首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   971篇
  免费   15篇
各国政治   30篇
工人农民   29篇
世界政治   46篇
外交国际关系   468篇
法律   313篇
中国共产党   1篇
中国政治   2篇
政治理论   94篇
综合类   3篇
  2023年   1篇
  2022年   2篇
  2020年   2篇
  2019年   5篇
  2018年   15篇
  2017年   11篇
  2016年   11篇
  2015年   9篇
  2014年   49篇
  2013年   142篇
  2012年   67篇
  2011年   88篇
  2010年   69篇
  2009年   76篇
  2008年   46篇
  2007年   50篇
  2006年   45篇
  2005年   54篇
  2004年   59篇
  2003年   50篇
  2002年   45篇
  2001年   5篇
  2000年   12篇
  1999年   2篇
  1998年   9篇
  1997年   7篇
  1996年   4篇
  1995年   5篇
  1994年   6篇
  1993年   3篇
  1992年   4篇
  1991年   2篇
  1990年   3篇
  1989年   4篇
  1988年   3篇
  1987年   2篇
  1985年   5篇
  1984年   3篇
  1983年   3篇
  1982年   2篇
  1980年   3篇
  1979年   1篇
  1978年   1篇
  1975年   1篇
排序方式: 共有986条查询结果,搜索用时 15 毫秒
901.
Video games often feature a character that evolves into an iconic superhero. In a strange twist of fate, the video game medium will have the opportunity to become a superhero itself. The recording, comic book, and movie industries have rallied around video games as the case of Arnold Schwarzenegger vs. Entertainment Merchants Association and Entertainment Software Association reaches the Supreme Court of the United States. The case concerns a 2005 California ban on the sale of violent video games to minors. The law was later overturned by the District Court and the 9th Circuit Court on appeal. At issue is whether the law violates the First Amendment of the Constitution. Do video games deserve the full protection of the Constitution as a legitimate form of speech, or should it be limited due to its alleged effects on the psychological well-being of minors? This Article will look at the impact this case may have when it reaches the Supreme Court, an analysis of the issues that will be argued, and the history of legislation involving violent video games.  相似文献   
902.
Internet Protocol addresses [IP addresses] are central for Internet electronic communications. They individualize computers and their users to make the delivery of data packets possible. IP addresses are also often used to identify websurfers for litigation purposes. In particular, they constitute a key in the fight against online copyright infringement to identify infringers. However, it is a matter of dispute to know if IP addresses are personal data. In a review of relevant case law, the present paper seeks to identify when IP addresses are - or should be - considered as personal data. It suggests a contextual approach to the concept of personal data.  相似文献   
903.
Modern identity is valuable, multi-functional and complex. Today we typically manage multiple versions of self, made visible in digital trails distributed widely across offline and online spaces. Yet, technology-mediated identity leads us into crisis. Enduring accessibility to greater and growing personal details online, alongside increases in both computing power and data linkage techniques, fuel fears of identity exploitation. Will it be stolen? Who controls it? Are others aggregating or analysing our identities to infer new data about us without our knowledge or consent? New challenges present themselves globally around these fears, as manifested by concerns over massive online data breaches and automated identification technologies, which also highlight the conundrum faced by governments about how to safeguard individuals' interests on the Web while striking a fair balance with wider public interests. This paper reflects upon some of these problems as part of the inter-disciplinary, transatlantic ‘SuperIdentity’ project investigating links between cyber and real-world identifiers. To meet the crisis, we explore the relationship between identity and digitisation from the perspective of policy and law. We conclude that traditional models of identity protection need supplementing with new ways of thinking, including pioneering ‘technical-legal’ initiatives that are sensitive to the different risks that threaten our digital identity integrity. Only by re-conceiving identity dynamically to appreciate the increasing capabilities for connectivity between different aspects of our identity across the cyber and the physical domains, will policy and law be able to keep up with and address the challenges that lie ahead in our progressively networked world.  相似文献   
904.
This article explores how both the sovereign debt crisis and the European Union's response illustrate fundamental characteristics of contemporary European integration. In the face of an unexpected emergency, national politicians took the lead and pressed ahead with more integration. The long-term results though depend on national acceptance of not just the bailout provisions but also enforcement of debt brakes mandated by the new EU treaty. This means democratic politics at the national level will continue to have a fundamental influence on EU affairs, while the North/South split will co-exist alongside a more marked separation between countries inside and outside the Eurozone. In this context of increased political turbulence within the EU, there is likely to be only a limited window of opportunity for successful negotiation of a free-trade deal with the United States.  相似文献   
905.
