首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   807篇
  免费   58篇
各国政治   16篇
工人农民   14篇
世界政治   27篇
外交国际关系   51篇
法律   456篇
中国共产党   5篇
中国政治   74篇
政治理论   87篇
综合类   135篇
  2024年   4篇
  2023年   22篇
  2022年   29篇
  2021年   45篇
  2020年   53篇
  2019年   27篇
  2018年   55篇
  2017年   34篇
  2016年   26篇
  2015年   29篇
  2014年   65篇
  2013年   86篇
  2012年   65篇
  2011年   28篇
  2010年   30篇
  2009年   32篇
  2008年   53篇
  2007年   35篇
  2006年   28篇
  2005年   24篇
  2004年   17篇
  2003年   18篇
  2002年   21篇
  2001年   11篇
  2000年   7篇
  1999年   5篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1983年   3篇
排序方式: 共有865条查询结果,搜索用时 15 毫秒
51.
Investment by Australian local government authorities (LGAs) in public Wi‐Fi (PWF) provision has grown substantially in recent years. PWF represents the first significant venture of LGAs into telecommunications, a field of national jurisdiction, and thus is a precursor of wider local investment in digital communication technologies, particularly the Internet of Things and other ‘smart city’ infrastructure. However, there has been little published analysis of PWF provision and use in Australia. This knowledge gap limits understanding of the rationales, business models, and uses and impact of investment in these networks and offers little guidance for local authorities and communities contemplating wider ventures in the field of digital networks. This article draws on a national survey of PWF provision by LGAs, together with interview data and critical analysis of policy and institutional settings, to present an overview of local PWF provision in Australia. The analysis highlights some familiar problems associated with LGA infrastructure investment and service delivery, as well as some novel challenges posed for local managers by digital communication networks. Following an empirical mapping of PWF provision in Australia, we explore three significant themes that our research in this field highlights: accountability and transparency, competence in the field of information and communication technologies (ICT) and evaluation.  相似文献   
52.
Self‐driving cars (also known as driverless cars, autonomous vehicles, and highly automated vehicles [HAVs]) will change the regulatory, political, and ethical frameworks surrounding motor vehicles. At the highest levels of automation, HAVs are operated by independent machine agents, making decisions without the direct intervention of humans. The current transportation system assumes human intervention though, including legal and moral responsibilities of human operators. Has the development of these artificial intelligence (AI) and autonomous system (AS) technologies outpaced the ethical and political conversations? This paper examines discussions of HAVs, driver responsibility, and technology failure to highlight the differences between how the policy‐making institutions in the United States (Congress and the Public Administration) and technology and transportation experts are or are not speaking about responsibility in the context of autonomous systems technologies. We report findings from a big data analysis of corpus‐level documents to find that enthusiasm for HAVs has outpaced other discussions of the technology.  相似文献   
53.
大数据具有的4V特性决定了大数据技术将从多个角度和层面丰富侦查方式,提高了各类案件的侦破效率;以高科技预防高科技犯罪,做到打击迅速、减少损失,还百姓以现实的安全感;整合多种资源,引导社会运转,预见行为规律,构建令百姓满意的和谐治安环境;让公安工作始终开展的公正透明,百姓享有现实与虚拟环境里的平等权利;提供高效的管理手段和模式,不断推动社会管理的创新。全面认识大数据技术对公安工作的影响,有利于推动公安工作上台阶,不断实现新的突破。  相似文献   
54.
Criminology lacks sufficient data for many types of crime that are of great concern to society. This lack of data poses significant problems for determining whether resources are adequate for responding to these crimes or whether programmatic, legislative, or target-hardening efforts to prevent or reduce their occurrence are effective. Inadequate data about crime also produces a selective and incomplete narrative about crime that makes it easier for political and vested interests to exploit public concerns about crime for their own ends. In this address, I discuss what is needed to resolve these gaps and the ways in which criminologists can support a significant expansion of the crime data infrastructure. Such work is necessary to help ensure the future relevance of criminological research.  相似文献   
55.
