全文获取类型
收费全文 | 710篇 |
免费 | 10篇 |
专业分类
各国政治 | 11篇 |
工人农民 | 19篇 |
世界政治 | 15篇 |
外交国际关系 | 454篇 |
法律 | 206篇 |
政治理论 | 15篇 |
出版年
2023年 | 2篇 |
2022年 | 4篇 |
2021年 | 3篇 |
2020年 | 4篇 |
2019年 | 7篇 |
2018年 | 8篇 |
2017年 | 8篇 |
2016年 | 4篇 |
2015年 | 9篇 |
2014年 | 44篇 |
2013年 | 75篇 |
2012年 | 60篇 |
2011年 | 80篇 |
2010年 | 62篇 |
2009年 | 71篇 |
2008年 | 39篇 |
2007年 | 39篇 |
2006年 | 38篇 |
2005年 | 38篇 |
2004年 | 44篇 |
2003年 | 43篇 |
2002年 | 36篇 |
2000年 | 1篇 |
1984年 | 1篇 |
排序方式: 共有720条查询结果,搜索用时 31 毫秒
141.
142.
Alessandro Pellegata 《Democratization》2013,20(7):1195-1218
The present article addresses the relationship between democracy and political corruption. Extending past studies, this article introduces important refinements that respond to theoretical and methodological concerns. The theoretical framework proposed here is developed based on an electoral conception of democracy, which makes it possible to avoid the potential endogeneity problems associated with substantial definitions of democracy. I argue that despite the influence of other important aspects of democracy, elections and inter-party competition per se help to constrain political corruption. The article examines two analytical dimensions of democracy, the current level of democracy and its degree of consolidation over time. Unlike previous studies, a cross-national empirical analysis of a sample of more than 100 countries reveals that when tested together, the level of democracy and its degree of longitudinal variation are both significantly related to the control of corruption. The level of democracy affects corruption in a non-linear way. Hybrid regimes that are more autocratic than democratic show a lower level of corruption control than democracies, near-democracies, and closed dictatorships. The analysis also confirms that, despite having adopted different measures, more consolidated democracies are more powerful in constraining corruption. 相似文献
143.
144.
Despite the maturity of the software industry, empirical research demonstrates that average software quality, when measured through the presence of software defects, is low. Such defects cause a wide array of issues, not least in the form of vulnerabilities, which support a multi-billion pound a year industry of fraud in cyber crime. This paper suggests that this is the result of market failure stemming from two factors: the first is that information asymmetry prevents the establishment of software quality prior to purchase; whilst the second is that the legal provisions available under private law are unable in their current form to adequately address software liability issues. On that basis this paper proposes the use of standardisation as a tool to address both of these shortcomings by providing an industry benchmark against which software quality can be ascertained, as well as forming a legal tool for determining causation for the purposes of establishing legal liability. 相似文献
145.
The Internet of Things (IoT) as an emerging global Internet-based information architecture facilitating the exchange of goods and services is gradually developing. While the technical aspects are being discussed in detail a legal framework does not exist so far. The first supranational organization trying to work out an IoT governance framework has been the European Commission by appointing a large group of experts to examine the relevant aspects of a possible IoT governance regime. In the meantime, however, the activities have been degraded. Nevertheless, even if the differences between the IoT and the Internet have been overestimated at the beginning, many elements of the IoT differ in part from the corresponding problems in the Internet. Therefore, an analysis of the major IoT governance issues (legitimacy, transparency, accountability, anticompetitive behavior) seems to be worthwhile to conduct. 相似文献
146.
This article analyses digital identity as an emergent legal concept in the United States of America, as a consequence of the move to place all federal government services on-line. The features and functions of digital identity and its legal nature are examined, and the consequences are considered. 相似文献
147.
New technologies permit online businesses to reduce expenses and increase efficiency by, for example, storing information in “the cloud”, engaging in online tracking and targeted advertising, location and tracking technologies, and biometrics. However, the potential for technology to facilitate long term retention of customers' personal information raises concerns about the competing right of individuals to the privacy of their personal information. Although the European Commission has recently released a proposal for regulation to “provide a data subject with the right to be forgotten and to erasure”, neither the OECD Privacy Guidelines nor the APEC Privacy Framework includes any requirement to delete personal information. While New Zealand includes a “limited retention principle” in the Privacy Act 1993, apart from one limited exception the privacy principles cannot be enforced in court. Taking New Zealand privacy law as an example, this paper examines the issue of retention of customer data, explains why this is a serious problem and argues that although it could be addressed by appropriate amendments to domestic laws, domestic privacy legislation may not be sufficient in an online environment. In the same way as other areas of law, such as the intellectual property regime, have turned to global regulatory standards which reflect the international nature of their subject matter, international privacy regulation should be the next stage for the information privacy regime. 相似文献
148.
In this contribution, the authors explore the differences and interplays between the rights to privacy and data protection. They describe the two rights and come to the conclusion that they differ both formally and substantially, though overlaps are not to be excluded. Given these different yet not mutually exclusive scopes they then apply the rights to three case-studies (body-scanners, human enhancement technologies, genome sequencing), highlighting in each case potential legal differences concerning the scope of the rights, the role of consent, and the meaning of the proportionality test. Finally, and on the basis of these cases, the authors propose paths for articulating the two rights using the qualitative and quantitative thresholds of the two rights, which leads them to rethink the relationship between privacy and data protection, and ultimately, the status of data protection as a fundamental right. 相似文献
149.
Universities have long been involved in knowledge transfer activities and are increasing their efforts to collaborate with industry. However, universities vary enormously in the extent to which they promote, and succeed in commercializing, academic research. In this paper, we focus on the concept of cognitive distance, intended as differences in the sets of basic values, norms and mental models in universities and firms. We assess the impact of cognitive distance on university-industry collaborations. Based on original data from interviews with 197 university departments in Italy, our analysis determines whether cognitive distance is perceived as a barrier to university-industry interactions, and estimates its effects on the frequency of their collaborations. Our results confirm that cognitive, albeit not affecting the probability of departments to collaborate with firms, significantly hinders the frequency of interactions. 相似文献
150.
Alex JenkinsAuthor Vitae 《Computer Law & Security Report》2009,25(3):280-284
The Bermudian Supreme Court (at first instance) recently ruled in Bermuda Restaurants Limited (t/a “Chopsticks”) v. Jonathan Daspin and ConvergEx Global Markets Ltd. (Civil Jurisdiction 2008: No. 134 (to be reported)) on the issue of whether an employer (here, a company) should be held liable for an allegedly libellous email publication by its employee, the managing director. The Judge was asked by the employer company to determine two issues of law which exposed the company and which centred on its vicarious liability for its employee's actions, including whether the use of the company's email system, during working hours, made it complicit in the publication. The Court held, applying principles of English and Canadian law, that the company was not vicariously liable and by extension that it was not the email's publisher. 相似文献