全文获取类型
收费全文 | 1271篇 |
免费 | 64篇 |
专业分类
各国政治 | 92篇 |
工人农民 | 45篇 |
世界政治 | 101篇 |
外交国际关系 | 111篇 |
法律 | 539篇 |
中国政治 | 9篇 |
政治理论 | 426篇 |
综合类 | 12篇 |
出版年
2023年 | 4篇 |
2022年 | 7篇 |
2021年 | 20篇 |
2020年 | 35篇 |
2019年 | 46篇 |
2018年 | 40篇 |
2017年 | 65篇 |
2016年 | 50篇 |
2015年 | 51篇 |
2014年 | 41篇 |
2013年 | 215篇 |
2012年 | 33篇 |
2011年 | 52篇 |
2010年 | 31篇 |
2009年 | 41篇 |
2008年 | 38篇 |
2007年 | 52篇 |
2006年 | 45篇 |
2005年 | 30篇 |
2004年 | 32篇 |
2003年 | 37篇 |
2002年 | 44篇 |
2001年 | 24篇 |
2000年 | 31篇 |
1999年 | 26篇 |
1998年 | 24篇 |
1997年 | 20篇 |
1996年 | 15篇 |
1995年 | 9篇 |
1994年 | 19篇 |
1993年 | 11篇 |
1992年 | 14篇 |
1991年 | 12篇 |
1990年 | 13篇 |
1989年 | 13篇 |
1988年 | 5篇 |
1987年 | 12篇 |
1986年 | 9篇 |
1985年 | 7篇 |
1984年 | 6篇 |
1983年 | 7篇 |
1982年 | 3篇 |
1981年 | 5篇 |
1980年 | 5篇 |
1979年 | 11篇 |
1978年 | 6篇 |
1977年 | 3篇 |
1976年 | 4篇 |
1974年 | 4篇 |
1969年 | 2篇 |
排序方式: 共有1335条查询结果,搜索用时 0 毫秒
231.
Jonathan Clough 《Criminal Law Forum》2011,22(1-2):145-170
The use of computers in the commission of crime, so-called ??cybercrime??, presents a considerable challenge to law enforcement. Central to the prosecution of cybercrime is the offence of unauthorised access to a computer, or ??hacking??. Originally conceived of as analogous to trespass, the trend in some jurisdictions has been toward punishing access to computer data per se. This issue also arises under the Council of Europe Convention on Cybercrime which criminalizes ??offences against the confidentiality, integrity and availability of computer data and systems??. As the criminal law traditionally provides protection only to limited forms of information, the increasing use of the criminal law to protect computer data therefore confers on it a status not enjoyed by information stored in other forms. Drawing upon the laws of Australia, the United Kingdom and the United States, this article explores the increasing criminalization of access to computer data. It describes the evolution of cybercrime laws and considers ways in which problems of over breadth may be avoided. Questions will also be raised as to the appropriate role of the criminal law in protecting information. 相似文献
232.
We present a formal model of an intelligence agency that must divide its resources between the collection and analysis of information pertaining to terror plots. The model highlights the negative consequences of queues which form when collection exceeds analytic capacity. We incorporate the response of a terrorist organization to the operating characteristics of the intelligence system it faces, and solve for equilibrium strategies for the intelligence system and terrorist organization. Our results demonstrate the importance of properly balancing resources between collection and analysis, and stand in contrast to the observed state of overcollection in US intelligence agencies. 相似文献
233.
234.
235.
236.
237.
238.
239.
240.
Mobile customers are increasingly being tracked and profiled by behavioural advertisers to enhance delivery of personalized advertising. This type of profiling relies on automated processes that mine databases containing personally-identifying or anonymous consumer data, and it raises a host of significant concerns about privacy and data protection. This second article in a two part series on “Profiling the Mobile Customer” explores how to best protect consumers’ privacy and personal data through available mechanisms that include industry self-regulation, privacy-enhancing technologies and legislative reform.1 It discusses how well privacy and personal data concerns related to consumer profiling are addressed by two leading industry self-regulatory codes from the UK and the U.S. that aim to establish fair information practices for behavioural advertising by their member companies. It also discusses the current limitations of using technology to protect consumers from privacy abuses related to profiling. Concluding that industry self-regulation and available privacy-enhancing technologies will not be adequate to close important privacy gaps related to consumer profiling without legislative reform, it offers suggestions for EU and U.S. regulators about how to do this.2 相似文献