首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   111篇
  免费   6篇
各国政治   10篇
工人农民   3篇
世界政治   5篇
外交国际关系   9篇
法律   44篇
政治理论   45篇
综合类   1篇
  2023年   2篇
  2021年   1篇
  2020年   8篇
  2019年   4篇
  2018年   6篇
  2017年   5篇
  2016年   5篇
  2015年   6篇
  2014年   5篇
  2013年   16篇
  2012年   4篇
  2011年   5篇
  2010年   2篇
  2009年   5篇
  2008年   1篇
  2007年   5篇
  2006年   2篇
  2005年   4篇
  2004年   1篇
  2003年   1篇
  2002年   2篇
  2001年   1篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1993年   2篇
  1992年   2篇
  1990年   1篇
  1988年   2篇
  1987年   3篇
  1986年   3篇
  1983年   4篇
  1982年   3篇
  1981年   1篇
  1972年   1篇
  1967年   1篇
排序方式: 共有117条查询结果,搜索用时 15 毫秒
91.
The Internet of Things (IoT) is a disruptive innovation known for its socio-economic potential, but also for generating unprecedented vulnerabilities and threats. As a dynamic sociotechnical system, the IoT comprises well-known cybersecurity risks and endemic uncertainties that arise as IoT adoption increases and the system evolves. We highlight the impact of these challenges by analyzing how insecure IoT devices pose threats to both consumer protection and the Internet's infrastructure. While recent regulatory responses are starting to target IoT security risks, crucial deficiencies – especially related to the feedback necessary to keep pace with emerging risks and uncertainties – must be addressed. We propose a model of adaptive regulatory governance that integrates the benefits of centralized risk regulatory frameworks with the operational knowledge and mitigation mechanisms developed by epistemic communities that manage day-to-day Internet security. Rather than focusing on the choice of regulatory instruments, this model builds on the “planned adaptive regulation” literature to highlight the need to systematically plan for a knowledge-sharing interface in regulatory governance design for disruptive technologies, facilitating the feedback necessary to address evolving IoT security risks.  相似文献   
92.
93.
Birthday     
Jesse Ball 《耶鲁评论》2020,108(3):47-51
  相似文献   
94.
95.
This article examines how terrorist alerts and terrorist threats interacted during a period of heightened alert in Europe in late 2010. Taking from game theory the concepts of target transference (by terrorists) and defence races (among states) and using their underlying rationalist logic as a causal mechanism, the article attempts to construct an analytical narrative of the till now unwritten history of this event. In the process, the event serves to test whether the observable implications of theory corresponded to reality in this case. The study finds that during the Euro-alert transference in time was more common than transference of place and that there was more resistance to defence races than theory predicts. The alert itself was only a qualified success; the extent to which it was effective was determined by its combination with other offensive actions. The findings call for more attention to be given to terrorist preferences, inter-temporal transference and its relationship to bandwagoning, and state resistance to defence races with consideration of the role of information.  相似文献   
96.
97.
98.
In Grutter v. Bollinger, Justice O’Connor conjecturedthat in 25 years affirmative action in college admissions willbe unnecessary. We project the test score distribution of blackand white college applicants 25 years from now, focusing onthe role of black–white family income gaps. Economic progressalone is unlikely to narrow the achievement gap enough in 25years to produce today’s racial diversity levels withrace-blind admissions. A return to the rapid black–whitetest score convergence of the 1980s could plausibly cause blackrepresentation to approach current levels at moderately selectiveschools, but not at the most selective schools.  相似文献   
99.
100.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号