首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   962篇
  免费   54篇
各国政治   84篇
工人农民   31篇
世界政治   76篇
外交国际关系   100篇
法律   382篇
中国政治   7篇
政治理论   329篇
综合类   7篇
  2023年   3篇
  2022年   6篇
  2021年   19篇
  2020年   35篇
  2019年   35篇
  2018年   36篇
  2017年   50篇
  2016年   42篇
  2015年   43篇
  2014年   36篇
  2013年   173篇
  2012年   29篇
  2011年   44篇
  2010年   19篇
  2009年   33篇
  2008年   29篇
  2007年   39篇
  2006年   35篇
  2005年   28篇
  2004年   24篇
  2003年   28篇
  2002年   40篇
  2001年   15篇
  2000年   18篇
  1999年   15篇
  1998年   17篇
  1997年   16篇
  1996年   11篇
  1995年   4篇
  1994年   15篇
  1993年   9篇
  1992年   8篇
  1991年   6篇
  1990年   9篇
  1989年   5篇
  1988年   3篇
  1987年   3篇
  1986年   5篇
  1985年   4篇
  1984年   2篇
  1983年   4篇
  1982年   2篇
  1981年   3篇
  1980年   3篇
  1978年   2篇
  1977年   2篇
  1976年   4篇
  1974年   1篇
  1973年   1篇
  1965年   1篇
排序方式: 共有1016条查询结果,搜索用时 31 毫秒
171.
The use of computers in the commission of crime, so-called ??cybercrime??, presents a considerable challenge to law enforcement. Central to the prosecution of cybercrime is the offence of unauthorised access to a computer, or ??hacking??. Originally conceived of as analogous to trespass, the trend in some jurisdictions has been toward punishing access to computer data per se. This issue also arises under the Council of Europe Convention on Cybercrime which criminalizes ??offences against the confidentiality, integrity and availability of computer data and systems??. As the criminal law traditionally provides protection only to limited forms of information, the increasing use of the criminal law to protect computer data therefore confers on it a status not enjoyed by information stored in other forms. Drawing upon the laws of Australia, the United Kingdom and the United States, this article explores the increasing criminalization of access to computer data. It describes the evolution of cybercrime laws and considers ways in which problems of over breadth may be avoided. Questions will also be raised as to the appropriate role of the criminal law in protecting information.  相似文献   
172.
We present a formal model of an intelligence agency that must divide its resources between the collection and analysis of information pertaining to terror plots. The model highlights the negative consequences of queues which form when collection exceeds analytic capacity. We incorporate the response of a terrorist organization to the operating characteristics of the intelligence system it faces, and solve for equilibrium strategies for the intelligence system and terrorist organization. Our results demonstrate the importance of properly balancing resources between collection and analysis, and stand in contrast to the observed state of overcollection in US intelligence agencies.  相似文献   
173.
174.
175.
176.
177.
178.
179.
180.
This article demonstrates that in recent years, patent settlements between branded and generic manufacturers involving "reverse payments" from branded manufacturers to generic manufacturers have received close antitrust scrutiny, driven by concerns that such settlements harm consumers by delaying the entry of lower-priced generic drugs. The authors note that such settlements will be a focus of the Obama Administration's antitrust enforcement policy, yet there is a growing consensus among the courts that such settlements are anticompetitive only under narrow sets of circumstances. In this article, the authors present an analytical framework for evaluating the competitive effects of patent settlements, including those involving reverse payments, and demonstrate that these settlements can benefit consumers. Thus, the authors conclude that while continued scrutiny of such settlements is important, broad brush treatments are inappropriate and only a more individualized evaluation can correctly determine the competitive effects of a particular settlement agreement.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号