商业数据界权包括确定其权利的性质和权利的归属。个人信息保护和数据安全法律体系的建成,为数据界权提供了新的逻辑起点和法律前提。数据界权首先应基于个人信息与数据、商业数据与公共数据等基本范畴的厘清。基于商业数据的固有性质以及工业产权的历史逻辑和制度内涵,商业数据与信息保护类工业产权具有深度的契合性,有必要将商业数据纳入工业产权序列,作为数字时代具有标志意义的一种新型工业产权,并可以成为与商业秘密相对称的商业数据权。商业数据界权需要确定商业数据的适格性--可保护条件。商业数据的适格性包括受保护数据的合法性、集合性、管理性、可公开性和商业价值性,即以合法形成的规模性数据集合为客体,并采取管理措施的可公开性技术数据和经营数据等信息。商业数据具有单一性、复合性和动态性,商业数据权暗含着所涉权利的分层性,其权属界定应当透过现象看本质,将复杂或者貌似复杂的问题简单化,遵循投入原则、分层原则和责任原则等三原则。  相似文献   
56.
《国际相互影响》2012,38(4):347-378
Ancient East Asia is the second oldest “protobellic area” and pristine state system of international relations within the global international system, after West Asia (ancient Near East). In a previous study Cioffi‐Revilla and Lai (1995) reported the first findings on the origins and evolution of war and politics in ancient China (Legendary, Xia [Hsia], Shang, and Western Zhou [Chou] periods), ca. 2700 B.C to 722 B.C In this paper we make public an expanded data set (N = 104 cases, 12 variables; version 2.0), explaining our sources, measurements, and data quality control procedures. The new data set will permit investigators to test hypotheses about warfare distributions, ethnic and protracted conflicts, time series, periodicity, system dynamics, and structural relationships (e.g., war‐polarity theories). This new long‐range data set should also promote a new stage in comparative analyses of the universal and particular properties of warfare and international systems, both cross‐polity and longitudinally.  相似文献   
57.
Using the Princeton nuptiality index Im, we analyzed historical developments in the proportion of married women of reproductive age in Spain. We show the internal diversity in nuptiality patterns and offer an explanatory statistical model based on panel data analysis to identify the main variables influencing these changes over more than a century (1887–1991). We found that Spain has been the developed country with the greatest contrasts in its provincial nuptiality patterns (measured by Im), although this diversity has lessened over the course of time. We also found that some socioeconomic variables (the gross domestic product per capita and the percentage of population living in cities) do not have a linear relationship with female nuptiality but rather have a U shape or an inverted U shape. This may partly account for some of the controversy that has raged on this topic over the past few decades on an international level.  相似文献   
58.
析数据电文的证据效力   总被引:2,自引:0,他引:2  
沈益平 《现代法学》2000,22(4):41-43
本文阐述了数据电文的证据效力问题 ,分析了大陆法系、英美法系对上述问题的观点和实践 ,说明数据电文作为证据是可采纳的 ,提出应建立和完善我国的相关立法 ,使法律为电子商务的发展提供服务。  相似文献   
59.
In the past, academics used to have an understanding of the “high threshold” of the legislation on civil action filing requirements. However, in the current case filing register system, such interpretation is no longer appropriate. Positive case filing requirements of the current civil procedure legislation can be explained and also can be applied. The problem of “being difficult in filing a case” in the operation of the judiciary cannot be the reason of blaming the legislation. In the process of designing and applying civil action filing requirements in the future, legislators should consider filtering the lawsuits without legal interest as soon as possible and the inherent limits of litigation mediate and adhere to tolerant concept for filing. The vacuum of dispute resolution left thereafter can be supplemented through building and perfecting the dispute resolution mechanism besides litigation.  相似文献   
60.
张建文  高悦 《河北法学》2020,38(1):43-56
大数据时代,匿名化规范既是个人信息保护中风险预防的手段,也是我国数据经济发展中数字流通的法律基础,但匿名化的法律标准在我国法律中还有待明确。欧盟已通过《一般数据保护条例》提出明确的匿名化标准,但该条例基于流程设置的标准适用于欧盟境内尚可,适用于我国或显得过于严苛,有碍数字经济的发展。我国个人信息匿名化法律标准与规则的重塑应当考虑环境、再识别风险,建议进行功能性匿名化。将比例原则应用到我国匿名化法律标准和规则的重塑之中,并将其引入到评估匿名信息接收者的风险等级,有助于降低个人信息被再识别的风险亦有利于匿名化的法律标准制定和规则构建。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号