs, including the use of hyperlinks as a way of trafficking circumvention technology and/or facilitating unauthorised access to a copyright work. It assesses the extent to which DRMs might inhibits the development of new products, prevents competition, or invades the privacy of individuals, and points to the opportunities a consumer group-rightholder negotiated model end user licence can offer. Part 3 concludes that DRMs bolsters the clutches of the rightholder, but reduce unauthorised access to information thus minimising revenue loss, which can make hyperlinked ‘consumer’ access to information ‘affordable,’ or even free.  相似文献   
998.
Privacy by Design (PbD) is a kind of precautionary legal technology design. It takes opportunities for fundamental rights without creating risks for them. Now the EU Commission “promised” to implement PbD with Art. 23(4) of its proposal of a General Data Protection Regulation. It suggests setting up a committee that can define technical standards for PbD. However the Commission did not keep its promise. Should it be left to the IT security experts who sit in the committee but do not have the legal expertise, to decide on our privacy or, by using overly detailed specifications, to prevent businesses from marketing innovative products? This paper asserts that the Commission's implementation of PbD is not acceptable as it stands and makes positive contributions for the work of a future PbD committee so that the Commission can keep its promise to introduce precautionary legal technology design.  相似文献   
999.
It is increasingly argued that the primary motive of the cybercriminal and the major reason for the continued growth in cyber attacks is financial gain. In addition to the direct financial impact of cybercrime, it can also be argued that the digital data and the information it represents that can be communicated through the Internet, can have additional intrinsic value to the cybercriminal. In response to the perceived value and subsequent demand for illicit data, a sophisticated and self-sufficient underground digital economy has emerged. The aim of this paper is to extend the author’s earlier research that first introduced the concept of the Cybercrime Execution Stack by examining in detail the underlying data objectives of the cybercriminal. Both technical and non-technical law enforcement investigators need the ability to contextualise and structure the illicit activities of the cybercriminal, in order to communicate this understanding amongst the wider law enforcement community. By identifying the potential value of electronic data to the cybercriminal, and discussing this data in the context of data collection, data supply and distribution, and data use, demonstrates the relevance and advantages of utilising an objective data perspective when investigating cybercrime.  相似文献   
1000.
The global ubiquity of cloud computing may expose consumers' sensitive personal data to significant privacy and security threats. A critical challenge for the cloud computing industry is to earn consumers' trust by ensuring adequate privacy and security for sensitive consumer data. Regulating consumer privacy and security also challenges government enforcement of data protection laws that were designed with national borders in mind. From an information privacy perspective, this article analyses how well the regulatory frameworks in place in Europe and the United States help protect the privacy and security of sensitive consumer data in the cloud. It makes suggestions for regulatory reform to protect sensitive information in cloud computing environments and to remove regulatory constraints that limit the growth of this vibrant new industry.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号