Insofar as Europe's security and cohesion have for decades been premised upon a strong American political and strategic engagement, Washington's intention to “rebalance” to Asia casts a shadow over the sustainability of a stable and coherent geopolitical order on the continent. This article argues that as the United States seeks to rebalance strategically towards the Asia-Pacific region a number of “indigenous” geopolitical trends are becoming increasingly important in Europe: an Anglo-French entente for a “maritime” Europe, a German-French “continental” project of economic and political integration, and Russia's resurgence across Europe's East. The growing prominence of competing geopolitical visions for Europe might even call into question the cohesion and direction of the institutional expressions of the U.S.- engineered Western order in Europe, namely the Atlantic Alliance and the European Union. Increasing geopolitical and institutional contestation, we contend, pose a number of challenges for both U.S. interests and European security.  相似文献   
906.
The West's treatment of irregular fighters in the “war on terror” was highly problematic. This article contends that we must look beyond the assumption that political and strategic considerations compromised the law and led to the “invention” of the category of the “unlawful combatant.” Rather, the law of armed conflict itself includes strong exclusionary mechanisms towards irregular fighters. These exclusionary strands in the law came to dominate the West's strategic decision-making on the treatment of irregular fighters. Moreover, the fact that irregular fighters became such a vital issue post-9/11 was not a result of the war on terror being a new kind of war, as has often been argued. Rather, this article suggests that it reflects an identity crisis of the West's regular armed forces at the start of the twenty-first century.  相似文献   
907.
As the Department of Defense strives to take the social sciences more seriously in the face of threats emanating from the non-West, it confronts several challenges. Among them, we Westerners cannot model non-Western minds. Nor can we devise a methodology that will accurately capture contingency. We may already be doing our “scientific” best with “pattern of life” targeting. Consequently, DoD should invest more heavily in individuals who already have an affinity for, and interest in, the non-West and who show promise as future commanders and talented analysts rather than spend large sums on trying to devise more comprehensive models, methodologies, and metrics.  相似文献   
908.
A substantial body of sociolegal scholarship suggests that the legitimacy of the law crucially depends on the public's perception that legal processes are fair. The bulk of this research relies on an underdeveloped account of the material and institutional contexts of litigants' perceptions of fairness. We introduce an analysis of situated justice to capture a contextualized conception of how litigants narrate fairness in their actual legal encounters. Our analysis draws on 100 in‐depth interviews with defendant's representatives, plaintiffs, and lawyers involved in employment discrimination lawsuits, selected as part of a multimethod study of 1,788 discrimination cases filed in U.S. district courts between 1988 and 2003. This article offers two key empirical findings, the first at the level of individual perceptions and the second at the level of legal institutions. First, we find that neither defendants' representatives nor plaintiffs believe discrimination law is fair. Rather than sharing a complaint, however, each side sees unfairness only in those aspects of the process that work to their disadvantage. Second, we demonstrate that the very notion of fairness can belie structural asymmetries that, overall, profoundly benefit employers in employment discrimination lawsuits. We conclude by discussing how a situated justice analysis calls for a rethinking of empirical research on fairness. Audio recordings of respondents quoted in this article are available online. 1   相似文献   
909.
Cloud computing is an information technology technique that promises greater efficiency and reduced-cost to consumers, businesses and public institutions. However, to the extent it has brought better efficiency and minimal cost, the emergence of cloud computing has posed a significant regulatory challenge on the application of data protection rules particularly on the regime regulating cross-border data flow. The Data Protection Directive (DPD), which dates back to 1995, is at odds with some of the basic technological and business-related features of the cloud. As a result, it is claimed that the Directive hardly offers any help in using the legal bases to ‘process’ and ‘transfer’ data as well as to determine when a transfer to a third country occurs in cloud computing. Despite such assertions, the paper argues that the ECJ's Bodil Lindqvist decision can to a certain extent help to delineate circumstances where transfer should and should not occur in the cloud. Concomitantly, the paper demonstrates that controllers can still make the most of the available possibilities in justifying their ‘processing’ as well as ‘transferring’ of data to a third country in cloud arrangements. In doing so, the paper also portrays the challenges that arise down the road. All legal perspectives are largely drawn from EU level though examples are given from member states and other jurisdictions when relevant.  相似文献   
910.
Trust has been defined in many ways, but at its core it involves acting without the knowledge needed to act. Trust in records depends on four types of knowledge about the creator or custodian of the records: reputation, past performance, competence, and the assurance of confidence in future performance. For over half a century society has been developing and adopting new computer technologies for business and communications in both the public and private realm. Frameworks for establishing trust have developed as technology has progressed. Today, individuals and organizations are increasingly saving and accessing records in cloud computing infrastructures, where we cannot assess our trust in records solely on the four types of knowledge used in the past. Drawing on research conducted at the University of British Columbia into the nature of digital records and their trustworthiness, this article presents the conceptual archival and digital forensic frameworks of trust in records and data, and explores the common law legal framework within which questions of trust in documentary evidence are being tested. Issues and challenges specific to cloud computing are introduced.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号