首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   502篇
  免费   24篇
各国政治   44篇
工人农民   31篇
世界政治   63篇
外交国际关系   30篇
法律   224篇
中国共产党   1篇
中国政治   7篇
政治理论   123篇
综合类   3篇
  2023年   2篇
  2022年   3篇
  2020年   4篇
  2019年   9篇
  2018年   23篇
  2017年   15篇
  2016年   16篇
  2015年   16篇
  2014年   18篇
  2013年   104篇
  2012年   16篇
  2011年   17篇
  2010年   16篇
  2009年   13篇
  2008年   14篇
  2007年   19篇
  2006年   9篇
  2005年   20篇
  2004年   23篇
  2003年   16篇
  2002年   14篇
  2001年   12篇
  2000年   16篇
  1999年   6篇
  1998年   9篇
  1997年   8篇
  1996年   6篇
  1995年   7篇
  1994年   6篇
  1993年   3篇
  1992年   4篇
  1991年   4篇
  1990年   5篇
  1989年   10篇
  1988年   5篇
  1987年   3篇
  1985年   7篇
  1984年   3篇
  1983年   4篇
  1982年   3篇
  1981年   1篇
  1980年   4篇
  1979年   3篇
  1978年   3篇
  1976年   1篇
  1975年   1篇
  1974年   1篇
  1972年   1篇
  1968年   1篇
  1967年   1篇
排序方式: 共有526条查询结果,搜索用时 0 毫秒
461.
Modern identity is valuable, multi-functional and complex. Today we typically manage multiple versions of self, made visible in digital trails distributed widely across offline and online spaces. Yet, technology-mediated identity leads us into crisis. Enduring accessibility to greater and growing personal details online, alongside increases in both computing power and data linkage techniques, fuel fears of identity exploitation. Will it be stolen? Who controls it? Are others aggregating or analysing our identities to infer new data about us without our knowledge or consent? New challenges present themselves globally around these fears, as manifested by concerns over massive online data breaches and automated identification technologies, which also highlight the conundrum faced by governments about how to safeguard individuals' interests on the Web while striking a fair balance with wider public interests. This paper reflects upon some of these problems as part of the inter-disciplinary, transatlantic ‘SuperIdentity’ project investigating links between cyber and real-world identifiers. To meet the crisis, we explore the relationship between identity and digitisation from the perspective of policy and law. We conclude that traditional models of identity protection need supplementing with new ways of thinking, including pioneering ‘technical-legal’ initiatives that are sensitive to the different risks that threaten our digital identity integrity. Only by re-conceiving identity dynamically to appreciate the increasing capabilities for connectivity between different aspects of our identity across the cyber and the physical domains, will policy and law be able to keep up with and address the challenges that lie ahead in our progressively networked world.  相似文献   
462.
A substantial body of sociolegal scholarship suggests that the legitimacy of the law crucially depends on the public's perception that legal processes are fair. The bulk of this research relies on an underdeveloped account of the material and institutional contexts of litigants' perceptions of fairness. We introduce an analysis of situated justice to capture a contextualized conception of how litigants narrate fairness in their actual legal encounters. Our analysis draws on 100 in‐depth interviews with defendant's representatives, plaintiffs, and lawyers involved in employment discrimination lawsuits, selected as part of a multimethod study of 1,788 discrimination cases filed in U.S. district courts between 1988 and 2003. This article offers two key empirical findings, the first at the level of individual perceptions and the second at the level of legal institutions. First, we find that neither defendants' representatives nor plaintiffs believe discrimination law is fair. Rather than sharing a complaint, however, each side sees unfairness only in those aspects of the process that work to their disadvantage. Second, we demonstrate that the very notion of fairness can belie structural asymmetries that, overall, profoundly benefit employers in employment discrimination lawsuits. We conclude by discussing how a situated justice analysis calls for a rethinking of empirical research on fairness. Audio recordings of respondents quoted in this article are available online. 1   相似文献   
463.
We demonstrate how micro-computed tomography (micro-CT) can be a powerful tool for describing internal and external morphological changes in Calliphora vicina (Diptera: Calliphoridae) during metamorphosis. Pupae were sampled during the 1st, 2nd, 3rd and 4th quarter of development after the onset of pupariation at 23 °C, and placed directly into 80% ethanol for preservation. In order to find the optimal contrast, four batches of pupae were treated differently: batch one was stained in 0.5M aqueous iodine for 1 day; two for 7 days; three was tagged with a radiopaque dye; four was left unstained (control). Pupae stained for 7d in iodine resulted in the best contrast micro-CT scans. The scans were of sufficiently high spatial resolution (17.2 μm) to visualise the internal morphology of developing pharate adults at all four ages. A combination of external and internal morphological characters was shown to have the potential to estimate the age of blowfly pupae with a higher degree of accuracy and precision than using external morphological characters alone. Age specific developmental characters are described. The technique could be used as a measure to estimate a minimum post-mortem interval in cases of suspicious death where pupae are the oldest stages of insect evidence collected.  相似文献   
464.
This paper examines the professional and regulatory implications for legal practices of a rapidly evolving legal services marketplace shaped by new technologies and e-spaces. The paper focuses on three burgeoning areas in the delivery of legal services: (i) legal outsourcing; (ii) virtual law firms; and (iii) use of social media networking. The authors examine how Australian legal practitioners are utilising these new practices and technologies and the ethical implications of their use. The paper argues that the current regulatory framework in Australia does not adequately address the challenges and concerns raised by an increasingly borderless and e-based legal services market and thus calls for Australian legal regulators to remedy this deficiency as a matter of priority.  相似文献   
465.
466.
467.
468.
469.
470.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号