首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1284篇
  免费   89篇
各国政治   150篇
工人农民   21篇
世界政治   86篇
外交国际关系   204篇
法律   346篇
中国共产党   8篇
中国政治   29篇
政治理论   408篇
综合类   121篇
  2024年   3篇
  2023年   12篇
  2022年   11篇
  2021年   36篇
  2020年   51篇
  2019年   63篇
  2018年   79篇
  2017年   93篇
  2016年   90篇
  2015年   66篇
  2014年   71篇
  2013年   225篇
  2012年   75篇
  2011年   52篇
  2010年   42篇
  2009年   57篇
  2008年   60篇
  2007年   62篇
  2006年   43篇
  2005年   41篇
  2004年   34篇
  2003年   22篇
  2002年   25篇
  2001年   25篇
  2000年   19篇
  1999年   4篇
  1998年   6篇
  1997年   6篇
排序方式: 共有1373条查询结果,搜索用时 15 毫秒
191.
In this article a comparison is drawn between the historical Western European marriage pattern (WEMP), and more recent trends in nuptiality in Arab countries. This comparison makes clear that marriage behavior in the present-day Arab world shows striking similarities to nuptiality patterns which have been described by Hajnal and adherents as typically Western European. Due to a combination of economic hardship, ever growing costs in the marriage ceremony, prolonged education and the emancipation of women, people in the Arab world have started to marry at ever higher ages during the past decades. Moreover, there are indications that universal marriage is in decline. Just as Western European couples in the nineteenth century had to spend years of saving in order to meet the economic requirements for marriage, young couples in today's Arab world have to postpone marriage as they are only at a more advanced age able to bear the economic burden involved in getting married. Striking is also the fact that marriage restriction in both societies started at a moment when the social and legal position of women was improving (in late Medieval Western Europe and today in the Arab world). However, in some ways the historical Western European marriage pattern differs from the contemporary Arab pattern. No other marriage regime has been able to completely reduce fertility and balance population growth to economic development. Whereas population growth in pre-twentieth century Europe was only restricted by nuptiality control, demographic expansion in present day Arab society is also restricted by modern family planning. Declining nuptiality in the Arab world can however not, as some might assume, be put under the header of the Second Demographic Transition observed in Western societies, from the 1960s on. After all, until today, a rise in cohabitation and extra-marital births has not occured in the Arab world.  相似文献   
192.
This article examines the two most influential international initiatives on electronic signatures (UNCITRAL’s 1996 Model Law on Electronic Commerce and the 1999 EU Electronic Signature Directive). It considers whether the legislative approaches in Australia and the United Kingdom based on these initiatives are helpful in deciding whether lower level signature methods such as simple email messages are likely to satisfy a legal requirement for a signature. The conclusion reached is that they are unhelpful. The article goes on to consider whether legislative amendments based on UNCITRAL’s 2001 Model Law on Electronic Signatures or the 2005 UN Convention on the Use of Electronic Communications in International Contracts would improve the identified weaknesses. It concludes that such an update would clarify some issues, but that overall it will not solve the difficulties. The article ends with a brief speculation on the likely attributes of a more helpful approach.  相似文献   
193.
实现中国城乡发展由二元结构向一体化发展的转换,必须深入研究造成这一结果的一般性和特殊性问题。马克思主义、新古典主义、发展经济学、空间主义和新发展观等理论流派对该问题的探讨从不同层面上提供了很好的思路和角度。中国从二元结构到一体化发展的特殊历程,决定了中国不能将农业和农村当作工业化的一个工具,而是必须全面彻底解决"三农"问题以及城市与乡村、经济和社会的协调发展问题。  相似文献   
194.
冷战结束为东南亚地区一体化发展和东盟扩大创造了条件。随着伊斯兰复兴运动近年在马来西亚和文莱的深化,这两国出于宗教情感而持反以亲阿的态度,并将其变为东盟意志,无视东盟大多数成员为非伊斯兰国家且与以色列合作良好的事实。这既体现了冷战后国际关系格局发展现实在东南亚的投影,又体现了当代国际关系的“宗教转向”和东盟国家在伊斯兰问题上的分歧公开化。以色列实际上已成为东盟伊斯兰与非伊斯兰成员国之间的宗教“柏林墙”。欧盟模式应是东盟可资借鉴的方向,东盟制度建设乃至维系存在的基础在于:一是加强东盟制度民主建设,二是东盟机构的“去宗教化”。马来西亚和文莱可以通过伊斯兰会议组织等国际宗教组织发出其宗教诉求,但东盟绝非在宗教上的合适平台。  相似文献   
195.
