首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   714篇
  免费   3篇
各国政治   2篇
工人农民   30篇
世界政治   3篇
外交国际关系   448篇
法律   219篇
中国政治   1篇
政治理论   11篇
综合类   3篇
  2020年   3篇
  2019年   2篇
  2018年   2篇
  2017年   2篇
  2016年   2篇
  2015年   3篇
  2014年   41篇
  2013年   63篇
  2012年   56篇
  2011年   81篇
  2010年   60篇
  2009年   70篇
  2008年   41篇
  2007年   39篇
  2006年   39篇
  2005年   44篇
  2004年   50篇
  2003年   46篇
  2002年   38篇
  2001年   2篇
  2000年   2篇
  1999年   2篇
  1998年   2篇
  1997年   3篇
  1996年   2篇
  1995年   1篇
  1994年   4篇
  1993年   2篇
  1992年   3篇
  1991年   4篇
  1990年   1篇
  1989年   1篇
  1985年   1篇
  1984年   2篇
  1983年   2篇
  1982年   1篇
排序方式: 共有717条查询结果,搜索用时 15 毫秒
131.
Purpose. The present research investigated the relationship between underlying justice and vengeance motivations and sentencing recommendations made by expert clinicians, semi‐experts, and lay‐people. It was hypothesized that the semi‐experts would recommend significantly different sentence lengths from those recommended by the expert and lay‐person groups, in line with previous research findings. It was also hypothesized that justice and vengeance motivations would be related to punitive sentencing recommendations, and that these would not be the same across the three levels of expertise. Method. An independent groups design was utilized in the main analysis, with participants belonging to three distinct levels of clinical experience (experts, semi‐experts, and lay‐people). A questionnaire was administered, with participants being measured on levels of justice and vengeance motivations, and asked to recommend appropriate sentence lengths based on nine separate crime‐scenarios. These covariables were correlated and the correlation coefficients were compared across the three levels of expertise. Results. The former hypothesis was not upheld. Findings do, however, support the latter hypothesis, with the key finding indicating that for both justice and vengeance motivations in punitive judgement, it is the lay‐participants who appear distinct from the experts and semi‐experts. Conclusions. The current findings emphasize that while expert and lay‐person judgements may often appear to be the same, different processes and motivations underlying clinical judgements are occurring at the different stages of expertise. With the differences in the relationships between justice and vengeance motivations and judgements found in the current research, it is argued that expert and lay judgements that appear to be the same are, in fact, distinguishable and are related to quite different underlying motivations and decision‐making processes.  相似文献   
132.
Counterinsurgency as an operational method employed by the American military to achieve policy aims at a reasonable cost in blood and treasure has failed miserably. The idea that it has worked should be buried in the ground with a requiem stating that counterinsurgency is dead. Unfortunately, a large group of writers over many years have constructed a deeply flawed narrative that suggests that it is alive and well and continues to shape and influence American foreign policy toward and activist use of American military force in the world's troubled spots.  相似文献   
133.
The Obama Administration's desire to push forward with strategic nuclear arms reductions during the President's second term requires the navigation of numerous shoals and reefs. U.S. and Russian negotiators will have to overcome both political and military obstacles to accomplish post-New START reductions in long-range nuclear weapons. For example, efforts to reduce offensive nuclear weapons are complicated by U.S. and NATO plans for missile defenses deployed in Europe and by exigencies in U.S. and Russian domestic politics. In addition, the military-technical aspects of cyber war and nuclear deterrence can no longer be treated, analytically or practically, as isolated compartments. This article considers several aspects of the relationships among possible post-START offensive force reductions, advanced conventional weapons including missile defenses, and emerging cyber capabilities.  相似文献   
134.
135.
Despite the maturity of the software industry, empirical research demonstrates that average software quality, when measured through the presence of software defects, is low. Such defects cause a wide array of issues, not least in the form of vulnerabilities, which support a multi-billion pound a year industry of fraud in cyber crime. This paper suggests that this is the result of market failure stemming from two factors: the first is that information asymmetry prevents the establishment of software quality prior to purchase; whilst the second is that the legal provisions available under private law are unable in their current form to adequately address software liability issues. On that basis this paper proposes the use of standardisation as a tool to address both of these shortcomings by providing an industry benchmark against which software quality can be ascertained, as well as forming a legal tool for determining causation for the purposes of establishing legal liability.  相似文献   
136.
The Internet of Things (IoT) as an emerging global Internet-based information architecture facilitating the exchange of goods and services is gradually developing. While the technical aspects are being discussed in detail a legal framework does not exist so far. The first supranational organization trying to work out an IoT governance framework has been the European Commission by appointing a large group of experts to examine the relevant aspects of a possible IoT governance regime. In the meantime, however, the activities have been degraded. Nevertheless, even if the differences between the IoT and the Internet have been overestimated at the beginning, many elements of the IoT differ in part from the corresponding problems in the Internet. Therefore, an analysis of the major IoT governance issues (legitimacy, transparency, accountability, anticompetitive behavior) seems to be worthwhile to conduct.  相似文献   
137.
This article analyses digital identity as an emergent legal concept in the United States of America, as a consequence of the move to place all federal government services on-line. The features and functions of digital identity and its legal nature are examined, and the consequences are considered.  相似文献   
138.
New technologies permit online businesses to reduce expenses and increase efficiency by, for example, storing information in “the cloud”, engaging in online tracking and targeted advertising, location and tracking technologies, and biometrics. However, the potential for technology to facilitate long term retention of customers' personal information raises concerns about the competing right of individuals to the privacy of their personal information. Although the European Commission has recently released a proposal for regulation to “provide a data subject with the right to be forgotten and to erasure”, neither the OECD Privacy Guidelines nor the APEC Privacy Framework includes any requirement to delete personal information. While New Zealand includes a “limited retention principle” in the Privacy Act 1993, apart from one limited exception the privacy principles cannot be enforced in court. Taking New Zealand privacy law as an example, this paper examines the issue of retention of customer data, explains why this is a serious problem and argues that although it could be addressed by appropriate amendments to domestic laws, domestic privacy legislation may not be sufficient in an online environment. In the same way as other areas of law, such as the intellectual property regime, have turned to global regulatory standards which reflect the international nature of their subject matter, international privacy regulation should be the next stage for the information privacy regime.  相似文献   
139.
In this contribution, the authors explore the differences and interplays between the rights to privacy and data protection. They describe the two rights and come to the conclusion that they differ both formally and substantially, though overlaps are not to be excluded. Given these different yet not mutually exclusive scopes they then apply the rights to three case-studies (body-scanners, human enhancement technologies, genome sequencing), highlighting in each case potential legal differences concerning the scope of the rights, the role of consent, and the meaning of the proportionality test. Finally, and on the basis of these cases, the authors propose paths for articulating the two rights using the qualitative and quantitative thresholds of the two rights, which leads them to rethink the relationship between privacy and data protection, and ultimately, the status of data protection as a fundamental right.  相似文献   
140.
The Bermudian Supreme Court (at first instance) recently ruled in Bermuda Restaurants Limited (t/a “Chopsticks”) v. Jonathan Daspin and ConvergEx Global Markets Ltd. (Civil Jurisdiction 2008: No. 134 (to be reported)) on the issue of whether an employer (here, a company) should be held liable for an allegedly libellous email publication by its employee, the managing director. The Judge was asked by the employer company to determine two issues of law which exposed the company and which centred on its vicarious liability for its employee's actions, including whether the use of the company's email system, during working hours, made it complicit in the publication. The Court held, applying principles of English and Canadian law, that the company was not vicariously liable and by extension that it was not the email's publisher.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号