This note assesses the decisions of the Court of Justice of the European Union in Achbita v G4S Secure Solutions NV and Bougnaoui v Micropole SA, the first cases dealing with religious discrimination under the Equal Treatment Directive 2000/43. Both cases concerned Muslim women wishing to express their religious beliefs by wearing an Islamic headscarf while working in a private undertaking. The Court held that the employees’ dismissal could not be justified by reference to clients’ prejudices against the headscarf. However, dismissal could be justified if pursued on the basis of a corporate policy of ideological neutrality which prohibited all visible religious, political and philosophical symbols. This note criticises the latter part of the Court's decision for, inter alia, placing too much weight on an employer's freedom to run its business in spite of the grave effects this has on employees’ fundamental right to manifest their beliefs at work.  相似文献   
196.
This article argues that Australia's recently-passed data breach notification legislation, the Privacy Amendment (Notifiable Data Breaches) Act 2017 (Cth), and its coming into force in 2018, makes an internationally important, yet imperfect, contribution to data breach notification law. Against the backdrop of data breach legislation in the United States and European Union, a comparative analysis is undertaken between these jurisdictions and the Australian scheme to elucidate this argument. Firstly, some context to data breach notification provisions is offered, which are designed to address some of the problems data breaches cause for data privacy and information security. There have been various prominent data breaches affecting Australians over the last few years, which have led to discussion of what can be done to deal with their negative effects. The international context of data breach notification legislation will be discussed, with a focus on the United States and European Union jurisdictions, which have already adopted similar laws. The background to the adoption of the Australia legislation will be examined, including the general context of data privacy and security protection in Australia. The reform itself will be then be considered, along with the extent to which this law is fit for purpose and some outstanding concerns about its application. While data breach notification requirements are likely to be a positive step for data security, further reform is probably necessary to ensure strong cybersecurity. However, such reform should be cognisant of the international trends towards the adoption of data security measures including data breach notification, but lack of alignment in standards, which may be burdensome for entities operating in the transnational data economy.  相似文献   
197.
In the European Union the Brussels Ibis Regulation governs the jurisdiction of Member State courts in civil and commercial matters. The reference for a preliminary ruling coming from the Estonian Supreme Court in the Bolagsupplysningen case offered the European Court of Justice another opportunity to develop its interpretation of the special ground for non-contractual obligations (article 7.2). The European Court of Justice's Grand Chamber ruled that legal persons, like natural persons, have the option of bringing a claim based on the infringement of personality rights by an online publication before the courts of the Member State where their centre of interests is located. It laid down that the centre of interests of a legal person pursuing an economic activity is determined by reference to the place where the company carries out the main part of its economic activities. The victim of a tortious internet publication can only seek an order for rectification and removal of the incorrect information in the courts that have jurisdiction over the entirety of the harm sustained and not before the courts that only enjoy jurisdiction with regard to the damage suffered in their territory.  相似文献   
198.
Access by law enforcement authorities to personal data initially collected by private parties for commercial or operational purposes is very common, as shown by the transparency reports of new technology companies on law enforcement requests. From a data protection perspective, the scenario of law enforcement access is not necessarily well taken into account. The adoption of the new data protection framework offers the opportunity to assess whether the new ‘police’ Directive, which regulates the processing of personal data for law enforcement purposes, offers sufficient safeguards to individuals. To make this assessment, provisions contained in Directive 2016/680 are tested against the standards established by the ECJ in Digital Rights Ireland and Tele2 Sverige on the retention of data and their further access and use by police authorities. The analysis reveals that Directive 2016/680 does not contain the safeguards identified in the case law. The paper further assesses the role and efficiency of the principle of purpose limitation as a safeguard against repurposing in a law enforcement context. Last, solutions to overcome the shortcomings of Directive 2016/680 are examined in conclusion.  相似文献   
199.
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.  相似文献   
200.
This paper looks at EU banks' use of public cloud computing services. It is based primarily on anonymised interviews with banks, cloud providers, advisers, and financial services regulators. The findings are presented in three parts. Part 1 explored the extent to which banks operating in the EU, including global banks, use public cloud computing services.Part 2 of this paper covers the main legal and regulatory issues that may affect banks' use of cloud services. It sets out how EU banking regulators have approached banks' use of cloud services and considers regulators' lack of cloud computing knowledge. The paper further considers how the regulation of outsourcing applies to banks' use of cloud services, including whether cloud computing constitutes “outsourcing”. It analyses the contentious issue of contractual audit rights for regulators as well as legal and practical issues around risk assessments, security, business continuity, concentration risk, bank resolution, and banking secrecy laws.Part 3 looks at the key contractual issues that arise between banks and cloud service providers, including data protection requirements, termination, service changes, and liability.All three parts of the paper can be accessed via Computer Law and Security Review's page on ScienceDirect at: http://www.sciencedirect.com/science/journal/02673649?sdc=2. The full list of sources is available via the same link and will be printed alongside the third part of the article.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号